Already on ArticleSlash?

Forgot your password? Sign Up

How to Prevent Private Data Theft

Lora Davis

Visitors: 73

Laptops and desktop computers become obsolete so at some point every business needs installs equipment and sends off their hard drives and other parts for Chicago computer recycling. If there is sensitive information the, most IT department will often use software to deleted files and directories on the drives. File deletion doesn't necessarily mean that sensitive information has safely vanished however; there is a data residue that can be recovered by reformatting some of the storage media where previously written data can be recovered; this informs the importance of hard drive shredding.

There is specialized software that can be used to undelete files that remain because operating systems don't delete a file and its data when the user requests for deletion; it removes the file's entry from the file system directory and keeps it in a holding area. The content remains on the storage medium until that space is needed for reuse. Depending on the security level involved it's best to use a service that specializes in physical hard drive shredding and getting rid of the small particles that are left over, guaranteeing that no one can recover the data. This is considered to be the most reliable method of data destruction.

There is another option that uses software to overwrite the storage media with new data if the media is undamaged and still writable. Common terms for this are hard drive shredding, data wiping, and disk shredding, hard drive wiping and data destruction. If the media have partial degradation there may be inaccessible areas that don't get overwritten where data could possibly be prone to unauthorized retrieval by a determined forensic data recovery technician.

Hard drives are magnetic media that store data by making small areas called magnetic domains change their alignment to match the direction of an applied magnetic field. There is a data destruction method called degaussing that puts these domains in a random pattern without alignment, making the files unrecoverable. The degaussing device often makes the hard drive inoperable by wiping out the factory formatting so that in order to use the hard drive again it would have to be returned to the manufacturer for servicing.

Even for those of us who have no proprietary secrets and are not in danger of losing millions of dollars, there is still the danger of identity theft. Throwing out an old computer or a laptop could result in some very large bills run up in your name. Very often the victims of identity theft are left holding the bag and have their lives ruined trying to pay off credit card bills or traffic tickets run up by someone of a criminal nature.

The many technical variations have features that can be matched to the particular need of the company or individual. Physical hard drive shredding and data destruction is considered pretty much foolproof if done correctly. Taking a hammer to your used laptop may be satisfying but it takes a lot of grinding, scraping, smashing, and pummeling to smash all the microchips; best to take it to a shop that can guarantee your secrets die with the hard drive.


Article Source:

Rate this Article: 
Computer Identity Theft How Can You Prevent It?
Rated 4 / 5
based on 5 votes

Related Articles:

Identity Theft Prevention - Prevent Identity Theft From Happening When You Shop .

by: Caleb Liu (December 06, 2008) 
(Legal/Identity Theft)

What Is Identity Theft And How To Prevent It?

by: George Manty (March 03, 2010) 
(Legal/Identity Theft)

The Best Way to Prevent Employee Theft

by: Brett Carlson (July 01, 2008) 
(Internet and Businesses Online/Security)

What You Should Do To Prevent Identity Theft

by: Jon Arnold (July 19, 2007) 
(Legal/Identity Theft)

Identity Theft and How To Prevent It

by: Manny Vetti (December 27, 2007) 
(Legal/Identity Theft)

How to Prevent Identity Theft

by: Manny Vetti (March 09, 2008) 
(Legal/Identity Theft)

What You Can Do To Prevent Identity Theft

by: Jon Arnold (February 16, 2007) 

Find Out How To Prevent Identity Theft

by: Jon Arnold (January 20, 2007) 

Internet Identity Theft How to Prevent It

by: Michael Baker (June 24, 2008) 
(Legal/Identity Theft)

Computer Identity Theft How Can You Prevent It?

by: Michael Baker (June 24, 2008) 
(Legal/Identity Theft)