

{"id":10541,"date":"2018-07-20T14:39:59","date_gmt":"2018-07-20T14:39:59","guid":{"rendered":"https:\/\/www.uvm.edu\/it\/dev\/kb\/?post_type=ht_kb&#038;p=10541"},"modified":"2025-05-22T15:11:36","modified_gmt":"2025-05-22T19:11:36","slug":"secure-erase","status":"publish","type":"ht_kb","link":"https:\/\/www.uvm.edu\/it\/dev\/kb\/article\/secure-erase\/","title":{"rendered":"Securely Erase Data"},"content":{"rendered":"<p>Your data may be stored on a wide variety of different physical media, such as an internal or external hard drive or a USB flash drive. Before repurposing or recycling a laptop, desktop, or other computing system, it&#8217;s critical to protect your data by securely erasing or disposing of the physical storage.<\/p>\n    \t\t<div class=\"hts-messages hts-messages--alert  hts-messages--withtitle hts-messages--withicon \"   >\r\n    \t\t\t<span class=\"hts-messages__title\">Data Must be Securely Erased or Destroyed Prior to Equipment Disposal<\/span>    \t\t\t    \t\t\t\t<p>\r\n    \t\t\t\t\t<\/p>\n<p>When a device has had its data securely erased or destroyed, a\u00a0<a href=\"https:\/\/www.uvm.edu\/it\/clean-media-labels\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>clean media label<\/strong>\u00a0<\/a>should be affixed to the device, signaling that it is ready for disposal.<\/p>\n<p>    \t\t\t\t<\/p>\r\n    \t\t\t    \t\t\t\r\n    \t\t<\/div><!-- \/.ht-shortcodes-messages -->\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Options for Securely Erasing\/Destroying Data<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p><div class=\"hts-messages hts-messages--info  hts-messages--withtitle hts-messages--withicon \"   >\n    \t\t\t<span class=\"hts-messages__title\">Need Help?<\/span>    \t\t\t    \t\t\t\t<\/p>\n<p>If you do not feel <strong>completely comfortable<\/strong> securely erasing your data, please contact the UVM Tech Team and schedule an appointment to visit the <a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\">Computer Clinic<\/a>.<\/p>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<table>\n<tbody>\n<tr>\n<th>Method<\/th>\n<th>Description<\/th>\n<th>Drive Type<\/th>\n<\/tr>\n<tr>\n<td>Physical Drive Destruction<\/td>\n<td>Computer hard drives and storage media can be brought to the <a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\">Computer Clinic<\/a>\u00a0and submitted for destruction. <strong>Hard drives will be removed from computers and destroyed.<\/strong> The computer will be returned to you and will require a\u00a0<a href=\"https:\/\/www.uvm.edu\/finance\/facilities\/surplus-property-pickup\" target=\"_blank\" rel=\"noopener\">Surplus Pickup Request<\/a>\u00a0to dispose of the electronic waste properly.<\/p>\n<div class=\"hts-messages hts-messages--info   hts-messages--withicon \"   >\n<p>\n    \t\t\t\t\tThis method is only available to computers and storage media that are owned by the University of Vermont    \t\t\t\t<\/p>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/td>\n<td>Any storage media (<span style=\"color: #339966;\"><strong>Recommended<\/strong><\/span>)<\/td>\n<\/tr>\n<tr>\n<td>Securely erasing an Encrypted Volume<\/td>\n<td>Volumes encrypted with <strong>FileVault 2<\/strong> or <strong>BitLocker<\/strong> can be securely erased without the need to write zeros throughout the entire disk.<\/td>\n<td>Solid State and spindle disk drives<br \/>\n(<span style=\"color: #339966;\"><strong>Recommended<\/strong><\/span>)<\/td>\n<\/tr>\n<tr>\n<td>ATA Secure Erase command<\/td>\n<td>Software used to securely erase data.<\/td>\n<td>Solid State and most modern spindle disk drives<\/td>\n<\/tr>\n<tr>\n<td>SSD Manufacturer utilities<\/td>\n<td>Use software provided by the manufacturer of the drive to erase an SSD. Many manufacturers offer software that allows for securely erasing the drive.<\/td>\n<td>Solid State Disks<\/td>\n<\/tr>\n<tr>\n<td>Disk Zero-ing software<\/td>\n<td>Software used to write zeros bit for bit across an entire drive, securely erasing all data on the disk.<\/td>\n<td>Traditional magnetic spindle disk hard drives<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-messages hts-messages--danger  hts-messages--withtitle hts-messages--withicon \"   >\r\n    \t\t\t<span class=\"hts-messages__title\">These Processes are DATA DESTRUCTIVE<\/span>    \t\t\t    \t\t\t\t<p>\r\n    \t\t\t\t\tTo prevent accidental DATA loss, disconnect any disk drives that are not targeted for secure erasure!    \t\t\t\t<\/p>\r\n    \t\t\t    \t\t\t\r\n    \t\t<\/div><!-- \/.ht-shortcodes-messages -->\r\n    \t\t\n<h2>Recommended Methods<\/h2>\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Physical Drive Destruction<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p><div class=\"hts-messages hts-messages--info  hts-messages--withtitle hts-messages--withicon \"   >\n    \t\t\t<span class=\"hts-messages__title\">UVM Owned Devices Only<\/span>    \t\t\t    \t\t\t\t<\/p>\n<p>\n    \t\t\t\t\tPhysical drive destruction is only available to computers and storage media that are owned by the University of Vermont    \t\t\t\t<\/p>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<p>Computer hard drives and storage media can be brought to the\u00a0<a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\">Computer Clinic<\/a>\u00a0and submitted for destruction.\u00a0<strong>Hard drives will be removed from computers and physically destroyed.<\/strong><\/p>\n<p>Computers will be returned to you (with the hard drive removed) and will require a\u00a0<a href=\"https:\/\/www.uvm.edu\/finance\/facilities\/surplus-property-pickup\" target=\"_blank\" rel=\"noopener\">Surplus Pickup Request<\/a>\u00a0to dispose of the electronic waste properly.<\/p>\n<p>If your computer does have have removable storage media (NVMe soldered to the system board) the guides below may required to securely erase your data.<\/p>\n<p>This service is provided by Enterprise Technology Services at no cost to departments.<\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Securely erase a BitLocker encrypted volume<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>BitLocker encrypted disks enable you to quickly sanitize the device by deleting the encryption key, which renders the data on the drive irretrievable.\u00a0To sanitize the contents of a BitLocker encrypted disk, follow the steps outlined below.<\/p>\n<ul>\n<li>This guide assumes that you are <strong>not<\/strong> booted to the disk that you&#8217;re attempting to securely erase. You must connect the target disk to another machine booted to Windows to complete these steps.<\/li>\n<li>Windows installation media can also be used to delete volumes similar to this process, but steps are not provided here.<\/li>\n<\/ul>\n<ol>\n<li>Connect the target disk to the computer.<\/li>\n<li>Press the <i class=\"fa fa-windows \" ><\/i> on your keyboard, search for the <strong>Disk Management<\/strong> program.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/07\/disk_management.png\" rel=\"lightbox-0\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-13145\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/07\/disk_management.png\" alt=\"\" width=\"413\" height=\"378\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk_management.png 413w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk_management-300x275.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk_management-50x46.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk_management-60x55.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk_management-100x92.png 100w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/a><\/li>\n<li>Verify that the target disk is <strong>BitLocker Encrypted<\/strong>. In this example, <strong>D:<\/strong> is the target disk.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/07\/disk-management-program.png\" rel=\"lightbox-1\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-13146\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/07\/disk-management-program.png\" alt=\"\" width=\"756\" height=\"600\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program.png 756w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-300x238.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-50x40.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-60x48.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-100x79.png 100w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\" \/><\/a><\/li>\n<li>Right-click on the target volume, from the menu that appears select\u00a0<strong>Delete Volume<\/strong>.\n<ul>\n<li>If your disk has more than one partition, repeat this step until the disk is completely unallocated space.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume.png\" rel=\"lightbox-2\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-13147\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume.png\" alt=\"\" width=\"757\" height=\"601\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume.png 757w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume-300x238.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume-50x40.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume-60x48.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/07\/disk-management-program-delete-volume-100x79.png 100w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Securely erase a FileVault 2 encrypted volume<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>FileVault encrypted disks enable you to quickly sanitize the device by deleting the encryption key, which renders the data on the drive irretrievable. To sanitize the contents of a FileVault encrypted disk, follow the steps outlined below.<\/p>\n<div class=\"hts-messages hts-messages--alert   hts-messages--withicon \"   >\n<p><strong>Requirements:<\/strong><\/p>\n<ul>\n<li>macOS 10.12 or higher is required for Disk Utility to see APFS formatted volumes.<\/li>\n<li>This guide assumes that you are <strong>not<\/strong> booted to the disk that you&#8217;re attempting to securely erase. You must connect the target disk to another machine via target disk mode, USB dock, or opt to use <a href=\"https:\/\/support.apple.com\/en-us\/HT201314\">Internet Recovery<\/a> to perform the following steps.<\/li>\n<\/ul>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<ol>\n<li>APFS and HFS+ encrypted volumes are housed within a logical &#8220;container&#8221; disk within the physical disk&#8217;s available space. By default, Disk Utility only displays available volumes. To display physical disks and containers, click the &#8220;<strong>Sidebar<\/strong>&#8221; menu and select &#8220;<strong>Show All Devices<\/strong>&#8220;.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/show-all-devices-diskutil.png\" rel=\"lightbox-3\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11442 alignnone\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/show-all-devices-diskutil.png\" alt=\"\" width=\"259\" height=\"181\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/show-all-devices-diskutil.png 259w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/show-all-devices-diskutil-50x35.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/show-all-devices-diskutil-60x42.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/show-all-devices-diskutil-100x70.png 100w\" sizes=\"auto, (max-width: 259px) 100vw, 259px\" \/><\/a><\/li>\n<li>Verify that the target volume is encrypted with FileVault by selecting the volume from the Sidebar and viewing its details.\u00a0If you find that the volume is not encrypted, you may want to use one of the &#8220;<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/it\/kb\/article\/secure-erase#alternative-methods\"><strong>Alternative Methods<\/strong><\/a>&#8221; for securely erasing data below. If the machine does not have a removable hard drive, ETS recommends encrypting the disk first, and then proceeding with this guide.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1.png\" rel=\"lightbox-4\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11457 size-full\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1.png\" alt=\"\" width=\"898\" height=\"489\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1.png 898w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1-300x163.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1-768x418.png 768w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1-50x27.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1-60x33.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/verify-volume-encrypted-1-100x54.png 100w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/a><\/li>\n<li>After confirming the disk is encrypted, the disk can be reformatted. It is important to understand that simply reformatting the encrypted Volume is not enough.\n<ul>\n<li>Seagate Expansion Media = Physical disk<\/li>\n<li>Container disk3 = Logical container disk<\/li>\n<li>Macintosh HD = Logical Volume<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/all-devices.png\" rel=\"lightbox-5\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11444 alignnone\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/all-devices.png\" alt=\"\" width=\"253\" height=\"120\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/all-devices.png 253w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/all-devices-50x24.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/all-devices-60x28.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/all-devices-100x47.png 100w\" sizes=\"auto, (max-width: 253px) 100vw, 253px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<li>To securely sanitize data on the disk,<strong>\u00a0the entire container must be deleted.<\/strong>\u00a0To delete the container, select the <strong>Physical disk\u00a0<\/strong>from the Sidebar. In this particular example, the Physical disk is &#8220;Seagate Expansion Media&#8221;. When the physical disk has been selected, click the &#8220;Erase&#8221; button.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1.png\" rel=\"lightbox-6\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-11459 size-full\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1.png\" alt=\"\" width=\"896\" height=\"487\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1.png 896w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1-300x163.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1-768x417.png 768w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1-50x27.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1-60x33.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/select-physica-disk-erase-1-100x54.png 100w\" sizes=\"auto, (max-width: 896px) 100vw, 896px\" \/><\/a><\/li>\n<li>The default options should work, click the &#8220;Erase&#8221; button to wipe the container and securely sanitize the disk.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/default-format-options.png\" rel=\"lightbox-7\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11446 alignnone\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/default-format-options.png\" alt=\"\" width=\"421\" height=\"258\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/default-format-options.png 421w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/default-format-options-300x184.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/default-format-options-50x31.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/default-format-options-60x37.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/default-format-options-100x61.png 100w\" sizes=\"auto, (max-width: 421px) 100vw, 421px\" \/><\/a><\/li>\n<\/ol>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n<h2>Alternative Methods<\/h2>\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>ATA Secure Erase command<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>One of the most efficient ways to securely erase a disk is to issue an\u00a0<strong>ATA Secure Erase<\/strong> command. When a Secure Erase is issued against an SSD all of its cells will be marked as &#8220;empty&#8221;, restoring it to a factory default state. Most modern magnetic spindle disk drives also support the command.<\/p>\n<div class=\"hts-messages hts-messages--alert   hts-messages--withicon \"   >\n<p><strong>Requirements:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.system-rescue-cd.org\/Installing-SystemRescueCd-on-a-USB-stick\/\">USB bootable SystemRescueCD<\/a><\/li>\n<li>This guide assumes an IDE, SATA, or PCIe connected disk. In testing, disks connected via a USB dock have also worked.<\/li>\n<li>SSD or modern Spindle Disk drives.<\/li>\n<\/ul>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<ol>\n<li>Boot to SystemRescueCD on the machine you&#8217;d like to securely erase.\n<ul>\n<li>On Dell systems, you may need to temporarily disable &#8220;Secure Boot&#8221;.To disable Secure Boot, tap <strong>F12<\/strong> at boot, then select the &#8220;Change Boot Mode Setting&#8221;. From the options that appear, select &#8220;UEFI with Secure Boot disabled&#8221;.<\/li>\n<\/ul>\n<\/li>\n<li>SystemRescueCD will boot to a shell prompt.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/sysresccd-boot.png\" rel=\"lightbox-8\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11329 alignnone\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/sysresccd-boot.png\" alt=\"\" width=\"396\" height=\"286\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot.png 626w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-300x217.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-50x36.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-60x43.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-100x72.png 100w\" sizes=\"auto, (max-width: 396px) 100vw, 396px\" \/><\/a><\/li>\n<li>\u00a0SSD drives are locked down with a &#8220;security freeze&#8221; set by BIOS at boot. To &#8220;un-freeze&#8221; a disk we can simply put the computer to sleep for a moment with the following command. After the command has been issued, tap the power button to wake your computer and continue to the next step.\n<pre>echo -n mem &gt; \/sys\/power\/state<\/pre>\n<\/li>\n<li>List all connected disks with the following command:\n<pre>lshw -class disk<\/pre>\n<p>This will display details of all connected disks, including the &#8220;<strong>logical name<\/strong>&#8221; of each disk. Locate the &#8220;logical name&#8221; of the target disk and replace\u00a0<strong><code>\/dev\/sdX<\/code><\/strong>\u00a0in the commands below with that name.<\/li>\n<li>\u00a0Set a security password that will be used to erase the disk. In this case, the password is set to NULL.\n<pre>hdparm --user-master u --security-set-pass NULL \/dev\/sdX<\/pre>\n<\/li>\n<li>To securely erase the disk run the following command:\n<pre>hdparm --user-master u --security-erase NULL \/dev\/sdX<\/pre>\n<\/li>\n<li>In testing, the average time for SECURITY ERASE completion was less than two minutes for a 256GB SSD. Note that spindle disk drives will take considerably longer (hours) to complete.<\/li>\n<li>When the command completes, verify the disk has been wiped.<\/li>\n<\/ol>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Manufacturer-provided Utilities for SSDs<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>To securely erase data, hard disk drives fill the occupied space on the drive with a file consisting of zeroes or execute multiple writes of different characters. However, solid-state drives use wear-leveling algorithms that evenly distribute data among SSD blocks, which means that data is constantly moved around on the drive so the blocks will be worn at an equal rate. Standard secure deletion tools damage SSDs by performing an unnecessary number of additional writes without being able to tell where the data is written.<\/p>\n<p>To securely erase data from a solid-state drive, use one of the following methods:<\/p>\n<ul>\n<li><strong>Manufacturer-specific software if<\/strong> possible, use software provided by the manufacturer of the drive to erase an SSD. Many manufacturers offer software that allows for securely erasing the drive, as well as other functions such as updating firmware or checking the health of the drive. Use the instructions provided by the manufacturer to erase the SSD. The following manufacturers provide software to securely erase an SSD:\n<ul class=\"toc\">\n<li><a title=\"\" href=\"https:\/\/www.corsair.com\/us\/en\/downloads\">Corsair SSD Toolbox<\/a><\/li>\n<li><a title=\"\" href=\"http:\/\/www.crucial.com\/usa\/en\/support-storage-executive\">Crucial Storage Executive<\/a><\/li>\n<li><a title=\"\" href=\"https:\/\/downloadcenter.intel.com\/download\/27527?v=t\">Intel Solid-State Drive Toolbox<\/a><\/li>\n<li><a title=\"\" href=\"https:\/\/www.ocz.com\/us\/download\/\">OCZ Toolbox<\/a><\/li>\n<li><a title=\"\" href=\"http:\/\/www.samsung.com\/semiconductor\/minisite\/ssd\/download\/tools\/\">Samsung Magician Software<\/a><\/li>\n<li><a title=\"\" href=\"http:\/\/kb.sandisk.com\/app\/answers\/detail\/a_id\/9328\/~\/ssd-toolkit-support-information\">SanDisk SSD Toolkit<\/a><\/li>\n<\/ul>\n<p>If you cannot locate the manufacturer of your SSD, or if the manufacturer does not provide software for securely erasing the drive, you can try using a generic utility, or submit the drive for physical destruction at the <a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\">Computer Clinic<\/a>.<\/li>\n<\/ul>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Data Duplicator (dd) command<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<div class=\"hts-messages hts-messages--alert   hts-messages--withicon \"   >\n<p><strong>Requirements:\u00a0<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.system-rescue-cd.org\/Installing-SystemRescueCd-on-a-USB-stick\/\">USB bootable SystemRescueCD<\/a><\/li>\n<li>This guide assumes you&#8217;re zeroing a <strong>magnetic spindle disk drive<\/strong>.<\/li>\n<li>If you are looking to securely erase data stored on a Solid State Disk, please see the &#8220;<strong>Secure erase a BitLocker encrypted volume<\/strong>&#8220;, &#8220;<strong>Secure erase a FileVault2 encrypted volume<\/strong>&#8220;, or &#8220;<strong>ATA Secure Erase<\/strong>&#8221; guides above.<\/li>\n<\/ul>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<ol>\n<li>Boot to SystemRescueCD on the machine you&#8217;d like to securely erase.\n<ul>\n<li>On Dell systems, you may need to temporarily disable &#8220;Secure Boot&#8221;.To disable Secure Boot, tap <strong>F12<\/strong> at boot, then select the &#8220;Change Boot Mode Setting&#8221;. From the options that appear, select &#8220;UEFI with Secure Boot disabled&#8221;.<\/li>\n<\/ul>\n<\/li>\n<li>SystemRescueCD will boot to a shell prompt.<br \/>\n<a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/sysresccd-boot.png\" rel=\"lightbox-8\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11329 alignnone\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2018\/09\/sysresccd-boot.png\" alt=\"\" width=\"396\" height=\"286\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot.png 626w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-300x217.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-50x36.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-60x43.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2018\/09\/sysresccd-boot-100x72.png 100w\" sizes=\"auto, (max-width: 396px) 100vw, 396px\" \/><\/a><\/li>\n<li>List all connected disks with the following command:\n<pre>lshw -class disk<\/pre>\n<p>This will display details of all connected disks, including the &#8220;<strong>logical name<\/strong>&#8221; of each disk. Locate the &#8220;logical name&#8221; of the target disk and replace\u00a0<strong><code>\/dev\/sdX<\/code><\/strong>\u00a0in the commands below with that name.<\/li>\n<li>To write zeros to the target disk and display it&#8217;s progress, use the command below:\n<pre>dd if=\/dev\/zero | pv | dd of=\/dev\/sdX<\/pre>\n<\/li>\n<li>When the dd command completes, verify the disk has been wiped.<\/li>\n<\/ol>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>macOS Disk Utility for Spindle Disk drives<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<div class=\"hts-messages hts-messages--danger   hts-messages--withicon \"   >\n<p>\n    \t\t\t\t\tDue to the prevalence of solid-state drives (SSDs), Apple has removed many of the tools previously provided to securely erase data from hard disk drives (HDDs). If you&#8217;re looking to securely erase data from an SSD, please use a different guide.    \t\t\t\t<\/p>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<p><strong>Mac OS X has retained the following built-in options for securely removing data:<\/strong><\/p>\n<ul>\n<li>For whole file systems, use the <strong>Disk Utility<\/strong> app, which can be found in any of the following places:\n<ul>\n<li>In the\u00a0<code>Applications\/Utilities\/<\/code>\u00a0folder on your hard drive.<\/li>\n<li>Booting to\u00a0<strong>Internet Recovery<\/strong> (<code>Command+Option+R<\/code> or\u00a0<code>Command+R<\/code>)<\/li>\n<\/ul>\n<p>In Disk Utility, choose the file system you want to wipe, and then select the\u00a0<strong><span class=\"menuitem\">Erase<\/span><\/strong>\u00a0tab. If you have a hard disk drive, select\u00a0<strong><span class=\"menuitem\">Security Options<\/span><\/strong>\u00a0to choose the security level of the erasure.     \t\t<\/p>\n<div class=\"hts-messages hts-messages--alert   hts-messages--withicon \"   >\n<p>\n    \t\t\t\t\tIf a solid-state drive is detected,\u00a0<span class=\"menuitem\">Security Options<\/span>\u00a0may not be available for selection.    \t\t\t\t<\/p>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/li>\n<\/ul>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n","protected":false},"excerpt":{"rendered":"<p>Your data may be stored on a wide variety of different physical media, such as an internal or external hard drive or a USB flash drive. Before repurposing or recycling a laptop, desktop, or other computing system, it&#8217;s critical to protect your data by securely erasing or disposing of the&#8230;<\/p>\n","protected":false},"author":67,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"ht-kb-category":[278,270,274],"ht-kb-tag":[311,390,310,313,309,312],"class_list":["post-10541","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-for-it-professionals","ht_kb_category-security","ht_kb_category-servers-and-data","ht_kb_tag-disposal","ht_kb_tag-drive","ht_kb_tag-electronic-waste","ht_kb_tag-secure-erase","ht_kb_tag-surplus","ht_kb_tag-zero"],"_links":{"self":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb\/10541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/comments?post=10541"}],"version-history":[{"count":120,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb\/10541\/revisions"}],"predecessor-version":[{"id":31274,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb\/10541\/revisions\/31274"}],"wp:attachment":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/media?parent=10541"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb-category?post=10541"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb-tag?post=10541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}