Media Sanitization Method
(Redirected from Data Elimination Method)
		
		
		
		Jump to navigation
		Jump to search
		A Media Sanitization Method is a procedural method that implements specific techniques to sanitize storage media.
- AKA: Data Sanitization Method, Media Erasure Method, Storage Sanitization Method, Media Wiping Method, Data Elimination Method.
 - Context:
- It can typically be tailored to Storage Media Types and technology characteristics.
 - It can typically implement Media Sanitization Techniques at various sanitization levels.
 - It can typically produce Sanitization Results meeting compliance standards.
 - It can often require Specialized Tools or vendor-specific commands.
 - It can often include Verification Procedures for sanitization effectiveness.
 - It can range from being a Generic Media Sanitization Method to being a Media-Specific Sanitization Method, depending on its media type specificity.
 - It can range from being a Software-Based Media Sanitization Method to being a Hardware-Based Media Sanitization Method, depending on its implementation approach.
 - It can range from being a Automated Media Sanitization Method to being a Manual Media Sanitization Method, depending on its execution mode.
 - It can range from being a Single-Pass Media Sanitization Method to being a Multi-Pass Media Sanitization Method, depending on its iteration count.
 - It can integrate with IT Asset Management Systems for disposal workflows.
 - It can support Regulatory Compliance through standardized procedures.
 - ...
 
 - Examples:
- Media-Specific Sanitization Methods, such as:
 - Universal Media Sanitization Methods, such as:
 - ...
 
 - Counter-Examples:
- Data Backup Method, which preserves rather than eliminates data.
 - Data Recovery Method, which retrieves rather than destroys data.
 - Data Migration Method, which transfers rather than sanitizes data.
 
 - See: Media Sanitization Process, Data Sanitization Technique, Media Sanitization Level, Storage Technology, NIST SP 800-88 Guideline, IT Security Method, Compliance Verification Method, Asset Disposal Process, Security Control Method, Risk Mitigation Method.