![]() ![]() If you get an Image is too big message, you’ll need to use a larger USB device or choose a smaller ISO image. Use this chart below to determine which data sanitization technique to use on a Mason-owned electronic device. Determine Which Data Sanitization Technique to Use More detailed steps are provided in the following sections.įigure 1: Data Sanitization Process IV. This workflow below provides a graphical representation of the data sanitization procedure. Applies the sticker on the electronic device, closest to the Asset TagIII.Completes the bottom half of the Certificates of Data Destruction Sticker.Performs verification that data have been successfully removed from Mason-owned electronic device.Completes the top half of the Certificates of Data Destruction Sticker.Performs recommended data sanitization technique on Mason-owned electronic device. ![]() The following roles and responsibilities have been identified for this procedure:ĭepartmental Staff #1 (or System Administrator) This document only applies to all university departments and offices at all George Mason University locations that are planning to release for reuse Mason-owned computers. This procedure provides instructions for permanently removing data from Mason-owned electronic devices, verifying their sanitization, and documenting the process. for interdepartmental transfers or return for replacement). This standard requires that information system media (both digital and non-digital) must be sanitized or destroyed prior to its disposal (e.g., surplus electronic devices deemed for destruction) or release for reuse (e.g. ![]() George Mason University Policy Number 1311, Information Technology Security Program, mandates compliance with the Information Technology Security Standard.
0 Comments
Leave a Reply. |