Audio & Video Sanitisation & Destruction Policy

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Audio & Video Sanitisation & Destruction Policy"

Transcription

1 Audio & Video Sanitisation & Destruction Policy The purpose of this document is to define the standards for destruction and sanitisation of security-classified media. The cope of this standard is all media, electronic and non-electronic, that hold or have held Telco Antennas Pty Ltd (Telco) security-classified information. Before sanitising or destroying media, always ensure that the requirements of the Public Records Act 2002 are met (for example, information is stored elsewhere if required to be retained). Classification of Hardware & Media 1) Hardware containing media must be classified at or above the classification of the media until the media is either removed or declassified. 2) Non-volatile media must be classified to the highest classification of information stored on the media since any previous reclassification. 3) Volatile media that has a continuous power supply must be classified to the highest classification of information stored on the media while the power is on. Volatile media that contains security-classified information may be treated as unclassified once the power is removed from the media. 4) Media declassification is an administrative decision to remove all classifications from the media. 5) Media that has been classified as In-Confidence, Protected or Highly Protected must not be declassified unless it has been destroyed in accordance with this policy. 6) Media reclassification is an administrative decision to change the classification of the media, in accordance with this policy. 7) Electronic media that has been classified as Protected or Highly Protected must not be reclassified to a lower classification unless it has been sanitised in accordance with section 4. 8) Where the new classification of the electronic media will be equal to or higher than the previous classification, the media should undergo at least a basic form of sanitisation. Basic forms of sanitisation include formatting magnetic media and clearing Erasable Programmable Read Only Memory (EPROM).

2 Media Sanitisation 1) Media sanitisation is the process of erasing or overwriting data stored on electronic media. 2) All users must use an approved method, as described within this media sanitisation section, whenever the electronic media is reclassified from a higher classification to a lower classification. 3) Where the new classification of the electronic media will be equal to or higher than the previous classification, the media should undergo at least a basic form of sanitisation. Basic forms of sanitisation include formatting magnetic media and clearing Erasable Programmable ROM. 4) Media that has been classified as In-Confidence, Protected or Highly Protected must not be declassified unless it has been destroyed in accordance with this policy. 5) The following media types cannot be sanitised and must be destroyed prior to disposal if they contain or may have contained security-classified information: a. Photographs b. Optical disks, including CD s and DVD s and all variations c. Programmable Read-Only Memory (PROM) d. Read-Only Memory (ROM) 6) Table below describes approved methods for sanitising electronic media classified as In-Confidence, Protected and Highly Protected. Electronic Media Type Magnetic media. Erasable non-volatile semi-conductor memory. Erasable Programmable ROM (EPROM), Electrically Erasable PROM (EEPROM) Flash cards, Digital cameras, Digital video cameras. Electrostatic memory devices within printers and photocopiers. Laser printer cartridges, Photocopier drums. Sanitisation Method Use a degausser of sufficient field strength for the coercivity level of the media to be sanitised. Erase as per the manufacturer s specification but repeat the process three times. Print at least three pages of unclassified text on each colour cartridge within the device. Note: The text should not include any blank spaces or solid coloured areas and the print should cover the page.

3 Video screens. Visually inspect the screen by turning up the brightness to the maximum to determine that no security-classified information has been etched into the surface. If information is present, destroy the screen in accordance with occupational workplace health and safety standards. 7) If the media is to be reclassified to a higher classification, then format the media but do not use a quick format method. If the media is to be reclassified to a lower classification then: a. Overwrite the entire media with C, where C = a character/bit pattern, for example b. Verify that all areas of the media have been overwritten with C. c. Overwrite the entire media with -C, where -C = the bit-wise complement/inverse of C, for example if C = then -C = d. Verify that all areas of the media have been overwritten with -C. e. If the Highly Protected media to be declassified, repeat steps a to d and then go to f. f. Overwrite the entire media with random data. Important: If there are any errors with the above procedure, such as defective sectors, do not proceed with overwriting, as it will be ineffective. In these cases the media should be destroyed. Note: This procedure would normally be achieved using commercial software. Media Destruction 1) Media destruction is the process of physically damaging the media with the objective of making the data stored on it inaccessible. 2) All unsanitised security-classified media must be destroyed before disposal using an approved method, as described within this media destruction section. Reasons for not sanitising media include: a. No approved sanitisation method exists, b. A risk assessment identifies destruction as the preferred treatment, c. The sanitisation method cannot be applied due to defective hardware, or d. The cost of sanitising the media outweighs the benefits. See: Disposal Process.

4 3) Table below describes the minimum approved methods for destruction of securityclassified media. Paper. Media Type Volatile semi-conductor memory. Non-volatile semi-conductor memory. Electrostatic memory devices within printers and photocopiers. Laser printer cartridges, Photocopier drums. Magnetic and optical media. Floppy disks, Hard disks, Tapes, CDs. Destruction Method Shredding shred using a crosscut shredder that reduces waste to a particle size of 2.3mm x 25mm or less (B Class Shredder). Pulping pulped paper is reduced to its constituent fibres. If carrier out correctly, it can be a most secure method of destruction. Pulped paper is usually recycled. Burning burning of records should only be done if there is no environmentally friendly method of destruction available. Records should be burned in accordance with any environmental guidelines and local burning restrictions, in a industrial facility. No destruction required once all power supplies, including batteries, are removed. Smash. Not required. Cut, shred or smash. Magnetic media may also be sanitised in accordance with this policy.

5 Disposing of Hardware 1) The process in below table should be followed when disposing of hardware. 2) Where electronic media cannot effectively be accessed due to faults in the hardware or the media itself, users must: a. Repair the equipment before sanitisation, b. Maintain the media at its highest classification, or c. Destroy the media. See: Media Destruction. Step Action 1 Does the hardware contain any media? If yes, then go to step 2. If not, then go to stop 7. 2 Determine whether the media should be either sanitised or destroyed, and the most appropriate method of doing so. Factors to be considered include: All media containing data, whether classified or not, should be sanitised or destroyed. Is Telco is disposing of non-telco media or Telco media with non- Telco data on it, then the media should be sanitised or destroyed. Does an approved sanitisation procedure exist for the specific media involved? What are the relative costs of sanitising versus destroying (and replacing where necessary) the media. 3 Seek approval for the chosen sanitisation or destruction process from the relevant department manager. Note: For frequently used processes, this approval may be in the form of an authorised Standard Operating Procedure (SOP). 4 Apply the agreed sanitisation or destruction process to the media. 5 Determine if the media has been satisfactorily sanitised or destroyed. If yes, go to step 6. If no, return to step 2. 6 Seek approval for declassification in accordance with Security Classification System. Note: For frequently used processes, this approval may be in the form of an authorised Standard Operating Procedure (SOP). 7 Remove or obliterate all labels indicating the higher classification, code words, caveats and owner. 8 Update any relevant documentation and registers. 9 Dispose of the hardware.

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised: NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance

More information

Disposal & Destruction of Sensitive Data

Disposal & Destruction of Sensitive Data Disposal & Destruction of Sensitive Data Contents 1 Overview of Data Media Types 1.1 Non-Volatile Magnetic: Hard Disk Drives 1.2 Write Once Optical: CDROM and DVD- 1.3 Write Many Optical: CD-RW and DVD-RW

More information

SRO Guideline SANITIZING DIGITAL MEDIA AND DEVICES

SRO Guideline SANITIZING DIGITAL MEDIA AND DEVICES Department of Culture and the Arts Government of Western Australia State Records Office of Western Australia SRO Guideline SANITIZING DIGITAL MEDIA AND DEVICES An Information Management Guideline for State

More information

IT Operations Disposal of Media

IT Operations Disposal of Media 1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-

More information

Media Disposition and Sanitation Procedure

Media Disposition and Sanitation Procedure Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...

More information

Unit A451: Computer systems and programming. Section 2: Computing Hardware 5/5: Secondary Storage

Unit A451: Computer systems and programming. Section 2: Computing Hardware 5/5: Secondary Storage Unit A451: Computer systems and programming Section 2: Computing Hardware 5/5: Secondary Storage Section Objectives Candidates should be able to: (a) explain the need for secondary storage (b) describe

More information

Student Guide. informationsecurity.training@dss.mil

Student Guide. informationsecurity.training@dss.mil Short: Disposal and Destruction of Classified Information Objective POC Estimated completion time Identify the who, what, when, why, and how concerning disposal and destruction of classified information

More information

Bedford County Tennessee

Bedford County Tennessee Bedford County Tennessee Digital Media and Hardware Disposal Policy Date: 08.31.11 Approved By: Chris White Policy Number: 1 P age 1.0 INTRODUCTION 3 1.1 Authority. 3 1.2 Purpose.. 3 1.3 Scope 3 1.4 Background.

More information

lesson 9 Types of Storage Devices

lesson 9 Types of Storage Devices lesson 9 Types of Storage Devices This lesson includes the following sections: Categorizing Storage Devices Magnetic Storage Devices Optical Storage Devices Categorizing Storage Devices Storage devices

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

Title: Electronic Media Destruction Policy Effective Date: 28 April 2015. Electronic Media Disposal Policy Policy Number 091

Title: Electronic Media Destruction Policy Effective Date: 28 April 2015. Electronic Media Disposal Policy Policy Number 091 Document Control Title Electronic Media Disposal Number 091 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date of Production

More information

SIT153 Introduction to Computation

SIT153 Introduction to Computation SIT153 Introduction to Computation Lecture 4-1 Computer Organisation I chapter 5 6 April 2016 Admin matters (1) for the next 2 weeks Study units: (4) Computer organisation (5) Networks Week Date Day Activity

More information

McGraw-Hill Technology Education McGraw-Hill Technology Education

McGraw-Hill Technology Education McGraw-Hill Technology Education McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

More information

TECHNICAL USER MANUAL

TECHNICAL USER MANUAL TECHNICAL USER MANUAL For Blancco Erasure Software v5.7.0.1 www.blancco.com ABSTRACT This document is based on "Guidelines for Preparation of User Manual v2.0", issued by the National Security Authority

More information

Destruction and Disposal of Sensitive Data

Destruction and Disposal of Sensitive Data Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives

More information

KEMENTERIAN PELAJARAN MALAYSIA COMPUTER PARTS & COMPONENTS INPUT DEVICES OUTPUT DEVICES STORAGE DEVICES PUSAT PERKEMBANGAN KURIKULUM

KEMENTERIAN PELAJARAN MALAYSIA COMPUTER PARTS & COMPONENTS INPUT DEVICES OUTPUT DEVICES STORAGE DEVICES PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA Self Access Learning Module ICT Literacy for Secondary School Programme Computer Hardware COMPUTER PARTS & COMPONENTS INPUT DEVICES OUTPUT DEVICES STORAGE DEVICES PUSAT PERKEMBANGAN

More information

Types Of Storage Device

Types Of Storage Device Types Of Storage Device by AA A POG D EE SRM U Outline Categorizing Storage Devices Magnetic Storage Devices Optical Storage Devices Categorizing Storage Devices Storage devices hold data, even when the

More information

Learning Objectives. Explain the difference between storage systems and memory. Name several general properties of storage systems.

Learning Objectives. Explain the difference between storage systems and memory. Name several general properties of storage systems. Chapter 4 Storage Learning Objectives Explain the difference between storage systems and memory. Name several general properties of storage systems. Identify the two primary types of magnetic disk systems

More information

Chapter NO.4 Storage Devices

Chapter NO.4 Storage Devices Chapter NO.4 Storage Devices 4.01 Complete the following statements. i) A byte is a group of bits. ii) is a volatile memory. iii) Storage capacity of a sector on floppy is a multiple of bytes. iv) SIMMs

More information

MEDIA SANITIZATION MANUAL

MEDIA SANITIZATION MANUAL MANUAL DOE M 205.1-6 Approved: Admin Chg 1: 9-1-09 Admin Chg 2: 12-22-09 MEDIA SANITIZATION MANUAL U.S. DEPARTMENT OF ENERGY Office of the Chief Information Officer AVAILABLE ONLINE AT: www.directives.doe.gov

More information

1 PERSONAL COMPUTERS

1 PERSONAL COMPUTERS PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers

More information

Tech Application Chapter 3 STUDY GUIDE

Tech Application Chapter 3 STUDY GUIDE Name: Class: Date: Tech Application Chapter 3 STUDY GUIDE Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. This type of device retains data

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services Destruction and Recycling Services An ISO 9002-compliant company Audited 100% data destruction and green recycling 2014 Commercial Catalog Edition 2014 www.cdrominc.com CD Rom, Inc. Table of Contents About

More information

Defense Security Service. Terminator VIII. How to Destroy Your Classified Materials. Prepared by

Defense Security Service. Terminator VIII. How to Destroy Your Classified Materials. Prepared by Defense Security Service Terminator VIII How to Destroy Your Classified Materials Prepared by Information Security Team Department of Defense Security Institute Richmond, Virginia September 1992 Destruction

More information

Policy on Secure Disposal of IT Equipment and Information. 1. Information Security Working Group 2. CIO

Policy on Secure Disposal of IT Equipment and Information. 1. Information Security Working Group 2. CIO Policy on Secure Disposal of IT Equipment and Information v1.0 Organisation Title Creator Approvals Required Oxford Brookes University Policy on Secure Disposal of IT Equipment and Information Information

More information

Storage. Block Diagram of the Computer System showing the Main & Backing Storage

Storage. Block Diagram of the Computer System showing the Main & Backing Storage Introduction Storage All computer systems need to store data. This is done: Temporarily while a program is running. This is stored in main memory. Long-term to preserve programs and data while not in use.

More information

NHS Information Governance:

NHS Information Governance: NHS Information Governance: Information Risk Management Guidance: Maintenance and Secure Disposal of Digital Printers, Copiers and Multi Function Devices Department of Health Informatics Directorate July

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

Chapter 8 Memory Units

Chapter 8 Memory Units Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical

More information

BASIC COMPUTER ORGANISATION. Basic Computer Model and different units of Computer

BASIC COMPUTER ORGANISATION. Basic Computer Model and different units of Computer BASIC COMPUTER ORGANISATION Basic Computer Model and different units of Computer The model of a computer can be described by four basic units in high level abstraction. These basic units are: Central Processor

More information

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System? Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers

More information

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer/Data Storage Technology

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Computer/Data Storage Technology Lecture Outline Computer/Data Storage Technology Objectives Describe the distinguishing characteristics of primary and secondary storage Describe the devices used to implement primary storage Compare secondary

More information

Unit - II Important internal devices of CPU

Unit - II Important internal devices of CPU Unit - II Important internal devices of CPU By completing this module, you will be able to understand and learn the following Important parts of CPU Mother Board and its components Memory RAM & ROM Sound

More information

Main Memory & Backing Store. Main memory backing storage devices

Main Memory & Backing Store. Main memory backing storage devices Main Memory & Backing Store Main memory backing storage devices 1 Introduction computers store programs & data in two different ways: nmain memory ntemporarily stores programs & data that are being processed

More information

UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006

UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006 This page intentionally left blank. ii July 2006 Foreword The Clearing and Declassifying Electronic Data Storage Devices (ITSG-06) is an publication, issued under the authority of the Chief, Communications

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

Computer Basics Worksheet

Computer Basics Worksheet Computer Basics Worksheet Name: Directions: Complete this worksheet by filling in the blanks or as directed by your instructor. To learn about each section click and visit the Unit 1 page under Resources.

More information

With respect to the way of data access we can classify memories as:

With respect to the way of data access we can classify memories as: Memory Classification With respect to the way of data access we can classify memories as: - random access memories (RAM), - sequentially accessible memory (SAM), - direct access memory (DAM), - contents

More information

Storage Devices. Backing storage is usually non-volatile, so it is generally used to store data for a long time.

Storage Devices. Backing storage is usually non-volatile, so it is generally used to store data for a long time. STORAGE DEVICES Main Memory Main memory (sometimes known as internal memory or primary memory) is another name for RAM (and ROM). The function of Main memory is to hold data and programs which are currently

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

Sean O Leary Communications Director DestructData, Inc. February 1, 2011

Sean O Leary Communications Director DestructData, Inc. February 1, 2011 Working Summary NIST Special Publication 800-88 Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology Sean O Leary Communications Director DestructData,

More information

Introduction to Computer System

Introduction to Computer System Representation of Basic Information Introduction to Computer System The basic functional units of computer are made of electronics circuit and it works with electrical signal. We provide input to the computer

More information

State of Florida RECORDS MANAGEMENT SELF-EVALUATION GUIDE. Published September 1999. Division of Library and Information Services

State of Florida RECORDS MANAGEMENT SELF-EVALUATION GUIDE. Published September 1999. Division of Library and Information Services State of Florida RECORDS MANAGEMENT SELF-EVALUATION GUIDE Published September 1999 Division of Library and Information Services Bureau of Archives and Records Management The Capitol Tallahassee, Florida

More information

Handout 17. by Dr Sheikh Sharif Iqbal. Memory Unit and Read Only Memories

Handout 17. by Dr Sheikh Sharif Iqbal. Memory Unit and Read Only Memories Handout 17 by Dr Sheikh Sharif Iqbal Memory Unit and Read Only Memories Objective: - To discuss different types of memories used in 80x86 systems for storing digital information. - To learn the electronic

More information

CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices

CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 5 Storage Devices 1 1. Computer Data Storage 2. Types of Storage 3. Storage Device Features 4. Other Examples of Storage Device 2 Storage Devices A storage device

More information

CS101: Introduction to Computing

CS101: Introduction to Computing Lecture 7: What is a Computer? Device that accepts input, process, and stores data, and gives output Understanding Computer Hardware Device that can execute specific set of instructions in a well-defined

More information

5 Computer Organization

5 Computer Organization 5 Computer Organization 5.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, students should be able to: List the three subsystems of a computer. Describe

More information

Polk County Wisconsin DESTRUCTION/DISPOSAL OF CLIENT HEALTH INFORMATION

Polk County Wisconsin DESTRUCTION/DISPOSAL OF CLIENT HEALTH INFORMATION Polk County Wisconsin DESTRUCTION/DISPOSAL OF CLIENT HEALTH INFORMATION Policy 601.I Effective Date: April 15, 2003 Current Revision Date: Policy It is the policy of Polk County to ensure the privacy and

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy

Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy Page 1 of 8 Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy EXECUTIVE SUMMARY Key Messages

More information

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V2.0 NOVEMBER 2014 Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V 2.0 NOVEMBER

More information

STANDARD 3-8 WORKING DAYS

STANDARD 3-8 WORKING DAYS TecLeo DATARECOVERYLAB HELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 Price List DATA RECOVERY Deloud (Pty) Ltd Data Recovery

More information

Information Destruction Solutions

Information Destruction Solutions Information Destruction Solutions Products Guide PAPER SHREDDERS HARD DRIVE DEGAUSSERS HARD DRIVE DESTROYERS OPTICAL MEDIA DESTROYERS MIXED MEDIA DESTROYERS SECURE WASTE CONTAINERS Paper Shredders While

More information

Graphic Communication

Graphic Communication Graphic Communication St Pauls RC Academy Computer Hardware CDT Department Hardware Devices Hardware is the name given to any piece of equipment that is used along side a computer (including the main computer

More information

HARDWARE INPUT DEVICES

HARDWARE INPUT DEVICES There are five categories of Hardware: HARDWARE 1) Input Devices 2) Output Devices 3) Memory Devices (Primary Storage) 4) Storage Devices (Secondary Storage) 5) Processor (Central Processing Unit) INPUT

More information

Outline - Microprocessors

Outline - Microprocessors Outline - Microprocessors General Concepts Memory Bus Structure Central Processing Unit Registers Instruction Set Clock Architecture Von Neuman vs. Harvard CISC vs. RISC General e Concepts - Computer Hardware

More information

5 Computer Organization

5 Computer Organization 5 Computer Organization 5.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List the three subsystems of a computer. Describe the

More information

Primary Memory. Input Units CPU (Central Processing Unit)

Primary Memory. Input Units CPU (Central Processing Unit) Basic Concepts of Computer Hardware Primary Memory Input Units CPU (Central Processing Unit) Output Units This model of the typical digital computer is often called the von Neuman compute Programs and

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 6 Computer Hardware Basics Microprocessors A microprocessor is an integrated circuit designed to process instructions. It is the most

More information

Computer Organization

Computer Organization 5 Computer Organization 5.1 Foundations of Computer Science & Cengage Learning Objectives After studying this chapter, the student should be able to: List the three subsystems of a computer. Describe the

More information

Current Research Strategies for Digital Preservation

Current Research Strategies for Digital Preservation Media Choices for the Preservation of Digital Documents Introduction On any given desk, stacks of diskettes and CDs compete for space with the piles of paper. Among paper records there is certainty about

More information

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit

More information

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory 1 1. Memory Organisation 2 Random access model A memory-, a data byte, or a word, or a double

More information

About this Tool Information Security for Residents...

About this Tool Information Security for Residents... About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information

More information

Digital Data Destruction D3 Services, Inc.

Digital Data Destruction D3 Services, Inc. Audited 100% Data Destruction and Green Recycling An ISO 9002 Compliant Company GSA Catalog Nov 2009 Edition 9-03 General Service Administration Federal Supply Catalog Digital Data Destruction Services,

More information

VAIO Notebook Computer Batteries - Notes on Use

VAIO Notebook Computer Batteries - Notes on Use VAIO Notebook Computer Batteries - Notes on Use VAIO notebook computer battery run time (page 1) Some factors affecting battery run time (page 1) Saving battery power when not using your computer (page

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public DSM Supplementary Document Annex I to DSM Part 2:30 Classificvation and Protection of Official Information - Disposal and Destruction of Protectively Marked Information and Assets Version 7 ation date

More information

COMPUTERS AND LOGIC CIRCUITS

COMPUTERS AND LOGIC CIRCUITS COMPUTERS AND LOGIC CIRCUITS Dealing with computers can seem overwhelming for those who are accustomed to working with mechanical systems. Since we cannot actually see what is going on inside the computer

More information

HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES

HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES Standards for Victoria Police Law Enforcement Data Security (Standard 22) November 2008 Commissioner for Law Enforcement Data Security Acknowledgement

More information

A comprehensive tape storage solution that meets the need for back-up, archive, disaster recovery and application storage, while reducing your cost

A comprehensive tape storage solution that meets the need for back-up, archive, disaster recovery and application storage, while reducing your cost A comprehensive tape storage solution that meets the need for back-up, archive, disaster recovery and application storage, while reducing your cost of ownership. What is datassure TM? From simple labelling

More information

Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places

Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication

More information

ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS

ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS TecLeo DATARECOVERYLAB H ELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 DATA RECOVERY Data Recovery & Data Destruction Price

More information

Data Destruction Demystified:

Data Destruction Demystified: 010101001011100100110011000101011 001010010010101000101101011010101 010011011010001101101101100101010 010010110101001001101101101110110 001101011001000101100110110110101 010010110110110100010110100101001

More information

EMP-20 Device Programmer

EMP-20 Device Programmer EMP-20 Device Programmer Programming Information for the Needham s Electronics EMP-20 Device Programmer http:// www.needhams.com Copyright 2005 Linden H. McClure, Ph.D. 1 Overview A device programmer gives

More information

Week One Lecture Note 1.0 INTRODUCTION TO COMPUTER 1.1 WHAT IS COMPUTER?

Week One Lecture Note 1.0 INTRODUCTION TO COMPUTER 1.1 WHAT IS COMPUTER? Week One Lecture Note 1.0 INTRODUCTION TO COMPUTER 1.1 WHAT IS COMPUTER? A Computer is a device or set of devices that work under the control of a stored program, automatically accepts and processes data

More information

CITY UNIVERSITY OF HONG KONG. Inventory and Ownership Standard

CITY UNIVERSITY OF HONG KONG. Inventory and Ownership Standard CITY UNIVERSITY OF HONG KONG Inventory and Ownership Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in September

More information

Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if you have questions! Lab #2 Today. Quiz #1 Tomorrow (Lectures 1-7)

Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if you have questions! Lab #2 Today. Quiz #1 Tomorrow (Lectures 1-7) Overview of Computer Science CSC 101 Summer 2011 Main Memory vs. Auxiliary Storage Lecture 7 July 14, 2011 Announcements Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if

More information

Lecture 2 Microcomputer Organization: Central Processing Unit:

Lecture 2 Microcomputer Organization: Central Processing Unit: Lecture 2 Microcomputer Organization: The basic components of a microcomputer are: 1) CPU 2) Program memory 3) Data memory 4) Output ports 5) Input ports 6) Clock generator. These components are shown

More information

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization TECHNICAL REFERENCE DOCUMENT Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization Recommendations Key Points: of the National Real world compliance

More information

Secondary Storage The McGraw-Hill Companies, Inc. All rights reserved.

Secondary Storage The McGraw-Hill Companies, Inc. All rights reserved. Distinguish between primary and secondary storage. Discuss the important characteristics of secondary storage, including media, capacity, storage devices, and access speed. Describe hard disk platters,

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components

More information

Module 1 Introduction to Information and Communication Technologies

Module 1 Introduction to Information and Communication Technologies Module 1 Introduction to Information and Communication Technologies Lesson 3 What are the Hardware Components of a Computer? UNESCO EIPICT Module 1. Lesson 3 1 Rationale The hardware components are the

More information

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O Chapter 3: Computer Hardware Components: CPU, Memory, and I/O What is the typical configuration of a computer sold today? The Computer Continuum 1-1 Computer Hardware Components In this chapter: How did

More information

Components of the System Unit

Components of the System Unit Components of the System Unit The System Unit A case that contains the electronic components of the computer used to process data. The System Unit The case of the system unit, or chassis, is made of metal

More information

Introduction To Computers: Hardware and Software

Introduction To Computers: Hardware and Software What Is Hardware? Introduction To Computers: Hardware and Software A computer is made up of hardware. Hardware is the physical components of a computer system e.g., a monitor, keyboard, mouse and the computer

More information

SECTION 3: STORAGE DEVICES AND MEDIA STORAGE : Introduction

SECTION 3: STORAGE DEVICES AND MEDIA STORAGE : Introduction SECTION 3: STORAGE DEVICES AND MEDIA STORAGE : Introduction All information systems need to store data. This may be done temporarily whilst inputs are processed to produce outputs or for much longer periods

More information

Memory Versus Storage How does volatility compare?

Memory Versus Storage How does volatility compare? Chapter 7 p. 7.2 Differentiate between and memory Identify various types of media and devices Explain how a floppy disk stores data Identify the advantages of using high-capacity disks Describe how a hard

More information

Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used.

Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used. Handling information based on the protective marking OFFICIAL INFORMATION MARKING Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective

More information

Chapter 02 discovering computers The components of system unit. Dr. Zeinab El Gazayerly

Chapter 02 discovering computers The components of system unit. Dr. Zeinab El Gazayerly Chapter 02 discovering computers The components of system unit Dr. Zeinab El Gazayerly Differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices Identify

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

9/23/2011. The box that contains the central electronic components of the computer: 2008 Prentice-Hall, Inc Prentice-Hall, Inc.

9/23/2011. The box that contains the central electronic components of the computer: 2008 Prentice-Hall, Inc Prentice-Hall, Inc. Computer Hardware 2008 Prentice-Hall, Inc. 1 THE SYSTEM UNIT 2008 Prentice-Hall, Inc. 2 The box that contains the central electronic components of the computer: CPU/RAM/ motherboard Expansion cards Power

More information

Introducing Hardware Chapter #1

Introducing Hardware Chapter #1 Introducing Hardware Chapter #1 Amy Hissom Key Terms 1. Advanced Configuration and Power Interface (ACPI) - a power management specification developed by Intel, Microsoft, and Toshiba. ACPI, which will

More information

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

MULTIPLE CHOICE FREE RESPONSE QUESTIONS MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.

More information

Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Christian Schindelhauer

Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Christian Schindelhauer Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Institut für Informatik Wintersemester 2007/08 Solid State Disks Motivation 2 10 5 1980 1985 1990 1995 2000 2005 2010 PRODUCTION

More information

Chapter 4 The Components of the System Unit

Chapter 4 The Components of the System Unit Chapter 4 The Components of the System Unit The System Unit Box-like case that contains computer s electronic components Sometimes called the chassis What are common components inside the system unit?

More information

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 I. POLICY STATEMENT Increasing amounts of electronic data are being transmitted and stored on computer systems and electronic media by virtually

More information

Introduction to Computers

Introduction to Computers Introduction to Computers Computer System A computer is a fast electronic device that processes the input data according to the instructions given by the user and provides the desired information as an

More information