The following steps are intended to help you prepare a computer to be surplussed, by overwriting all data and free space on each functioning hard drive attached to the machine. Did you know that files that are simply deleted from the hard disk are generally easy to recover in full or in part, even if your operating system requires a password to log in! Think of how easy it would be to get them if they were not deleted at all. Consider that your Email, your address books, your contact information for others, your projects, your databases, all probably reside on your computer. You owe it to yourself, your department, and the University to make sure that sensitive files and other personal and business information are removed from your hard drive before you give it to the Surplus Department.ĭid you know that your operating system will often store your password(s) on the hard drive? What about the other files on the hard drive that belong to you or your department or the university? Sensitive data SHOULD be encrypted, but it is still possible for someone to piece together various bits of data and glean useful information from it. When you surplus your machine, you are handing it over to a stranger. Now you want to surplus your desktop or laptop computer to make room for a replacement. You spent a lot of time and effort, guarding your files and data from crashes, corruption, viruses, Internet bandits and the like.
0 Comments
Leave a Reply. |