HP DesignJet Z2600 User guide - Page 121

Non-Secure Fast Erase, Secure Sanitizing Erase, in using Secure Disk Erase from Web JetAdmin

Page 121 highlights

● Non-Secure Fast Erase: all pointers to the information are erased. The information itself remains on the hard disk until the disk space it occupies is needed for other purposes, and it is then overwritten. While it remains on the disk, it is difficult for most people to access, but may be accessed using software designed for the purpose. This is the normal method in which files are erased on most computer systems; it is the fastest method but the least secure. ● Secure Fast Erase: all pointers to the information are erased, and the information itself is also overwritten with a fixed character pattern. This method is slower than Non-Secure Fast Erase, but more secure. It may still be possible to access fragments of the erased information by using special tools to detect residual magnetic traces. ● Secure Sanitizing Erase: all pointers to the information are erased, and the information itself is repetitively overwritten using an algorithm designed to eliminate any residual traces. This is the slowest method, but the most secure. Secure Sanitizing Erase meets the US Department of Defense 5220-22.m requirements for clearing and sanitization of disk media. This is the default security level when using Secure Disk Erase. Secure Disk Erase is one of the facilities provided by Web JetAdmin, which is HP's free Web-based print management software: see http://www.hp.com/go/webjetadmin. If you have difficulty in using Secure Disk Erase from Web JetAdmin, contact HP Support: see Contact HP Support on page 164. NOTE: If you choose to erase the whole hard disk, you may be asked to restart the printer several times during the process, which will take about 6 hours with Secure Disk Erase or 24 hours with Secure Sanitizing Erase. ENWW Secure Disk Erase 113

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Non-Secure Fast Erase:
all pointers to the information are erased. The information itself remains on the
hard disk until the disk space it occupies is needed for other purposes, and it is then overwritten. While it
remains on the disk, it is
difficult
for most people to access, but may be accessed using software designed
for the purpose. This is the normal method in which
files
are erased on most computer systems; it is the
fastest method but the least secure.
Secure Fast Erase:
all pointers to the information are erased, and the information itself is also overwritten
with a
fixed
character pattern. This method is slower than Non-Secure Fast Erase, but more secure. It may
still be possible to access fragments of the erased information by using special tools to detect residual
magnetic traces.
Secure Sanitizing Erase:
all pointers to the information are erased, and the information itself is repetitively
overwritten using an algorithm designed to eliminate any residual traces. This is the slowest method, but
the most secure. Secure Sanitizing Erase meets the US Department of Defense 5220-22.m requirements
for clearing and sanitization of disk media. This is the default security level when using Secure Disk Erase.
Secure Disk Erase is one of the facilities provided by Web JetAdmin, which is HP's free Web-based print
management software: see
go/webjetadmin
.
If you have
difficulty
in using Secure Disk Erase from Web JetAdmin, contact HP Support: see
Contact HP Support
on page
164
.
NOTE:
If you choose to erase the whole hard disk, you may be asked to restart the printer several times during
the process, which will take about 6 hours with Secure Disk Erase or 24 hours with Secure Sanitizing Erase.
ENWW
Secure Disk Erase
113