Media Sanitization Standard
Appendix to Policy
To prevent unauthorized access to University information, data must be permanently erased from devices (e.g., computer, server, laptop, multi-function printer, medical equipment, cell phone, etc.) or storage media (e.g., CD, thumb drive, workstation/server hard drives, etc.) prior to transfer, obsolescence, or when the hardware becomes no longer usable or needed. Effective Media Sanitization requires reasonable efforts to prevent recovery of residual stored data on the media.
The following table defines the baseline security controls for media sanitization.
|MS.A.01||Device/media is leaving the unit: use a secure wiping tool to clear/overwrite the data or use the University approved disposal vendor||Required 1||Required||Required|
|MS.A.02||Device/media is leaving the University: physically destroy the hard drive or request physical destruction from the University approved disposal vendor||Required||Recommended||Optional|
|MS.A.03||Device/media is remaining under the unit's control: use a secure wiping tool to clear/overwrite the data||Required||Required||Optional|
|MS.A.04||Document and retain a record of the data removal/destruction||Required||Recommended||Optional|
1 Secure wiping/clear of data is optional if you maintain chain of custody for the hard drive until an approved disposal vendor accepts the hard drive for physical destruction.
This applies to IT resources owned or contracted by the University. This also applies to personally owned devices authorized to store University data designated as private-highly restricted or private-restricted .
This applies to University community members who use or manage University IT resources.
More information on Media Sanitization
- November 2014