Term
Data destruction and media sanitization |
|
Definition
- Burning - Shredding - Pulping - Pulverizing - Degaussing - Purging - Wiping |
|
|
Term
|
Definition
-Documents are incinerated -Can be combined with other methods |
|
|
Term
|
Definition
-Documents are cut into small pieces -long version not secure -Crosscut more secure but slower |
|
|
Term
|
Definition
-Paper soaked in a solution until it is reduced to mush -Can be reused -Expensive, time consuming, difficult to transport |
|
|
Term
|
Definition
-Can be used for paper or electronic media -Crushes into small pieces -Hydraulic or pneumatic machine -Reduce to loose fibers or shards |
|
|
Term
|
Definition
-AC or DC erasing -Uses Magnetic Field -Makes Hard drives unusable |
|
|
Term
|
Definition
-Also known as sanitizing -Removes data remanence -Data cannot be reconstructed -Typically considered a step beyond wiping of data -Used with highly sensitive data |
|
|
Term
|
Definition
-Over-writes data "x" number of times to ensure it is unrecoverable -Number of passes can be configured |
|
|
Term
Data sensitivity labeling and handling |
|
Definition
- Confidential - Private - Public - Proprietary - PII - PHI |
|
|
Term
|
Definition
- Owner - Steward/custodian - Privacy officer |
|
|
Term
|
Definition
-Continued storage of data for compliance or business reasons -Often policies are created as a collaborative effort of legal, IT, and business owners |
|
|
Term
|
Definition
-best practices for legal and financial risks -Keeps organization in accord with regulations |
|
|
Term
|
Definition
the residual representation of digital data that remains even after attempts have been made to remove or erase the data |
|
|
Term
|
Definition
-Resets the NAND and marks all blocks as empty -Each SSD maker has a secure erase tool |
|
|
Term
|
Definition
Data Wiping method with 3 pass overwrite Pass 1 Writes Zeroes and verifies Pass 2 Write Ones and verifies Pass 3 Writes random character and verifies |
|
|
Term
|
Definition
-Data Wiping Method -Pass 1 writes a one or zero -Pass 2 Writes the complement of the previous -Pass 3 Writes a random character and verifies the write |
|
|
Term
|
Definition
Data Wiping Pass 1: Writes one or zero -Only for whole disk sanitization, fast |
|
|
Term
|
Definition
-Confidential -Private -Public -Proprietary -PII Personally Identifiable info (non-PII becomes PII when combined) -PHI Protected Health Information |
|
|
Term
|
Definition
A position that oversees all ongoing activities related to the development, implementation, and maintenance of an organizations privacy policies |
|
|
Term
Examples of Legal and Compliance Regulations |
|
Definition
-Sarbanes Oxley SOX -Health Insurance Portability and Accountability Act HIPAA -Gramm-Leach-Bliley Act of 1999 GLBA (how private information is disclosed from financial institutions) |
|
|