SlideShare a Scribd company logo
An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
Appropriate Disposal of Data & Computers Sensitive Information should be never placed in the regular trash!
Appropriate Disposal Methods Section: Appropriate Disposal  Hard copy (paper) materials must be properly shredded or placed in a secured bin for shredding later. Laptops and desktops may need the hard drive removed and physically destroyed. Diskettes, tapes and hard drives must be physically destroyed or “wiped” using approved procedures.  CD-ROMs and DVDs must be rendered unreadable by shredding or breaking. Contact the Information Security Office or refer to the UNC-Chapel Hill Campus Standards for Electronic Media Disposal  (http://help.unc.edu/6343) for more information.
Learning Point # 16 Section: Appropriate Disposal  You find a CD ROM in your desk drawer. When you put it in your computer, it gives you an error, indicating that the disk unreadable. You may put the CD ROM into the regular trash Right? Wrong! The CD ROM could contain Sensitive Information that may be retrieved by a criminal. Any electronic media or regular paper waste containing possible Sensitive Information should never end up in the regular trash. Media containing Sensitive Information must be shredded or otherwise permanently made unreadable.

More Related Content

Similar to Security Awareness 9-10-09 v5 Appropriate Disposal

Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
Catherine MacAllister
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
university of education,Lahore
 
Form 1 Term 1 Week 11.2
Form 1   Term 1  Week 11.2Form 1   Term 1  Week 11.2
Form 1 Term 1 Week 11.2
Harley Greenberg
 
Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
optokunal1
 
Technology Tips for Students-New Student Tech Camp
Technology Tips for Students-New Student Tech CampTechnology Tips for Students-New Student Tech Camp
Technology Tips for Students-New Student Tech Camp
Stephanie Moore
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
Ledjit
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
willemvandrunen
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
Physical media damage is data recoverable from my hard drive
Physical media damage  is data recoverable from my hard drivePhysical media damage  is data recoverable from my hard drive
Physical media damage is data recoverable from my hard drive
Taking IT Mobile Data Solutions
 
Page 1 of 17 IN THE KANSAS DISTRICT COURT 15th.docx
  Page 1 of 17  IN THE KANSAS DISTRICT COURT 15th.docx  Page 1 of 17  IN THE KANSAS DISTRICT COURT 15th.docx
Page 1 of 17 IN THE KANSAS DISTRICT COURT 15th.docx
aryan532920
 
HOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCEHOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCE
PrinceFullyL
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
STO STRATEGY
 
Data Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact LevelData Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact Level
ICEXLimited
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
Business Copier Data Security
Business Copier Data SecurityBusiness Copier Data Security
Business Copier Data Security
- Mark - Fullbright
 
bus43-copier-data-security
bus43-copier-data-securitybus43-copier-data-security
bus43-copier-data-security
Ed Worthington
 

Similar to Security Awareness 9-10-09 v5 Appropriate Disposal (20)

Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
Form 1 Term 1 Week 11.2
Form 1   Term 1  Week 11.2Form 1   Term 1  Week 11.2
Form 1 Term 1 Week 11.2
 
Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
 
Technology Tips for Students-New Student Tech Camp
Technology Tips for Students-New Student Tech CampTechnology Tips for Students-New Student Tech Camp
Technology Tips for Students-New Student Tech Camp
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Physical media damage is data recoverable from my hard drive
Physical media damage  is data recoverable from my hard drivePhysical media damage  is data recoverable from my hard drive
Physical media damage is data recoverable from my hard drive
 
Page 1 of 17 IN THE KANSAS DISTRICT COURT 15th.docx
  Page 1 of 17  IN THE KANSAS DISTRICT COURT 15th.docx  Page 1 of 17  IN THE KANSAS DISTRICT COURT 15th.docx
Page 1 of 17 IN THE KANSAS DISTRICT COURT 15th.docx
 
HOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCEHOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCE
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
Data Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact LevelData Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact Level
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Business Copier Data Security
Business Copier Data SecurityBusiness Copier Data Security
Business Copier Data Security
 
bus43-copier-data-security
bus43-copier-data-securitybus43-copier-data-security
bus43-copier-data-security
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 

Security Awareness 9-10-09 v5 Appropriate Disposal

  • 1. An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
  • 2. Appropriate Disposal of Data & Computers Sensitive Information should be never placed in the regular trash!
  • 3. Appropriate Disposal Methods Section: Appropriate Disposal Hard copy (paper) materials must be properly shredded or placed in a secured bin for shredding later. Laptops and desktops may need the hard drive removed and physically destroyed. Diskettes, tapes and hard drives must be physically destroyed or “wiped” using approved procedures. CD-ROMs and DVDs must be rendered unreadable by shredding or breaking. Contact the Information Security Office or refer to the UNC-Chapel Hill Campus Standards for Electronic Media Disposal (http://help.unc.edu/6343) for more information.
  • 4. Learning Point # 16 Section: Appropriate Disposal You find a CD ROM in your desk drawer. When you put it in your computer, it gives you an error, indicating that the disk unreadable. You may put the CD ROM into the regular trash Right? Wrong! The CD ROM could contain Sensitive Information that may be retrieved by a criminal. Any electronic media or regular paper waste containing possible Sensitive Information should never end up in the regular trash. Media containing Sensitive Information must be shredded or otherwise permanently made unreadable.