This document discusses techniques for confidential data storage and deletion. It describes encryption as a key method for confidential storage, focusing on the Advanced Encryption Standard (AES) algorithm. Hardware-based confidential storage techniques like secure flash drives and encrypted hard drives are also covered. For deletion, the document outlines physical destruction of storage media, data overwriting methods, and encrypting data then erasing the encryption key. The goal is to ensure data can only be read by authorized persons throughout its entire lifecycle.