Access Keys:
Skip to content (Access Key - 0)

Information Retention and Deletion Landing Page

This page is under construction
The information provided below may not be complete or fully tested. Take care when following draft instructions.

On this page:

Overview

One of the easiest ways to avoid exposing information you don't need anymore is to destroy it.

For moderate and high risk information, observe applicable data retention policies upon project completion. Securely delete the information by means that make it impossible to reconstruct the records. Also destroy devices that contained high risk data in ways that make it impossible to recover.

If you must retain a copy of moderate or high information, ensure that it remains secure.

Electronic Information

Physical Data

See Also

Have Questions or Still Need Help?

IS&T Contributions

Documentation and information provided by IS&T staff members


Last Modified:

December 07, 2018

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
Labels:
infoprotect infoprotect Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
Feedback
This product/service is:
Easy to use
Average
Difficult to use

This article is:
Helpful
Inaccurate
Obsolete
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki