Episode 27 — Execute defensible disposition without increasing legal exposure

Disposing of data that has reached the end of its retention period is a vital but risky task that must be performed with total administrative and technical precision. This episode explores how to execute "defensible disposition" by ensuring that no data is deleted while it is subject to a litigation hold or a regulatory inquiry. For certification purposes, it is important to understand the different methods of data destruction, from physical shredding to advanced cryptographic wiping. In practice, a defensible process requires a formal "approval to destroy" from the relevant data owner and the legal department. A frequent pitfall is failing to verify that third-party vendors have actually destroyed the data they were contracted to handle. By mastering the art of secure and documented disposition, you eliminate the liability of "over-retention" while protecting the organization from claims of illegal spoliation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 27 — Execute defensible disposition without increasing legal exposure
Broadcast by