Access Keys:
Skip to content (Access Key - 0)

Information Retention and Deletion Landing Page

This page is under construction
The information provided below may not be complete or fully tested. Take care when following draft instructions.

On this page:


One of the easiest ways to avoid exposing information you don't need anymore is to destroy it.

For moderate and high risk information, observe applicable data retention policies upon project completion. Securely delete the information by means that make it impossible to reconstruct the records. Also destroy devices that contained high risk data in ways that make it impossible to recover.

If you must retain a copy of moderate or high information, ensure that it remains secure.

Electronic Information

Physical Data

See Also

Have Questions or Still Need Help?

IS&T Contributions

Documentation and information provided by IS&T staff members

Last Modified:

December 07, 2018

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
infoprotect infoprotect Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
This product/service is:
Easy to use
Difficult to use

This article is:
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki