Safe disposal of data and computer eqipment Flashcards Preview

UNIT 1 > Safe disposal of data and computer eqipment > Flashcards

Flashcards in Safe disposal of data and computer eqipment Deck (8)
Loading flashcards...
1
Q

Legislation

A
  • recycling of computer equipment is a specialist part of the waste and recycling industry
  • fast growing sector due to implementation of the original WEE directive in the UK by the WEE regulations (Waste Electrical and Electronics Equipment recycling)
  • data protection act + freedom of information act both contain legal requirements for the safe destruction of data
2
Q

Why is it important to safely recycle computer equipment?

A

it has the potential of causing damage to the environment + having an impact of people’s health (increases risk of cancer + other deadly diseases) in poor countries

3
Q

Benefits of recycling computer equipment

A
  • different computer components can be sold to generate revenue
  • components are able to be used again (saves cost of producing new computer parts)
  • computers can be sent to individuals in LEDCs, so that they’re able to educate themselves
4
Q

Legislation - industry…

A

Industry where people charge individuals or businesses to take their old hardware. The resource is then broken down and the most precious components are removed (e.g. gold). Benefits employees as they’re making a huge profit just by recycling a computers old hardware.

5
Q

Overwrite data

A
  • This is copying new data over existing data, as in when a file is updated. Data that is overwritten can’t be retrieved.
  • When data is overwritten, the magnetic components of the HDD are re-magnetised. The process is irreversible as it physically removed information previously stored in this location.
6
Q

Electromagnetic wipe

A

This method includes the destruction of data

7
Q

Physical destruction

A

Safest removal of data. Includes physically destroying data by: smashing it with a hammer, melting down the drive platters or submerging it in water

8
Q

Consequences of not following these guidlines

A
  • personal information stored in files on a computer can be accessed and may be used for criminal activity
  • passwords stored on a computer may give access to secure websites holding your private and financial details
  • browsing history stored on a computer can be accessed