If you're serious about security, start with multiple overwrites
, using software that conforms to Department of Defense specifications.
Using the direct overwrite
method, data is erased and rewritten during a single rotation, thereby resulting in a much faster data transfer rate.
But any PC user who is trying to purge his or her system of confidential data will want to completely overwrite
the sectors on the hard drive where the data resides.
Then, on command, it will overwrite
the older ones with the most recent--eliminating the danger of losing newer files.
Overwriting can be accomplished by various utility programs and commands that overwrite
files and free space on disks using alternating patterns of binary digits - 1s and 0s.
MO has the edge in over-writability: one million to 10 million overwrite
According to the CCEVS evaluation description FDRERASE is an application that runs under the IBM z/OS operating system on a mainframe computer that provides two CCEVS security validated disk erasure functions: ERASE and SECUREERASE that overwrite
DASD to ensure the risk of residual data remaining, if any, is appropriate with the risk of a person scavenging for that data.
When retiring IT assets, the optimum means for data destruction calls for no less than a three-time overwrite
of the hard drive, set forth by the Department of Defense (DoD).
And coupling Backup Data Encryption with our existing Overwrite
and Retention Policy functionality will broaden our customer's ability to comply with governmental regulations.
In addition, the controller includes a Write Protect Pin, which offers hardware protection for the data stored on the flash media from any unintentional data overwrites
, such as those commonly caused by system viruses.
Users can select fast 1-pass overwriting which overwrites
the memory blocks 1-time, medium strength 2-pass overwriting, or maximum strength 3-pass overwriting which meets the US Department of Defense DOD 5220-22M standard for secure data destruction on digital devices.