Login   |   Secure Purdue > Best Practices

Media Disposal Guidelines

PDF icon View PDF for print

These guidelines are intended to support Purdue University Data Classification and Governance Policy (VII.B.6), as well as the Data Handling Requirements as issued by the University Data Stewards.
  1. Disposal Guidelines for Paper-Based Media
    1. The proper media disposal technique for any paper based documentation must match the highest classification of data that is contained in that document. Therefore, a document containing both University classified sensitive and restricted data must be disposed of in the manner required for the disposal of restricted data.
    2. Existing Departmental Managers are responsible for overseeing paper-based document disposal in his or her area.
    3. Destruction methods for paper-based documentation includes use of the Purdue University Confidential Material Recycling Program, and other methods such as shredding (cross-cut shredding is best), disintegration, incineration, and pulverization.
  2. Disposal Guidelines for Electronic-Based Media
    1. The proper media disposal technique for electronic storage devices depends whether or not the electronic storage media is being repurposed for University use.
    2. Electronic Storage Devices Repurposed for University Use: If the physical media is going to be repurposed for University use, then the electronic storage device must be wiped with a multiple pass/DoD secure overwrite prior to being repurposed to another unit or area.
    3. Electronic Storage Devices NOT Repurposed for University Use: If the physical media is not going to be repurposed for University use, then the electronic storage device must be physically destroyed.
    4. Existing Departmental Managers are responsible for overseeing electronic storage device disposal in his or her area. This responsibility includes ensuring that appropriate multiple pass/DoD secure overwrites are properly completed and documented in the event that storage devices are repurposed for University use.
    5. Multiple pass/DoD overwrite means to overwrite all addressable locations with a character, its complement, then a random character, and verify.
    6. Physical destruction methods for electronic storage devices include use of the Purdue Recycling for the Future program. Other methods of physical destruction may be acceptable so long as the electronic storage device is destroyed and the data contained on that device may not be recovered by any means.
  3. Related Documents
    1. Purdue University Data Handling Requirements, available at: http://www.purdue.edu/securepurdue/bestPractices/dataClass.cfm
    2. Data Classification and Governance Policy (VII.B.6), available at:  http://www.purdue.edu/policies/information-technology/viib6.html
    3. Purdue University Confidential Material Recycling Program, available at: http://www.purdue.edu/securepurdue/docs/careerAccount/Shred_Singlepage.pdf
    4. Purdue University Recycling for the Future media shredding program, available at http://www.purdue.edu/surplus (click on the Recycling for the Future link on the bottom of the Surplus page)
    5. Data Destruction Awareness and You information, available at: http://www.purdue.edu/securepurdue/datadestruction/
    6. Student Services Technology Media Disposal Service Offering: http://www.purdue.edu/SSTA/workstationtechnology/services/mediadisposal.php
    7. The federal government provides the U.S. Department of Defense 5220.22M Cleaning and Sanitizing standard, available at: http://www.dss.mil/isec/nispom.htm
    8. NIST Special Publication 800-88, Guidelines for Media Sanitization. Issued September 2006. Available at: http://csrc.nist.gov/publications/nistpubs/#sp800-88
    9. ISO/IEC 17799:2005(E), Code of Practice for Information Security Management, Control 10.7.2 (Disposal of Media).

Electronic Data Disposal Verification Form

Document Destruction Operating Plan

Issued 9/25/2006, revised 10/12/2011 (to update policy references), from Purdue University Security Officer's Group and IT Security & Privacy. Questions about these guidelines can be addressed to itap-securityhelp@purdue.edu

Revised November 21, 2011 to update URLs.