

{"id":5659,"date":"2019-09-10T12:45:00","date_gmt":"2019-09-10T10:45:00","guid":{"rendered":"http:\/\/prodevice.milleniumhost.pl\/?p=5659"},"modified":"2021-09-21T12:26:12","modified_gmt":"2021-09-21T10:26:12","slug":"3-rules-for-secure-data-removal-from-storage-media","status":"publish","type":"post","link":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/","title":{"rendered":"3 rules for secure data removal from storage media"},"content":{"rendered":"\n<p>Institutions and enterprises, in accordance with applicable regulations, are obliged to ensure the security of information they store. What if there is a need to get rid of particularly sensitive data saved on electronic media? It is worth knowing some key principles how to proceed so that they are removed in a safe and irreversible way.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SEARCH FOR A SPECIALIZED SERVICE PROVIDER<\/h3>\n\n\n\n<p>Use only the services of companies that specialize in the field of data deletion. The extremely low price for the destruction of e.g. one disk should always be a warning signal. It is worth checking then what qualifications your company has? What equipment does it use? Does it have the appropriate certificates and references? Does it apply strict security standards? Does it offer a process of filming the performed service? Remember that a company specialized in the field of <a href=\"https:\/\/www.pro-device.com\/en\/\">data destruction<\/a> should have special rights \u2013 for example, an ISO certificate as part of the service of erasing information from storage media.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">BUY A PROFESSIONAL DEGAUSSER AND \/ OR SHREDDER<\/h3>\n\n\n\n<p>If you do not want to use the services of an external company, you can purchase the appropriate equipment that will delete data from the media. Here, producers of demagnetizers \/ <a href=\"https:\/\/www.pro-device.com\/en\/degaussers\/\">degaussers<\/a> \u2013 devices that destroy the data of magnetic carriers (hard disks, magnetic tapes) with the help of a strong electromagnetic pulse come in handy. It is important that the degausser operates in accordance with applicable global security standards and guidelines for data destruction. When choosing a device, it is worth paying attention to additional functionalities (e.g. scanning media by the application on a mobile device, which facilitates the process of reporting the amount and type of demagnetized media).<br>Another effective way to <a href=\"https:\/\/www.pro-device.com\/en\/degaussers\/\">remove data from storage media<\/a> is to use a shredder that will physically deform or fragment it. Automatic or manual models are available on the market. When buying a device, it is worth paying attention to which standards the machine operates.<br>Many companies have strict standards on how to remove information from media. They recommend using a demagnetizer first and then a shredder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">EDUCATE EMPLOYEES<\/h3>\n\n\n\n<p>Persons responsible for information security in an enterprise or institution should be aware of the consequences of ignorance or simple negligence in the storage and destruction of data. That is why it is worth focusing on cyclical training of IT managers in the field of applicable regulations and safe and effective methods of data destruction. It is these people who most often decide how to dispose of data that the company has. And the uncontrolled leakage of sensitive information can threaten a company not only financially but also legal consequences.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Institutions and enterprises, in accordance with applicable regulations, are obliged to ensure the security of information they store.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5659","post","type-post","status-publish","format-standard","hentry","category-media-destroyers-shredder"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 rules for secure data removal from storage media - ProDevice<\/title>\n<meta name=\"description\" content=\"What if there is a need to get rid of particularly sensitive data saved on electronic media? Think about secure data removal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 rules for secure data removal from storage media - ProDevice\" \/>\n<meta property=\"og:description\" content=\"What if there is a need to get rid of particularly sensitive data saved on electronic media? Think about secure data removal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/\" \/>\n<meta property=\"og:site_name\" content=\"ProDevice\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T10:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-21T10:26:12+00:00\" \/>\n<meta name=\"author\" content=\"ProDevice\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ProDevice\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/\"},\"author\":{\"name\":\"ProDevice\",\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/#\\\/schema\\\/person\\\/76e95ca7d2de6dddbff607d762c7c81b\"},\"headline\":\"3 rules for secure data removal from storage media\",\"datePublished\":\"2019-09-10T10:45:00+00:00\",\"dateModified\":\"2021-09-21T10:26:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/\"},\"wordCount\":447,\"articleSection\":[\"Media destroyers\\\/shredders\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/\",\"url\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/\",\"name\":\"3 rules for secure data removal from storage media - ProDevice\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/#website\"},\"datePublished\":\"2019-09-10T10:45:00+00:00\",\"dateModified\":\"2021-09-21T10:26:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/#\\\/schema\\\/person\\\/76e95ca7d2de6dddbff607d762c7c81b\"},\"description\":\"What if there is a need to get rid of particularly sensitive data saved on electronic media? Think about secure data removal.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/3-rules-for-secure-data-removal-from-storage-media\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 rules for secure data removal from storage media\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/#website\",\"url\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/\",\"name\":\"ProDevice\",\"description\":\"Kolejna witryna oparta na WordPressie\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pro-device.com\\\/pl\\\/#\\\/schema\\\/person\\\/76e95ca7d2de6dddbff607d762c7c81b\",\"name\":\"ProDevice\",\"url\":\"https:\\\/\\\/www.pro-device.com\\\/en\\\/author\\\/prodevice\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 rules for secure data removal from storage media - ProDevice","description":"What if there is a need to get rid of particularly sensitive data saved on electronic media? Think about secure data removal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/","og_locale":"en_US","og_type":"article","og_title":"3 rules for secure data removal from storage media - ProDevice","og_description":"What if there is a need to get rid of particularly sensitive data saved on electronic media? Think about secure data removal.","og_url":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/","og_site_name":"ProDevice","article_published_time":"2019-09-10T10:45:00+00:00","article_modified_time":"2021-09-21T10:26:12+00:00","author":"ProDevice","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ProDevice","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/#article","isPartOf":{"@id":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/"},"author":{"name":"ProDevice","@id":"https:\/\/www.pro-device.com\/pl\/#\/schema\/person\/76e95ca7d2de6dddbff607d762c7c81b"},"headline":"3 rules for secure data removal from storage media","datePublished":"2019-09-10T10:45:00+00:00","dateModified":"2021-09-21T10:26:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/"},"wordCount":447,"articleSection":["Media destroyers\/shredders"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/","url":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/","name":"3 rules for secure data removal from storage media - ProDevice","isPartOf":{"@id":"https:\/\/www.pro-device.com\/pl\/#website"},"datePublished":"2019-09-10T10:45:00+00:00","dateModified":"2021-09-21T10:26:12+00:00","author":{"@id":"https:\/\/www.pro-device.com\/pl\/#\/schema\/person\/76e95ca7d2de6dddbff607d762c7c81b"},"description":"What if there is a need to get rid of particularly sensitive data saved on electronic media? Think about secure data removal.","breadcrumb":{"@id":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.pro-device.com\/en\/3-rules-for-secure-data-removal-from-storage-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pro-device.com\/en\/"},{"@type":"ListItem","position":2,"name":"3 rules for secure data removal from storage media"}]},{"@type":"WebSite","@id":"https:\/\/www.pro-device.com\/pl\/#website","url":"https:\/\/www.pro-device.com\/pl\/","name":"ProDevice","description":"Kolejna witryna oparta na WordPressie","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pro-device.com\/pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.pro-device.com\/pl\/#\/schema\/person\/76e95ca7d2de6dddbff607d762c7c81b","name":"ProDevice","url":"https:\/\/www.pro-device.com\/en\/author\/prodevice\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/posts\/5659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/comments?post=5659"}],"version-history":[{"count":3,"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/posts\/5659\/revisions"}],"predecessor-version":[{"id":8610,"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/posts\/5659\/revisions\/8610"}],"wp:attachment":[{"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/media?parent=5659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/categories?post=5659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pro-device.com\/en\/wp-json\/wp\/v2\/tags?post=5659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}