Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
🎓

Purpose

Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements. 

👥

Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents

🔖 Contents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel
3
4
include
outlinefalse
indent
styledefault
excludePurpose|Audience|
Contents
On this page|Search|Additional help|Related articles
typelist
class
printablefalse

(question)Initial considerations

Data retention; preservation or archiving.

  • Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.

Administrative data

Research data

Consult ethics protocols and other agreements.

  • Is your data or your obligation to securely delete it covered by other binding documents or contracts?

Human ethics or animal use protocol.

Agreements (Data sharing [DSA], material sharing [MTA], etc.)

Determine your data's classification.

  • Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.


\uD83D\uDCD8 What What can I do?

For confidential, sensitive, restricted, or regulated data (Level 3 or 4)

Panel
panelIconIdatlassian-warning
panelIcon:warning:
bgColor#FFFAE6
Note

Data is unrecoverable only if stored on an encrypted device. Encrypt data and devices

Windows

MacOS

Linux

Cross-platform

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Physical data

For non-sensitive, non-public data (Level 2)

Note

Data could be recovered with difficulty.

Windows

MacOS

Linux

Cloud services

  • Contact provider regarding secure data deletion pipeline.

Physical data

  • Office or commercial shredding.

For public data (Level 1)

Note

Data could be recovered with little difficulty.

Windows

MacOS

Linux

Cloud services

  • Delete file within platform; wait for recovery period to expire.

Physical data

  • Recycle and/or shred, if appropriate.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Carl Chan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


✉️Additional help

General

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8Fus#Information-Information-Security-(IS)

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
max10
showSpacefalse
excerptTypesimple
cqllabel in ( "encrypt" , "secure" )