Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » ISO 27001 » ISO 27001 Data Destruction

ISO 27001 Data Destruction

ISO 27001 Data Destruction is an integral component of the overall framework that deals with data management when disposing of your organization’s sensitive and personal data.

The standard specifies that the data you collect should be erased when it is no longer serving its purpose and should never be recovered. Here is what goes into the destruction of physical documentation in ISO 27001:

  • Shredding  – Destruction of physical documents with the help of industrial shredders
  • Pulverization – Reducing physical data to tiny particles with the help of  (used for CDs, hard drives, flash drives), etc
  • Degaussing – Erasing data from physical media with the help of powerful magnet fields like tapes, hard drives, etc 

Destruction of digital data –

  • Secure erasure – Covering data with multiple random patterns so that it cannot be retrieved
  • Data wiping software – Using special software for clearing data on computing and storage devices
  • Cryptographic erasure – encrypting data and disposing of the decryption keys

The data destruction process includes sorting out the irrelevant information in terms of sensitivity and destroying it accordingly to ensure it is out of reach.

This ensures that these types of sensitive information do not fall into the wrong hands and evade data leaks, data breaches, or any misuse of personal data that could lead to reputation damage, financial losses, etc.

Therefore, having a proper data destruction practice in your organization can help protect customer privacy and maintain a strong security front.

Additional reading

GDPR Compliance

General Data Protection Regulation (GDPR) Compliance

Key Points Introduction The widespread adoption of cloud services has also brought challenges in the form of cybersecurity threats and multiple privacy regulations across different jurisdictions.  Pew Research Center found that 79% of respondents were concerned about how their personal data was gathered and processed by companies and the government.  Customers that rely on multiple…
Top 10 ISMS Software

Top 10 ISMS Software Ranked: Compare Features [Free ISMS Manual PDF]

As more businesses demand their vendors to demonstrate the capability to process and store sensitive data securely, service providers are increasingly using ISO certification as a key to unlock sales deals. While ISO compliance offers a competitive edge, building an ISMS is not easy—IT teams managing the process manually quickly drown in a sea of…
Challenges of Cyber Security

Top 5 Challenges of Cyber Security

By 2023, cyber security is estimated to cause a staggering USD 8 trillion in damages. It can be the third-largest economy after China and the US if it were measured as a nation. Cybersecurity is a fast-growing issue in today’s digital world. While it may not always be obvious, cyber attackers are constantly evolving their…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.