How to destroy a hard drive? Security Tips
Follow the security tips below as a general precaution when dealing with sensitive or confidential data.
DO NOT DISCARD OR DONATE UNUSED HARD DISK DRIVES, REMOVABLE DRIVES OR FLOPPIES WITHOUT REMOVING CONFIDENTIAL DATA!
Data recovery software can be used to retrieve private information from recording media that has been erased using the Windows Delete command. Destroy devices physically or use software like Active@ Eraser to clean it up before discarding or donating to anyone.
DO NOT TRUST YOUR CONFIDENTIAL OR SENSITIVE DOCUMENTS TO THE WINDOWS RECYCLE BIN OR STANDARD DELETE COMMAND!
Deleted documents can be easily restored from the Recycle Bin, even after you have emptied it. Use software like Active@ Eraser or ZDelete (www.zdelete.com) to ensure that important documents are erased permanently from the media storage.
PERFORM A REGULAR CLEAN-UP OF YOUR CONFIDENTIAL INTERNET AND LOCAL ACTIVITIES FILES!
Unwanted hackers can follow your trail through all activities on the Internet through the saved list of visited web sites. Similarly, all local activities on your hard drive are recorded in a list of recently opened files. Maintain your privacy by performing complete cleanup regularly.