Guideline 5.23.1.3 Data Sanitization
System Procedures
Chapter 5 - Administration
Part 1. Purpose:
Subpart A. This guideline establishes the minimum technical standards for the removal of institutional data from electronic information technology assets owned by the Minnesota State Colleges and Universities (System). This institutional data may include information classified by the institution's administration; information protected by federal or state laws; information that could lead to identity theft, institutional embarrassment, or loss of personal privacy; and licensed software or restricted intellectual property.
Subpart B. As storage and media devices are decommissioned, re-purposed, or re-allocated, the institutional data must be effectively removed from the storage media or the media must be destroyed. This removal process has been called data removal, data sanitization, data destruction, or other similar terms. In this guideline we will use data sanitization for compatibility with federal guidelines.
Subpart C. Nothing in this guideline shall be interpreted to expand, diminish or alter the academic freedom provided under Board policy, and System collective bargaining agreements, or the terms of any charter establishing a System library as a community or public library.
Part 2. Applicability
This Guideline applies to all System information technology resources, such as computer equipment and/or storage media, and other electronic media capable of data retention that may contain institutional data. This guideline establishes minimum requirements for data sanitization. Institutions may adopt additional requirements, consistent with this guideline and Board policy 5.23, for information technology resources under their control.
Part 3. Guidelines
Subpart A. All information technology resources must be sanitized before being re-purposed, removed, donated, sold, or disposed of. Sanitization must remove or destroy all data and information resources in such a manner that the data cannot be retrieved, even partially, by conventional means or commercially available processes.
Subpart B. Record retention schedules must be complied with prior to any media sanitization. The authorized system or institutional official(s) must refer to System procedure 5.22.1, Acceptable Use of Computers and Information Technology Resources, Part 7, Application of Government Records Laws, Subpart B, Record Retention Schedules, and other applicable requirements.
Subpart C. Removal and destruction of any (or potential) institutional data shall be based on standards and practices as they are documented in the National Institute of Standards and Technology document, NIST 800-88, Guidelines for Media Sanitization.
Subpart D. A record should be maintained detailing the sanitization procedure applied to System-owned information technology resources. The record should include the:
- unique property identification,
- time and date,
- description of the information technology resource,
- disposition of the information technology resource,
- procedure employed to remove and/or destroy the information, and
- individual executing the procedure
Subpart E. The appropriate method of data sanitization is determined by the type of physical media containing the data. The authorized system or institutional official(s) may take guidance from the NIST 800-88, Guidelines for Media Sanitization. Minimum sanitization methods and suggested tools for various media types can be found in Appendix A of NIST 800-88. Acceptable methods of data sanitization are as follows:
- Clearing. Clearing, also known as overwriting, preserves the media for re-use after the data sanitization process.
a. The clearing process must replace written data with random values at all addressable locations.
b. Media can be effectively cleared by one overwrite using currently available sanitization technologies.
c. Deleting files, re-imaging and formatting are not acceptable methods of clearing.- Purging. Purging is a stronger method of sanitization that protects magnetic media against a laboratory attack.
a. Executing the firmware secure erase command (for ATA drives only) is an acceptable method for purging.
b. Degaussing is a typical method of purging where the degaussed media is not expected to be re-used.- Destruction. Proper physical destruction protects against laboratory attacks. Acceptable methods of destruction are as follows:
a. Disintegration, pulverization, melting, and incineration. These are designed to completely destroy the media and therefore any data it contains. They are typically carried out at an outsourced metal destruction or licensed incineration facility with the specific capabilities to perform these activities effectively, securely, and safely.
b. Shredding. Shred size of the refuse should be small enough to ensure reasonable assurance, relative to the data's confidentiality, such that the data cannot be reconstructed.Subpart F. Contracted Secure Disposal
Electronic media disposal service companies that contract with the System should be certified by the National Association for Information Destruction, Inc. (NAID certified).Subpart G. Most computers and mobile devices, including but not limited to cell phones, copiers, MP3 players, and digital cameras, contain some form of storage media and should be handled accordingly. The institution must consider what institutional data the onboard storage may contain and destroy that data according to these standards. If the existence of internal storage cannot be reasonably ruled out, then the device must be destroyed.
Subpart H. Any questions or issues regarding data sanitization, such as procedures for media types not described within this guideline, must be directed to the authorized system or institutional official.
Part 4. Definitions:
Subpart A. Access
Approved authorization to view, modify or delete System information/data. Access shall be authorized to individuals or groups of users depending on the application of law, System policy or guideline. Technical ability to access information is not equivalent to legal authority.Subpart B. Authorized Individual
An employee, consultant, volunteer or other individual who is approved and allowed access to information within the System to perform an activity on behalf of the System. The individual may have access to any class of information, according to policy.Subpart C. Authorized System or Institutional Official
For those seeking access to not-public information, or access to centrally-supported systems, it is the person designated by the Chancellor, Director or Department Head to function in an authorization role for information/data access purposes. In some cases, the employee's Supervisor may function as the designee. In other cases, a key contact is named. Also see "Supervisor".Subpart D.Clearing
Overwriting process on digital media to make it unreadable using normal access methods.Subpart E. Data
Information collected, stored, transferred or reported for any purpose, whether in computers or in manual files. Data can include: financial transactions, lists, identifying information about people, projects or processes, and information in the form of reports. Because data has value, and because it has various sensitivity classifications defined by federal law and state statute, it must be protected.Subpart F. Degaussing
Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser is a device that generates a magnetic field used to sanitize magnetic media. Degaussers are rated based on the type (i.e., low energy or high energy) of magnetic media they can purge. Degaussers operate using either a strong permanent magnet or an electromagnetic coil. Degaussing can be an effective method for purging damaged or inoperative media, for purging media with exceptionally large storage capacities, or for quickly purging diskettes.Subpart G. Destruction
Destruction of media includes: disintegration, incineration, pulverizing, shredding, and melting. Information cannot be restored in any form following destruction.Subpart H. Information Resources
Data collected, created, received, maintained or disseminated by any System user, regardless of its form, storage media, security classification, or conditions of use.Subpart I. Information Technology Resources
Facilities, technologies, and information resources used for System information processing, transfer, storage, and communications. Included in this definition are computer labs, classroom technologies, computing and electronic communications devices and services, such as modems, e-mail, networks, telephones (including cellular), voice mail, fax transmissions, video, multimedia, and instructional materials. This definition is not all-inclusive, but rather, reflects examples of System equipment, supplies and services.Subpart J. Institution
A System college or university, the system office, or the System as a whole.Subpart K. May
A statement that is optional.Subpart L. Must
A statement that is required for a compliant implementation.Subpart M. Must Not
A statement that is prohibited for a compliant implementation.Subpart N. Overwrite
Writing patterns of data over existing data stored on a magnetic medium.Subpart O. Purge
Media sanitization process that protects the confidentiality of information. Degaussing is considered a typical method of purging.Subpart P. Sanitization
The process of removing data from storage media, providing reasonable assurance that the data may not be easily retrieved and reconstructed.Subpart Q. Should
A statement that is recommended but not required.Subpart R. Should Not
A statement of practices that are not recommended but which may be followed.Subpart S. System
Referring to the Board of Trustees, the system office, the state colleges and universities, and any part or combination thereof.Subpart T. System or Institutional Information
Information collected, maintained, stored, reported or presented in any format, on any medium, by any unit or entity within the System.Subpart U. User
Any individual, including but not limited to, students, administrators, faculty, other employees, volunteers, and other authorized individuals using System information resources, whether or not the user is affiliated with the System.
Part 5. Authority
Board policies 1A.1 and 5.23 delegate authority to the vice chancellor to develop system guidelines, consistent with Board policy and System procedure, for the purposes of implementing Board policy 5.23.
Related Documents:
- Policy 5.23 Security and Privacy of Information Resources
- Operating Instruction 5.23.1.1 Password Usage and Handling
- Operating Instruction 5.23.1.2 Encryption for Mobile Computing and Storage Devices
- Operating Instruction 5.23.1.4 Information Security Incident Response
- Operating Instruction 5.23.1.5 Security Patch Management
- Operating Instruction 5.23.1.6 Vulnerability Scanning
- Operating Instruction 5.23.1.8 Anti-malware Installation and Management
- Operating Instruction 5.23.1.10 Payment Card Industry - Technical Requirements
- Operating Instruction 5.23.1.11 Data Backup
- Operating Instruction 5.23.1.13 Breach Notification
- Board Policy 5.22 - Acceptable Use of Computers and Information Technology Resources.
- System Procedure 5.22.1 - Acceptable Use of Computers and Information Technology Resources.
- NIST Special Publication 800-88 - Guidelines for Media Sanitization
To view any of the following related statutes, go to the Revisor's Office website. You can conduct a search from this site by typing in the statute number.
- Minnesota Statutes §13, Minnesota Government Data Practices Act.
Operating Instruction History:
Date of Adoption: 03/09/09
Date of Implementation: 03/09/09
Date of Last Review:
Date and Subject of Amendments:
1/25/12 - The Chancellor amends all current system procedures effective February 15, 2012, to change the term "Office of the Chancellor" to "system office" or similar term reflecting the grammatical context of the sentence.
No additional History
-