Difference between revisions of "Template:Data erasure"
Jump to navigation
Jump to search
imported>FleetCommand (Purged the navbox of non-navigational items, external links and irrelevant links. (Links in the "Legal" section still need checking.) Reordered section by context.) |
|||
| Line 2: | Line 2: | ||
| name = Data Erasure | | name = Data Erasure | ||
| title = [[Data erasure]] | | title = [[Data erasure]] | ||
| − | |||
| − | |||
| − | | | + | | group1 = Methods |
| − | | | + | | list1 = [[Data remanence#Specific methods|Overwriting, degaussing, encryption and physical destruction]]{{·}}[[Sanitization (classified_information)|Sanitization]] |
| − | | | + | | group2 = Schemes |
| − | | | + | | list2 = [[Gutmann method]]{{·}}[[National Industrial Security Program|DoD 5220.22-M]]{{·}}[[AFSSI-5020]] |
| − | | | + | | group3 = Utilities |
| − | | | + | | list3 = [[BCWipe]]{{·}}[[DBAN]]{{·}}[[Disk Utility]]{{·}}[[shred (Unix)]]{{·}}[[Data Shredder]]{{·}}[[HDDerase]]{{·}}[[srm (Unix)]] |
| − | | | + | | group4 = Developers |
| − | | | + | | list4 = [[Blancco]] |
| − | | | + | | group5 = Legal |
| − | | | + | | list5 = [[Health Insurance Portability and Accountability Act]]{{·}}[[Personal Information Protection and Electronic Documents Act]]{{·}}[[Gramm–Leach–Bliley Act]]{{·}}[[SB 1386]]{{·}}[[Sarbanes–Oxley Act]] |
}} | }} | ||
[[Category:Data security|{{PAGENAME}}]] | [[Category:Data security|{{PAGENAME}}]] | ||