UC Berkeley security policy mandates compliance with for devices handling covered data. The recommendations below are provided as optional guidance to assist with achieving the. Requirement Resource Custodians must ensure that any systems (laptops, workstations, and servers) and devices (smartphones, USB drives) storing covered data must be securely overwritten or wiped using an approved secure file deletion utility upon decommission of the device to ensure that the information cannot be recovered.
Re: 'Secure Erase' Locks Drive Unread post by Metreon3 » Mon Dec 22, 2014 3:19 am Hey guys (and Synology admins), I wanted to let you know that I ran into the same problem where secure erase locked my drives. Get together. Meet face-to-face at events near you, attend webinars, and more. All Communities Events Exchange Events.
For those devices that cannot be overwritten (defective hard drives, CDs/DVDs), Resource Custodians must ensure the device is destroyed prior to disposal. Description of Risk Storage media are prone to physical theft and loss. Unauthorized parties can acquire unencrypted data stored on the device. Recommendations During a covered device’s lifecycle, it may need to be retired for various reasons such as upgrades, migration or project closing. To avoid covered data remnants from being accessed by unauthorized parties in legacy covered devices, follow the recommendations below to delete covered data before retiring the covered device. Sanitization prior to device reuse: • Delete data using secure software to overwrite data multiple times. Compliant delete options include.
• Where possible, sanitize entire hard disk instead of just deleting data files and folders. Below are list of recommended software tools for disk and file deletion. Use disk deletion tools when you need to erase the content of an entire disk drive, such as when you are retiring a disk drive, or the computer itself. Or you want to repurpose your computer by re-installing/upgrading your operating system.
Secure Delete Program
How we secure paper records, telephone conversations, and various types of digital media The State of Texas State’s Information Security Program Comprehensive Set of Security Policies, Practices, and Services that address. More ways to shop: Visit an Apple Store, call 1-800-MY-APPLE, or find a reseller.
Educause Security Discussion: Re: Secure Delete For Mac Download

Use file deletion if you want to continue to use the computer as-is, but want to delete specific files or folders containing covered data.