Secure Media Disposal and Sanitization Procedure (OP-PROC-004)
1. Purpose
To provide step-by-step instructions for securely destroying or sanitizing different types of electronic media and physical documents to prevent the unauthorized disclosure of sensitive information.
2. Scope
This procedure applies to all company-owned and managed media, both electronic and physical, that contains company or customer data. This includes, but is not limited to, hard drives, solid-state drives (SSDs), USB drives, backup tapes, mobile devices, and paper documents.
3. Overview
This procedure outlines the mandated methods for disposing of or sanitizing media based on the classification level of the data it contains. It ensures that all sensitive information is rendered unrecoverable, in compliance with regulatory and industry standards.
4. Procedure
4.1 Electronic Media (Hard Drives, SSDs)
Step | Who | What |
---|---|---|
1 | Asset Custodian / IT Team | Identify media that is at the end of its lifecycle or is being decommissioned. |
2 | IT Team | For media containing Confidential or Restricted data, perform cryptographic erasure according to NIST SP 800-88 guidelines. |
3 | IT Team | For media that cannot be cryptographically erased, or for media containing the most sensitive Restricted data, physically destroy the media (e.g., shredding, degaussing). |
4 | IT Team | Document the disposal method, date, and personnel involved in the asset management system. If a third-party vendor is used, obtain and file a certificate of destruction. |
4.2 Paper Documents
Step | Who | What |
---|---|---|
1 | All Employees | Identify paper documents containing Confidential or Restricted information that are no longer required. |
2 | All Employees | Place documents in designated secure shredding bins provided throughout the office. |
3 | Approved Disposal Vendor | The approved vendor collects the contents of the shredding bins on a scheduled basis for secure, off-site destruction. |
4 | Facilities / IT Team | Obtain and file the certificate of destruction provided by the vendor. |
5. Standards Compliance
This section maps the procedure steps to specific controls from relevant information security standards.
Procedure Step(s) | Standard/Framework | Control Reference |
---|---|---|
4.1-4.2 | SOC 2 | CC6.5 |
4.1 | NIST | SP 800-88 |
4.1-4.2 | HIPAA Security Rule | 45 CFR § 164.310(d)(2)(i) |
6. Artifact(s)
A completed disposal record in the asset management system or a certificate of destruction from a third-party vendor.
7. Definitions
Cryptographic Erasure: The process of using encryption software to render targeted data on a storage device unreadable.
Degaussing: The process of reducing or eliminating an unwanted magnetic field (or data) stored on tape and disk media.
Physical Destruction: The process of rendering media unusable and its data unrecoverable by physically altering it (e.g., shredding, pulverizing).
8. Responsibilities
Role | Responsibility |
---|---|
IT Team | Responsible for the secure sanitization and destruction of electronic media and for managing disposal vendors. |
All Employees | Responsible for properly disposing of sensitive paper documents in the provided secure shred bins. |
Approved Disposal Vendor | Responsible for the secure collection and destruction of media and providing certificates of destruction. |