Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Secure Data Deletion

Secure Data Deletion

How do I delete a file securely?

Windows:

  • PGP Desktop: "Shred" function
  • Heidi Eraser: Can delete already-deleted files securely

Mac OS X:

  • Finder: Secure Empty Trash (built-in)
  • Disk Utility: Can delete already-deleted files securely (built-in)
  • PGP Desktop: "Shred" function

UNIX: Wipe

How do I wipe an entire device securely?

For ATA, SCSI, USB, and Zip disks, overwrite using one of the methods below. A one-pass overwrite with random data is sufficient; degaussing is not necessary and will render a drive unusable. If the device will be disposed of (as opposed to being recycled) degaussing is a faster option.

Windows: Secure Erase

Mac OS X: Disk Utility (built-in)

UNIX: Wipe

CDs, DVDs: Destroy by incinerating, melting, or shredding to pieces no larger than 25mm2.

Tapes: Degauss/Contact the University Records Center for assistance with secure tape disposal.

Cell phones, PDAs, Printers: Delete data, then do a hard/factory reset.

Is there a faster way to securely delete a drive?

If you have an ATA drive, it may have a "fast secure erase" feature that will allow you to start the secure erase, protect it with a password, and prevent any drive access until the erase is complete. Degaussing is an option but will render the drive unusable.

How many overwrites are required to make the data unrecoverable?

A one-pass overwrite with random data is sufficient. Based on a report from NIST (National Institute of Standards and Technology) and research by the UCSD Center for Magnetic Recording Research, multiple overwrites take significantly more time and doesn't clear the remaining electromagnetic signal significantly better than a single overwrite. For more information, see NIST Special Publication 800-88 and the Center for Magnetic Recording Research.

What about shredding a hard drive?

To securely destroy/shred a hard drive, you can ask University Archives to pick it up and have it destroyed securely, which costs $0.52/pound. If you call University Archives, they'll walk you through the process of opening an account (if you don't already have one) and filling out a form before they pick up the drive(s) and have it destroyed.

ISC's Provider Desk also provides a degausser and "disk crusher" to members of Penn's technical community free of charge. Work with your LSP to find out which option is right for you. For more info visit Secure Drive Disposal.

Are there other options?

Visit the Green IT: Computers & Peripherals page for more information.

Visit ISC on LinkedIn

Print
InfoSec Home
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff