This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Data erasure" – news · newspapers · books · scholar · JSTOR(November 2022) (Learn how and when to remove this message)
Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of data sanitization that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by overwriting data onto all sectors of the device in an irreversible process. By overwriting the data on the storage device, the data is rendered irrecoverable.
Ideally, software designed for data erasure should:
Allow for selection of a specific standard, based on unique needs, and
Verify the overwriting method has been successful and removed data across the entire device.
Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to the data disk sectors and make the data recovery possible with common software tools. Unlike degaussing and physical destruction, which render the storage media unusable, data erasure removes all information while leaving the disk operable. New flash memory-based media implementations, such as solid-state drives or USB flash drives, can cause data erasure techniques to fail allowing remnant data to be recoverable.[1]
Software-based overwriting uses a software application to write a stream of zeros, ones or meaningless pseudorandom data onto all sectors of a hard disk drive. There are key differentiators between data erasure and other overwriting methods, which can leave data intact and raise the risk of data breach, identity theft or failure to achieve regulatory compliance. Many data eradication programs also provide multiple overwrites so that they support recognized government and industry standards, though a single-pass overwrite is widely considered to be sufficient for modern hard disk drives. Good software should provide verification of data removal, which is necessary for meeting certain standards.
To protect the data on lost or stolen media, some data erasure applications remotely destroy the data if the password is incorrectly entered. Data erasure tools can also target specific data on a disk for routine erasure, providing a hacking protection method that is less time-consuming than software encryption. Hardware/firmware encryption built into the drive itself or integrated controllers is a popular solution with no degradation in performance at all.
^Michael Wei; Laura M. Grupp; Frederick E. Spada; Steven Swanson. "Reliably Erasing Data From Flash-Based Solid State Drives" (PDF). FAST '11: 9th USENIX Conference on File and Storage Technologies. Retrieved 31 October 2013. For sanitizing entire disks, built-in sanitize commands are effective when implemented correctly, and software techniques work most, but not all, of the time. We found that none of the available software techniques for sanitizing individual files were effective.
Dataerasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of data sanitization that aims to completely...
Data sanitization involves the secure and permanent erasure of sensitive data from datasets and media to guarantee that no residual data can be recovered...
production data to test new software releases but should not be able to see sensitive financial data), outsourcing vendors, etc. Dataerasure is a method...
either by design (for fault tolerance), or as data remnants. Wear leveling can also defeat dataerasure, by relocating blocks between the time when they...
and the type of storage medium. Cryptography offers a way of making the erasure almost instantaneous. This method is called crypto-shredding. An example...
In coding theory, an erasure code is a forward error correction (FEC) code under the assumption of bit erasures (rather than bit errors), which transforms...
management Data subsetting Data security Data access DataerasureData privacy Data security Reference and master dataData integration Master data management...
Blancco Ltd. is an international data security company that specializes in dataerasure and computer reuse for corporations, governments and computer remarketing...
BleachBit is a free and open-source disk space cleaner, privacy manager, and computer system optimizer. The BleachBit source code is licensed under the...
information systems), and health care providers that transmit health care data in a way regulated by HIPAA. Per the requirements of Title II, the HHS has...
point Overwriting (cognitive memory), a type of interference with memory Dataerasure Overstrike Overtype This disambiguation page lists articles associated...
fragments, log files, system caches, application data, autocomplete form history, and various other data. The program includes a registry cleaner to locate...
implement a "right to be forgotten", but a more limited "right to [data] erasure". Variations on the concept a right to be forgotten have existed in...
restore of an electronic device to its original system state by erasing all data, settings, and applications that were previously stored on the device. This...
related to Nwipe. nwipe is a Linux computer program used to securely erase data. It is maintained by Martijn van Brummelen and is free software, released...
and cloning disks Secure deletion of free space or disk using a "zero out" data, a 7-pass DOD 5220-22 M standard, or a 35-pass Gutmann algorithm Adding or...
magnetic remanence to reconstruct the data. Erasure via degaussing may be accomplished in two ways: in AC erasure, the medium is degaussed by applying...
in March 2014. Article 17 provides that the data subject has the right to request erasure of personal data related to them on any one of a number of grounds...
the private mode by measuring the usage of shared computing resources. Dataerasure by the browser alone is found to be insufficient. For example, the records...
for an indefinite period of time before being overwritten by fresh data; erasure or shred techniques or software that work well on magnetic hard disk...
stored as computer files. BestCrypt also provides the complimentary dataerasure utility BCWipe. BestCrypt supports a wide variety of block cipher algorithms...
of an anti-forensics technique called AFsplitter, allowing for secure dataerasure and protection. Logical Volume Management can be used alongside LUKS...
sanitization to counter data remanence. The NISPOM actually covers the entire field of government–industrial security, of which data sanitization is a very...