Part of proper data and device (asset) management is the secure deletion (sanitization) and destruction of data when it is no longer required for a project and not suitable for preservation or subject to retention or archiving requirements.
faculty researchers Admin staff IT staff students
Increasingly, there are legal, regulatory, and policy-based obligations or academic and public value to the long-term storage of data produced at the University.
Is your data or your obligation to securely delete it covered by other binding documents or contracts?
Ethics/use protocols will need to specify for how long your data is to be retained, if it will be deposited into a long-term solution, and how it will be securely deleted.
If you are unsure about your obligations, please contact the relevant ethics unit.
Research contracts and agreements can include language around how data can be retained or how it should be deleted upon the conclusion of the contract, agreement, or project.
Contact the relevant contract and agreements office regarding sponsor or data provider requirements.
Classifying your data is the first step to knowing what methods are required to properly delete or destroy it.
Data is unrecoverable only if stored on an encrypted device. Encrypt data and devices
Delete a file
Sanitize a device
See Cross-platform options.
Delete a file
Sanitize a device
Erase and reformat a storage device in Disk Utility on Mac
Choose “most secure” under “security options”
Delete a file
Sanitize a device
Sanitize a device
Your motherboard or drive manufacturer might provide a proprietary sanitization utility.
Contact provider regarding secure data deletion pipeline.
Commercial shredding.
Ensure that you receive a Certificate of Destruction for your records.
Contact your local IT group for recommendations.
Data could be recovered with difficulty.
Delete a file
Delete all data from a device
Disk Management in Windows - Microsoft Support
Do not perform a “quick format”.
Delete a file
Delete file and empty Trash .
Delete all data from a device
Erase and reformat a storage device in Disk Utility on Mac
Do not select “fastest” under “security options”.
Delete a file
Delete all data from a device
Contact provider regarding secure data deletion pipeline.
Office or commercial shredding.
Data could be recovered with little difficulty.
Delete a file
Delete file and empty Recycle Bin.
Delete all data from a device
Delete a file
Delete file and empty Trash .
Delete all data from a device
Delete a file
Delete file
Delete all data from a device
Delete file within platform; wait for recovery period to expire.
Recycle and/or shred, if appropriate.
General
Contact us | Information Security (IS)
Contact us | Information Technology (IT)
Researchers
Research Information Security - Information Security at University of Toronto