Access Keys:
Skip to content (Access Key - 0)

Information Retention and Deletion Landing Page

On this page:

Overview

One of the easiest ways to avoid exposing information you don't need anymore, including administrative and research data, is to destroy it.

For moderate and high risk information, observe applicable data retention policies upon project completion. Securely delete the information by means that make it impossible to reconstruct the records. Also destroy devices that contained high risk data in ways that make it impossible to recover.

If you must retain a copy of moderate or high information, ensure that it remains secure.

Electronic Information

Physical Data

See Also

Have Questions or Still Need Help?

IS&T Contributions

Documentation and information provided by IS&T staff members


Last Modified:

November 26, 2019

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
Labels:
infoprotect infoprotect Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
Feedback
This product/service is:
Easy to use
Average
Difficult to use

This article is:
Helpful
Inaccurate
Obsolete
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki