Athento has a document operation that allows secure deletion at the file system level.
This deletion is performed using tools available in the Linux operating system, such as wipe or shred.
Athento also maintains an audit trail of who, when and what method was used for such secure deletion.
You can activate this deletion in the "Operations" tab of the document series.
Secure Data Deletion
The law indicates that for certain types of data, the necessary measures must be taken to prevent any subsequent recovery of the information that has been deleted from the inventory. To ensure this data deletion, it is possible to use the overwrite method. Athento uses on its Linux servers, tools (wipe, shred and others) that overwrite data with a variety of defined patterns and make data recovery practically impossible.
According to INCIBE (Spain's National Cybersecurity Institute) in its Guide on Secure Storage and Deletion of Information, overwriting has the following advantages:
"The overwrite method for secure destruction of information has the greatest number of advantages among which the following can be highlighted:
- It can be used for all rewritable devices.
- After the erasure process, it is possible to access the device again to certify that all previously stored data has been replaced by the erasure pattern.
- It is possible to perform the deletion operation at the company's own offices, avoiding the need to save the chain of custody in the transport to an authorized recycling center.
- It allows reuse of the devices."
Below is a table comparing the methods of secure data deletion:
Athento will certify this secure data deletion (cloud scenarios).
For clients that require secure data deletion, Athento offers the possibility of defining programmatic actions to carry out the secure deletion of data. It is also possible to configure Athento to migrate the data to external servers prior to the deletion (when there is a need for the client to keep a copy of the data and not Athento).