The data erasure methods offered by standard operating systems regularly do not perform a secure data erasure on hard disks. Standard programs usually delete only the assignment references from the contents directories of data carriers. Therefore, the protected personal data must be destroyed using special methods.
In order to avoid infringements of data protection regulations, IT systems must undergo a secure data erasure. Often this also seems necessary so that to exclude the leakage of highly sensitive enterprise data.