Sanitizing Hard Drives And Tape Media

Hard drives and Tape Media are the most commonly used types of storage media in devices.

Main Page Content

Some examples of this type of media includes:

  • Internal Computer (Desktop) Hard Drives
  • Internal Laptop Hard Drives
  • Internal Hard Drives for scanners/copiers/printers and fax machines
  • External (or removable) Hard Drives
  • Magnetic Tapes

How to Sanitize Storage Media

All state-owned storage media should be securely wiped before being transferred to a new owner or prior to disposal. To request that some storage media be sanitized, please contact the IT Service Desk at 395-5151 or through our self-service portal Team Dynamix Service Catalog (login required).

After wiping or transferring the storage media, LITS will ensure that the media is transported to the proper facility for destruction/disposal. The entire disk will be overwritten with a minimum of three passes.

LITS' Sanitization Policies

During the course of routine computer replacement LITS technicians typically transfer user data from the hard disks in the old computer over to the hard disk in the new computer. To prevent accidental data loss LITS keeps all hard drives for a minimum of 30 days in a secure location before they're sanitized and reused or disposed.

If you are concerned that a 30 day retention period is not long enough to ensure that your data has been transferred, please discuss this issue with the technician performing the migration of your computer.

LITS uses the following software to sanitize hard disks:

Please note this software is available for use on personally owned devices. If you chose to use this software on your personally owned devices you do so at your own risk. LITS is not responsible for any unintentional loss of data due to the use of the above software.

Contact Info

Our service desk can be contacted via the phone at (585) 395-5151 option 1 or through our self-service portal Team Dynamix Service Catalog (login required).

If you have any other questions regarding these practices please reach out to our Information Systems Security Coordinator at

Last reviewed: 12/2015

Reviewed by: PCI Oversight Committee

Last Updated 7/1/20

Close mobile navigation