To protect customers from unwanted security breaches, electronic data shredding technology is executed by many forms of digital devices, including large format print, scan and copy machines like those available from Canon Solutions America. e-shredding technology works by overwriting your secure data immediately after the large format print job is processed. This helps to ensure that your company's data remains secure.
The OcÚ brand utilizes electronic data shredding technology in its wide format print, copy, and scan systems so that customers have the ability to completely overwrite any sensitive data by erasing the job immediately upon completion. This overwriting feature ensures that confidential data cannot be recovered at a later time. OcÚ electronic data shredding technology options are compliant with US Department of Defense requirements, and offer a number of overwrite algorithms for increased e-shredding functionality. Common electronic data shredding technology algorithms used in the U.S. include:
Gutmann: This e-shredding technology erases data by utilizing 35 overwrite passes. Each overwrite session is the equivalent to four random write patterns, immediately followed by 27 specific patterns executed in a random order. After that, a lead-out of four more random patterns is performed to ensure results.
US Department of Defense 5220.22-M: This electronic data shredding method is typically regarded as the highest level of sanitization to respond to data remanence, meeting U.S. Department of Defense requirements for permanent disposal of disk media.
Custom e-shredding Technology: For ultimate control, some system administrators prefer to personally set the number of overwrite passes manually. This digital security measure is a tailored solution for many businesses worried about security breaches.
At its core, electronic data shredding technology is a fundamental concept, whereby the sensitive data is overwritten immediately after a wide format print job is completed. This process ensures that it is nearly impossible to retrieve or reconstruct the overwritten information. When many different users have unregulated access to the system, electronic data shredding technology can be a vital part of your digital security.
Resource Center Home Security