Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.

Slides:



Advertisements
Similar presentations
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Advertisements

THE OFFICE OF FINANCIAL SERVICES Budget Authority Training.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
NOAA Computer/Hard Drive Sanitization Validation Form and PDA/Cell Phone Destruction Worksheet.
Surplus Property February Surplus Property Policy Policy is located within the Finance and Operations Policy Library –
Media Sanitization How to get rid of unwanted data so no one else can get it.
Information and Technology Services Customer Services.
Records Management at UW-Green Bay Or, I am out of space and just want to throw some things away!
Developing a Records & Information Retention & Disposition Program:
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Meeting Maker Upgrade Mark Reynolds Manager of Consulting Services Chris Johnson Technical Support Specialist.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
NDSU RECORDS MANAGEMENT INITIATIVE 2007
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Agenda New Releases What’s coming soon… “Must-have” Software Software Products for Faculty/Staff –Software for the Office –Software for Home Use Software.
Presentation by Neil Schmidt. Before You Start, Get Organized! On your old computer: Create “Music”, “Pictures” & “Videos” folders (if they don’t already.
10 Essential Security Measures PA Turnpike Commission.
Identify a few method to dispose of the hard drive of computers.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Penn State University College Of Education Understanding College of Education Resources.
Creating Your Electronic Catalog. What is a Catalog? eVA is Virginia’s online, electronic procurement system. This web-based vendor registration and purchasing.
Basic Records Management. What we’ll cover Virginia Public Records Act Definitions Understanding and using the LVA General Schedules The schedule cover.
Policies and Procedures Deb Bartlett Joy Faerber Office of Procedures, Records, and Forms Revised May 2015.
Elizabeth Wilmoth Period 2.  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
A Digital Gateway Michele Reed Vice President and Director of Communications Missouri PTA.
Accounting Electronic Records Management Process Your Company Name Here. Confidential. Revision # ___. Date: _____ By: _______________ 1 1. Full Access.
Corporate Information Systems Delivery of Infrastructure IT Services.
Portal User Group Meeting March 9, Agenda  Introduction  Guest Presentation – Website Accessibility Michelle Laramie, David Bergmann, Jolene Nemeth.
March 2013 LCCU Meeting Judy Grindle will discuss and demonstrate: –How can you securely clean off files and programs from a PC before donating it, or.
ELECTRONIC RECYCLING ELECTRONIC EQUIPMENT RECYCLING WEB CONFERENCING RECYCLED TONER CARTRIDGES.
The State of Kansas Data Access and Support Center (DASC)
Post Transaction Module Property can be given directly to a school or educational non-profit Property Managers must have a GSAXcess® User ID and Password.
Active KillDisk © v3.0 Active Data Security Solutions.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Safety 101 : The basics Computer Technician. Static Electricity Builds up through friction When it comes to computers, it can be very damaging Many computer.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Creating Your Electronic Catalog. What is a Catalog? A list of products and/or services and their attributes published in the eMall, the shopping area.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
LESSON 4 COMPUTER MAINTENANCE BY: Morgan Bradley.
Surplus Forum March 31 – 9 to 11 am Agenda – Frequently Asked Questions – Updates, Rules, and Policies – Billing Report – Pickups and Deliveries – Disposal.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Surplus Forum February 26, Agenda Website Changes SP1’s – Entering, Approving, Interdepartment Transfers Hazardous Waste Policy Scheduling and Pickup.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Office of the Chief Information Officer Introduction to Qualtrics for Online Survey & m-Learning Office of the CIO.
Records Management at East Carolina University Application of Records Retention and Disposition Schedules.
Records Management and University Archives at Clemson University.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Management and the Departing Employee.
Electronic Waste Recycling Necessary for a Green Future.
Office of Occupational Safety, Health, and Environment Transportation Security Administration: The Federal Electronics Challenge and the PC Refresh Project.
Records Management Program Records Management 101.
Avast has always come up with the new features to stand amongst its competitors. Data Shredder is a feature which allows the user to remove or erase the.
DOCUMENT AND DATA CONTROL
Cleaning Up Your Hard Drive Space
PREPARING AND REQUESTING PROPERTY REMOVAL
Chapter 4: Application Software
Archive / Destruction / Disposal
Portal User Group Meeting
Steps to Setup and Install McAfee Antivirus
Education – Partnership – Solutions
Digital $$ Quiz Test your knowledge.
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices Guidelines for disposing of University-owned computers and equipment. Northwestern’s Computer and Peripherals Recycling Program.

Safe Disposal Techniques

Removing Files and Folders Deleting files is not enough! File-shredding is best way to permanently destroy unwanted information on your computer. –Shredding is file-specific. –Remember… data may continue to exist in other locations on your computer. File-shredding products: SecureClean ($) Eraser (free)

Safely Disposing of Computers Reformatting is not enough! There are two ways to permanently remove information from a computer: –Clean the hard disk using software. –Physically shred hard disk. Tedious Time-consuming Physical shredders are available at office stores and online.

Hard Disk Cleaning Hard disk cleaning (“wiping”) is the best way to remove information from a computer. –Works like a file-shredder, but destroys all information on the disk. –Overwrites every block of information with data. –Use industry standard “wiping” process. Department of Defense (DoD) standard ( M) –Products: White Canyon Wipe Drive ($) Active KillDisk (free) DBAN (open source)

Disposing of Information in Other Formats Handheld devices –Hard resets –Special tools iPods Media

DSS Can Help! Services: –Installation of shredder software. –Preparation of computers for disposal or redeployment. Call HELP (4357). –Hours: Monday – Friday, 8:30 am - 5:00 pm Users can also request service via the DSS Online Help Request Form at any time. –Expect a response within 24 hours. –

Online Help Request Form

Questions?

Guidelines for Disposing of University-owned Computers and Equipment

Policy: Disposal of Northwestern University Computers

Removing Data You are responsible for making certain that University computers in your possession are “wiped” before disposing of them. If a computer is being redeployed to another employee or department, contact Distributed Support Services or your technical support person. If a computer is being removed from University ownership, use the Computer and Peripheral Recycling Program.

Software and Licenses If a computer will be redistributed, original operating system installation disks should be passed along with it. In most cases, NUIT Site-Licensed Software should be retained by the original user. These licenses generally do not transfer with computers where they are installed.

Special Considerations If equipment was purchased with federal funds, get approval from the Accounting Services for Research and Sponsored Programs (ASRSP) for disposal. –See for details. If equipment has an inventory tag, report it to the Accounting Services Equipment Inventory Coordinator. –

Computer and Peripherals Recycling Program

Recycle It! The recycling service offers data removal at no charge. Recycling helps Northwestern meet Environmental Protection Agency (EPA) guidelines for equipment disposal. It’s easy! Just fill out the pick-up form.

Pick-up Request Form

Other Recycling Resources For non-University mobile devices: –Check with your service provider for recycling options. For non-University computers and equipment: –Check with the computer manufacturer for recycling programs. –Check with your county of residence for recycling options that might be available.

Questions?

Visit the NUIT Web Site!

HELP (4357) or Contact Us

Upcoming Tech Talks February 24: Evaluating and Selecting Online Survey Software or Services March 3: Evaluating and Selecting a Web Hosting Service Same locations, Noon – 1 p.m.