|“||to remove sensitive data from computer storage and other peripheral devices with storage capacity at the end of a specified period of time.||”|
|“||[t]o use software or hardware products to overwrite storage space on the media with non-sensitive data. This process may include overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but also may include all addressable locations.||”|
- ↑ This page uses content from the Information Security Guide 2 - Glossary, which is made available under the Creative Commons Attribution License 3.0 Unported.
- ↑ NIST Special Publication 800-88, rev. 1, at 26.