Sydney:
You are going to recycle your laptop or your phone, so you remove all your photos and personal files. Maybe you reset the device in factory settings.
You probably feel that your sensitive data is now safe. But there is more to be done there: hackers may still be able to get passwords, documents or bank details even after a reset.
In fact, 90% second-hand laptop, hard drive and memory card still still prevent Recovery data. This indicates that many consumers fail to wipe their equipment properly before resale or disposal.
But there are some simple steps that you can take to keep your personal information safe while recycling responsibly.
Data security risk
Left or re -prepared electronics often maintain sensitive individual and corporate information. Just removing files or resetting the factory may not be enough. Data can often occur easily Recovered Using special equipment. This oversite has given rise to worrying events of data leaks and violations.
For example, still 42% of used storage equipment sold on eBay vested Sensitive data, despite sellers, after methods of eradicating data. It included passport pictures, school records and corporate documents.
Another 2022 study found that improperly internet devices were erased Stored Private data, makes them unsafe for exploitation. European e-waste Ghana was also exported vested Classified corporate and government files to highlight security risks beyond personal identity theft.
A major wireless provider in the United States was safely failed Decamping storage deviceIt gives rise to data breeches affecting 14 million customers.
Similarly, in 2021 Realled unfairly Medical hard drives highlight more than 100,000 confidential patients.
Why standard factory resets are not enough
Many believe that resetting a factory completely eradicates its data. But this is not always the case.
Analysis of second hand mobile devices found that 35% still vested Recovery data after reset and resold. This completely exposes the risks of relying on the factory reset.
On those with old equipment or encryption, residual data can still be recovered using a forensic tool.
Iphones use hardware encryption, leading to the resets more effective, while the Android device vary by the manufacturer. Practice for safe settlement
To protect your personal and organizational information, consider these measures before disposal of old equipment:
Wipe the figure
Individual users should use Data-layer software To safely eradicate your hard drive before selling or recycling the device.
However, for solid-state drives, traditional wipe methods may not be effective. This is because the solid-state drive stores the data using flash memory and algorithms, which prolonged the lifetime of the device by distributing data into the memory cells and can prevent direct overrighting.
Instead, enabling full-discrete encryption with software Bitlocker On windows or Filevault The data may help ensure that the data is unable to reset the device on Mac.
On Android phone, like apps Lamp Provide safe data-wipe options. Iphones already encryp the data by default, making the most effective way to eradicate the information to be fully reset.
Businesses handling customer data, financial records or intellectual property should follow data protection rules. They can use certified data-wipping tools that meet United States National Institute of Standards and Technology Guidelines For Media Sanitation or US Institute of Electrical and Electronics Engineers Standard for hygiene storageThese guidelines are globally recognized.
Many companies also choose third-party data destruction services to verify compliance and increase security.
Physical destruction
If the data is highly sensitive, then it is the safest option to destroy the physical storage medium (such as hard drive). General Methods Degaussing (using a strong magnetic field), credited, disintegration, melting and drilling.
However, some of these techniques can be dangerous if not handled by professionals. They make a hard drive or device unsuitable for resale and instead it needs to be taken to the waste recovery center to recover rare earth metal components.
Certified recycling services
Use iconic e-waste recycles that follow the data destruction protocol to ensure that your information does not fall into the wrong hands. For look certificate Such as R2, e-sequels, or AS/NZS 5377, which ensure compliance with industry safety standards. One Online database The sustainable electronics organization of R2-certified facilities worldwide can be run by Seri.
Safe sales and donation practices
Before selling or donating equipment, wipe a completely data. Be cautious to equipment connected to cloud accounts, and remove all personal information to prevent unauthorized access. Resetting alone may not be enough.
Legal and regulatory ideas for businesses
There are strict data-security laws in various fields that impose legal and financial punishment for unfair disposal of sensitive data.
It is important for businesses to consider legal standards to handle and dispose of personal information in whatever field they are working in. Europe, United States, Australia or somewhere else.
Before recycling or selling an old device, take the necessary steps to ensure that your data is completely erased. Identity theft, financial fraud and data violations are real risk. But they can be stopped with the right precautions.
Some additional steps can now protect your information and ensure responsible recycling.
(Author: Ritesh chughAssociate Professor, Information and Communication Technology, CQ University Australia,
(Disclaimer statement: Ritesh Chugh does not work, consults or receives for funding from any company or organization benefiting from this article, and will benefit from this article, and has not disclosed any relevant affiliation beyond their educational appointment.)
This article has been reinstated Conversation Under a Creative Commons License. read the Original article,
(Except for the headline, the story has not been edited by NDTV employees and is published by a syndicated feed.)