The following methods are not suitable for secure deletion:
- Moving files to the wastebasket and then emptying it
- Deleting files from the command line
- Formatting the disk
All these mechanisms only mark the data as being deleted such that the space is available to be reused in the future – they do not actually delete the data itself and it could be recovered by data recovery tools.
The mechanisms outlined in the Asset Management standard are suitable for secure deletion and should be followed for University owned computers, storage devices or media. Please also note that the BYOD Standard regarding University data on Bring-Your-Own-Device devices also requires that the Asset Management standard be followed when the device is no longer needed. The BYOD standard can also be found from the Information Security Minimum and Required Reading page.