Atlassian uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. Accept all cookies to indicate that you agree to our use of cookies on your device. Atlassian cookies and tracking notice, (opens new window)
U of T Information Security
Information Security Handbook

Information Security Handbook
Results will update as you type.
  • Getting started
  • Strategies
  • How-tos
    • Back up data
    • Baselines and configurations
    • Classify data
    • Computing or storage environment for research
    • Cyber security alerts and advisories
    • Data collection and survey management
    • Data integrity
    • Delete or destroy data and devices
    • Encrypt data and devices
    • Passwords, passphrases and passkeys
    • Physically secure data and devices
    • Remote interviews
    • Report a security event or incident
    • Safe web browsing
    • Security awareness training
    • Send, share or transfer data
    • Synchronize system's time with a U of T time server
    • Travel or work remotely
    • Updates and patching
    • Virtual private networks (VPN)
    • Virus and malware protection

    You‘re viewing this with anonymous access, so some content might be blocked.
    /
    Delete or destroy data and devices
    Updated May 02, 2024

      Delete or destroy data and devices

      Purpose

      Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements. 


      Audience

      faculty researchers Admin staff IT staff students


      On this page

      • 1 Initial considerations
        • 1.1 Data retention; preservation or archiving.
          • 1.1.1 Administrative data
          • 1.1.2 Research data
        • 1.2 Consult ethics protocols and other agreements.
          • 1.2.1 Human ethics or animal use protocol.
          • 1.2.2 Agreements (Data sharing [DSA], material sharing [MTA], etc.)
        • 1.3 Determine your data's classification.
      • 2 What can I do?
        • 2.1 For confidential, sensitive, restricted, or regulated data (Level 3 or 4)
          • 2.1.1 Windows
          • 2.1.2 MacOS
          • 2.1.3 Linux
          • 2.1.4 Cross-platform
          • 2.1.5 Cloud services
          • 2.1.6 Physical data
        • 2.2 For non-sensitive, non-public data (Level 2)
          • 2.2.1 Windows
          • 2.2.2 MacOS
          • 2.2.3 Linux
          • 2.2.4 Cloud services
          • 2.2.5 Physical data
        • 2.3 For public data (Level 1)
          • 2.3.1 Windows
          • 2.3.2 MacOS
          • 2.3.3 Linux
          • 2.3.4 Cloud services
          • 2.3.5 Physical data

      Initial considerations

      Data retention; preservation or archiving.

      • Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.

      Administrative data

      • https://utarms.library.utoronto.ca/records-management/uoftfileplan

      Research data

      • https://onesearch.library.utoronto.ca/researchdata/retention-and-preservation

      Consult ethics protocols and other agreements.

      • Is your data or your obligation to securely delete it covered by other binding documents or contracts?

      Human ethics or animal use protocol.

      • Ethics/use protocols will need to specify for how long your data is to be retained, if it will be deposited into a long-term solution, and how it will be securely deleted.

      • If you are unsure about your obligations, please contact the relevant ethics unit.

        • https://research.utoronto.ca/ethics-human-research/ethics-human-research

        • https://research.utoronto.ca/ethics-animal-research-teaching/ethics-animal-research-teaching

      Agreements (Data sharing [DSA], material sharing [MTA], etc.)

      • Research contracts and agreements can include language around how data can be retained or how it should be deleted upon the conclusion of the contract, agreement, or project.

      • Contact the relevant contract and agreements office regarding sponsor or data provider requirements.

        • https://research.utoronto.ca/research-innovation-agreements/research-innovation-agreements

      Determine your data's classification.

      • Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.

        • Classify dataPreview


      What can I do?

      For confidential, sensitive, restricted, or regulated data (Level 3 or 4)

      Data is unrecoverable only if stored on an encrypted device. Encrypt data and devicesPreview

      Windows

      • Delete a file

        • https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete

        • https://eraser.heidi.ie/  

      • Sanitize a device

        • See Cross-platform options. 

      MacOS

      • Delete a file

        • https://ss64.com/osx/srm.html

      • Sanitize a device

        • Erase and reformat a storage device in Disk Utility on Mac

          • Choose “most secure” under “security options”

      Linux

      • Delete a file

        • https://man7.org/linux/man-pages/man1/shred.1.html

      • Sanitize a device

        • https://man7.org/linux/man-pages/man1/shred.1.html

      Cross-platform

      • Sanitize a device

        • Your motherboard or drive manufacturer might provide a proprietary sanitization utility.

        • PartedMagic - Partitioning, Cloning, Rescue, and Erasing.

        • Darik's Boot and Nuke - DBAN - Darik's Boot And Nuke  

      Cloud services

      • Contact provider regarding secure data deletion pipeline.

      Physical data

      • Commercial shredding.

        • Ensure that you receive a Certificate of Destruction for your records.

        • Contact your local IT group for recommendations.

          • Contact us | Information Technology (IT)Preview

      For non-sensitive, non-public data (Level 2)

      Data could be recovered with difficulty.

      Windows

      • Delete a file

        • https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete

      • Delete all data from a device

        • Disk Management in Windows - Microsoft Support

          • Do not perform a “quick format”.

      MacOS

      • Delete a file

        • Delete file and empty Trash .

      • Delete all data from a device

        • Erase and reformat a storage device in Disk Utility on Mac

          • Do not select “fastest” under “security options”.

      Linux

      • Delete a file

        • https://man7.org/linux/man-pages/man1/shred.1.html

      • Delete all data from a device

        • https://man7.org/linux/man-pages/man1/shred.1.html

      Cloud services

      • Contact provider regarding secure data deletion pipeline.

      Physical data

      • Office or commercial shredding.

      For public data (Level 1)

      Data could be recovered with little difficulty.

      Windows

      • Delete a file

        • Delete file and empty Recycle Bin.

      • Delete all data from a device

        • Disk Management in Windows - Microsoft Support

      MacOS

      • Delete a file

        • Delete file and empty Trash .

      • Delete all data from a device

        • Erase and reformat a storage device in Disk Utility on Mac

      Linux

      • Delete a file

        • Delete file

          • https://www.linux.org/docs/man1/rm.html

      • Delete all data from a device

        • https://man7.org/linux/man-pages/man8/umount.8.html  and use https://man7.org/linux/man-pages/man8/mkfs.8.html

      Cloud services

      • Delete file within platform; wait for recovery period to expire.

      Physical data

      • Recycle and/or shred, if appropriate.


      Search

      How do I...


      Additional help

      General

      Contact us | Information Security (IS)Preview

      Contact us | Information Technology (IT)Preview

      Researchers

      Research Information Security - Information Security at University of Toronto


      Related articles

      • Page:
        Remote interviews
      • Page:
        Virtual private networks (VPN)
      • Page:
        Updates and patching
      • Page:
        Send, share or transfer data
      • Page:
        Best practices to secure systems and environments
      • Page:
        Physically secure data and devices
      • Page:
        Encrypt data and devices
      • Page:
        Baselines and configurations
      • Page:
        Naming conventions

       

       

       

      {"serverDuration": 12, "requestCorrelationId": "4c7289887e0e49eeb2950de74d3af117"}