|“||[t]o render stored applications, files, and other information on a system unrecoverable.||”|
|“||[t]he removal of sensitive data from an AIS, AIS storage device, or peripheral device with storage capacity, at the end of a processing period. This action is performed in such a way that there is assurance proportional to the sensitivity of the data that the data may not be reconstructed.||”|
- ↑ Practices for Securing Critical Information Assets, Glossary, at 57.
- ↑ Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).
- ↑ Id.