This is the fourth in a series revisiting Ball in Your Court columns and posts from the primordial past of e-discovery–updating and critiquing in places, and hopefully restarting a few conversations. As always, your comments are gratefully solicited.
Give Away Your Computer
[Originally published in Law Technology News, July 2005]
With the price of powerful computer systems at historic lows, who isn’t tempted to upgrade? But, what do you do with a system you’ve been using if it’s less than four or five-years old and still has some life left in it? Pass it on to a friend or family member or donate it to a school or civic organization and you’re ethically obliged to safeguard client data on the hard drive. Plus, you’ll want to protect your personal data from identity thieves and snoopers. Hopefully you already know that deleting confidential files and even formatting the drive does little to erase your private information—it’s like tearing out the table of contents but leaving the rest of the book. How do you be a Good Samaritan without jeopardizing client confidences and personal privacy?
Options
One answer: replace the hard drive with a new one before you donate the old machine. Hard drives have never been cheaper, and adding the old hard drive as extra storage in your new machine ensures easy access to your legacy data. But, it also means going out-of-pocket and some surgery inside both machines—not everyone’s cup of tea.
Alternatively, you could remove or destroy the old hard drive, but those accepting older computers rarely have the budget to buy hard drives, let alone the technician time to get donated machines running. Donated systems need to be largely complete and ready to roll.
Probably the best compromise is to wipe the hard drive completely and donate the system recovery disk along with the system. Notwithstanding some largely theoretical notions, once you overwrite every sector of your hard drive with zeros or random characters, your data is gone forever. The Department of Defense recommends several passes of different characters, but just a single pass of zeros is enough to frustrate all computer forensic data recovery techniques in common use. Continue reading








