Page 199 - Data Science class 10
P. 199

2.  Digital Clear or overwrite non-secure digital information to ensure no one can retrieve or read the information
              or record (including the metadata). Deletion is not destruction. Deletion just gets rid of the system's reference
              to the data or record, rather than the information or record itself.

            To prevent unauthorised access you should destroy secure digital data or record (including the metadata), or the
            media on which it is held. Examples of magnetic and optical audio-visual media are film, video, audiotape and
            microforms.
            Hard Drive and Tape Shredding

            The most secure and cost efficient method is shredding, to dispose of all types of end-of-life hard drives and media
            tapes. The hard drive shredding services is great for businesses with large data centres or a stockpile of old hard
            drives and media tapes as it is a quick and effective technique.
            Hard Drive Degaussing

            Hard drive degaussing is a cost effective solution to destroy a limited number of hard discs or media tapes. Hard
            drive degaussing exposes equipment to a powerful magnetic field to ensure removal of data from the media. This
            approach is ideal for small and medium-sized businesses searching for a cost-effective solution to destroy old hard
            drives and media tapes.

            Hard Drive Erasure
            Looking for a method to safely delete electronic data while preserving the actual hard drive? Drive erasure is
            perfect for businesses that have off-lease equipment or hard drives for reuse, redeployment or high remarking
            value.

            Methods of Disposing of Physical Records
            Just like digital data, many a times, we may possess the confidential data in the form of physical copies. Now let us
            understand how we can safely discard the confidential data.
            Plastic-based Records (Debit /Credit Cards)

            Scissors can do a fine job by destroying them correctly with multiple horizontal and
            vertical, strategic slices. You can take an extra step to deactivate the card’s magnetic
            stripe and, if present, its RFID chip. To scramble the data in the magnetic stripe, run a
            very strong magnet along the stripe on the back of the card. Use scissors or a hammer
            to destroy the chip embedded in the card, since “all the information stored on the card
            is also stored on the magnetic stripe and the chip itself.
            Shredding the Paper-based Documents
            Shredding is an excellent technique to erase data if you have a huge enterprise data centre
            or a large stockpile of old media that you want to destroy. It’s very secure, fast and efficient.
            Shredding reduces electronic devices to pieces no larger than 2 millimeters. If you operate
            with highly secure data in a highly secure environment, shredding should be your number
            one choice as it guarantees that all data is obliterated.





              A paper shredder is a mechanical instrument used to cut sheets of paper into either strips or fine particles. Shredders
              are used by corporations, government agencies, and private citizens to destroy sensitive or private information.


            Cutting up the Documents
            In circumstances when you just have one page or one file to discard, cutting the documents can be an appropriate
            method to discard the documents. While cutting the documents, you should cut them into small pieces and ensure
            that none of the sensitive information is readable. Also, you should cut the document in a way that it is not in a
            position to be rebuilt and it is completely unreadable. If these conditions are met, you have successfully discarded
            the data.

                                                                                        Ethics in Data Science  197
   194   195   196   197   198   199   200   201   202   203   204