Skip to main content

Computer and Electronic Data Destruction

Computer and Electronic Data Destruction

Computers are often the repository of an astounding amount of information. Even in a stand-alone computer that is not linked to the Internet, millions of conventional pages of text and images can be stored in the hard drive and on peripherals, such as a floppy disk or on a compact disk (CD).

For sensitive operations, the security of computer data must be ensured. This is particularly true when data is erased. The convention version of data removal involves the deletion of a file, by the movement of the file to a "garbage can" (i.e., the "Recycling Bin" in the various Windows operating systems). This form of deletion instructs the computer to use the slice of hard or floppy disk space for something else. Eventually, the file will be over-written. But, until that occurs, the information is recoverable.

The true cleaning of a hard or floppy disk involves overwriting the actual data. Computer data is recorded as a series of 0s and 1s. Irrevocable erasure of data can be achieved by rewriting the relevant sector of a drive with 0's. Others advocate for a hexadecimal pattern (i.e., 110000001) followed by a "second pass", which over-writes the hexadecimal pattern as 00111110. In this way, every unit of information has been changed at least once.

True cleaning of a CD is also possible. The data layer that was previously "burned" onto the CDs surface can be removed and ground into fine powder. The original polycarbonate disk that remains contains no trace of the original data. The CD, which is rendered unusable, can be conventionally disposed of.

Destruction can also be a brute force physical process. For example, a hard drive can be physically damaged so that it cannot be read, even if installed into another computer. Floppy disks can be cut apart. Thus, while information may still reside on the drive, that information is essentially destroyed. Disks and CDs can even be melted down.

A number of vendors offer data destruction services to those having concerns about the sensitivity and vulnerability of their data. Government agencies usually have in-house staff and facilities, so that sensitive information does not pass into unauthorized hands, even during the destruction process.

FURTHER READING:

BOOKS:

Bosworth, Seymour and Michael E. Kabay. Computer Security Handbook. New York: John Wiley & Sons, 2002.

Eoghan, Casey. Digital Evidence and Computer Crime. New York: Academic Press, 2000.

Kruse, Warren G., II., and Jay G. Heiser. Computer Forensics: Incident Response Essentials. Boston: Addison Wesley Professional, 2001.

SEE ALSO

Computer Virus
Electronic Communication Intercepts, Legal Issues
Information Security

Cite this article
Pick a style below, and copy the text for your bibliography.

  • MLA
  • Chicago
  • APA

"Computer and Electronic Data Destruction." Encyclopedia of Espionage, Intelligence, and Security. . Encyclopedia.com. 15 Nov. 2018 <https://www.encyclopedia.com>.

"Computer and Electronic Data Destruction." Encyclopedia of Espionage, Intelligence, and Security. . Encyclopedia.com. (November 15, 2018). https://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/computer-and-electronic-data-destruction

"Computer and Electronic Data Destruction." Encyclopedia of Espionage, Intelligence, and Security. . Retrieved November 15, 2018 from Encyclopedia.com: https://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/computer-and-electronic-data-destruction

Learn more about citation styles

Citation styles

Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).

Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.

Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:

Modern Language Association

http://www.mla.org/style

The Chicago Manual of Style

http://www.chicagomanualofstyle.org/tools_citationguide.html

American Psychological Association

http://apastyle.apa.org/

Notes:
  • Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
  • In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.