Lenovo ThinkPad T520 (English) User Guide - Page 127

Notice on deleting data from your hard disk drive or solid state, Using and understanding firewalls - recovery disk download

Page 127 highlights

Notice on deleting data from your hard disk drive or solid state drive As computers spread into every corner of life, they process more and more information. The data on your computer, some of which is sensitive, is stored on a storage device, either a hard disk drive or solid state drive. Before you dispose of, sell, or hand over your computer, make sure to delete data stored on it. Handing your computer over to someone else without deleting the loaded software, such as operating systems and application software, may even violate License Agreements. You are advised to check the terms and conditions of those Agreements. There are methods that seem to delete the data: • Move the data to the recycle bin, and then choose the Empty recycle bin command. • Use the Delete command. • Format your hard disk drive or solid state drive, using the software for initializing it. • Using the recovery program, provided by Lenovo, bring the hard disk drive or the solid state drive back to factory-ship state. These operations, however, only change the file allocation of the data; they do not delete the data itself. In other words, the data retrieval processing is disabled under an operating system such as Windows. The data is still there, even though it seems to be lost. Thus, it is sometimes possible to read the data by use of special software for data recovery. There is a risk that people of bad faith may read and misuse the critical data on hard disk drives or solid state drives for unexpected purposes. To prevent leakage of data, it becomes very important that you take responsibility for deleting all the data from the hard disk drive or solid state drive when you dispose of, sell, or hand over your computer. You can destroy the data physically by smashing the hard disk drive with a hammer, or magnetically by means of strong magnetic power, thus making the data unreadable. But we recommend that you make use of the software (payware) or service (pay service) specifically developed for the purpose. For disposing of data on the hard disk drive, Lenovo provides the Secure Data Disposal tool. To download the tool, go to the Lenovo Web site at http://support.lenovo.com. Note: Running the application will take a couple of hours. If Encryption solid state drive or Disk Encryption hard disk drive is supported and installed in your computer, you can logically dispose of all the data on a device in a very short time by erasing the cryptographic key. The data encrypted with the old key is not physically erased but remains on the disk; however, it cannot be decrypted without the old key. This feature is enabled by the ThinkPad Setup Menu Extension Utility and is available as a menu item in the ThinkPad Setup. Using and understanding firewalls If your system is preintalled with a firewall program, it protects against computer Internet security threats, unauthorized access, intrusions, and Internet attacks. It also protects your privacy. For more information about how to use the firewall program, refer to the on-line help that comes with the program. Protecting data against viruses Your computer is preinstalled with an antivirus program so you can detect and eliminate viruses. The antivirus program is designed to help you detect and eliminate viruses. Chapter 4. Security 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297

Notice on deleting data from your hard disk drive or solid state drive
As computers spread into every corner of life, they process more and more information. The data on your
computer, some of which is sensitive, is stored on a storage device, either a hard disk drive or solid state
drive. Before you dispose of, sell, or hand over your computer, make sure to delete data stored on it.
Handing your computer over to someone else without deleting the loaded software, such as operating
systems and application software, may even violate License Agreements. You are advised to check the
terms and conditions of those Agreements.
There are methods that seem to delete the data:
Move the data to the recycle bin, and then choose the Empty recycle bin command.
Use the Delete command.
Format your hard disk drive or solid state drive, using the software for initializing it.
Using the recovery program, provided by Lenovo, bring the hard disk drive or the solid state drive back
to factory-ship state.
These operations, however, only change the file allocation of the data; they do not delete the data itself. In
other words, the data retrieval processing is disabled under an operating system such as Windows. The
data is still there, even though it seems to be lost. Thus, it is sometimes possible to read the data by use of
special software for data recovery. There is a risk that people of bad faith may read and misuse the critical
data on hard disk drives or solid state drives for unexpected purposes.
To prevent leakage of data, it becomes very important that you take responsibility for deleting all the data
from the hard disk drive or solid state drive when you dispose of, sell, or hand over your computer. You can
destroy the data physically by smashing the hard disk drive with a hammer, or magnetically by means of
strong magnetic power, thus making the data unreadable. But we recommend that you make use of the
software (payware) or service (pay service) specifically developed for the purpose.
For disposing of data on the hard disk drive, Lenovo provides the Secure Data Disposal tool. To download
the tool, go to the Lenovo Web site at http://support.lenovo.com.
Note:
Running the application will take a couple of hours.
If Encryption solid state drive or Disk Encryption hard disk drive is supported and installed in your computer,
you can logically dispose of all the data on a device in a very short time by erasing the cryptographic key.
The data encrypted with the old key is not physically erased but remains on the disk; however, it cannot be
decrypted without the old key. This feature is enabled by the ThinkPad Setup Menu Extension Utility and is
available as a menu item in the ThinkPad Setup.
Using and understanding firewalls
If your system is preintalled with a firewall program, it protects against computer Internet security threats,
unauthorized access, intrusions, and Internet attacks. It also protects your privacy.
For more information about how to use the firewall program, refer to the on-line help that comes with
the program.
Protecting data against viruses
Your computer is preinstalled with an antivirus program so you can detect and eliminate viruses. The
antivirus program is designed to help you detect and eliminate viruses.
Chapter 4
.
Security
109