Getting rid of old computers gets trickier every day. A Symantec podcast offers three minutes' worth of good advice on how to do so safely.

Keith Ferrell, Contributor

May 20, 2008

2 Min Read

Getting rid of old computers gets trickier every day. A Symantec podcast offers three minutes' worth of good advice on how to do so safely.I've talked a lot here about the persistence of data -- whatever you think you may have gotten rid of, you may not have.

A small and midsize business podcast on this subject from Symantec offers some important, general reminders on what to do before you ditch that PC, notebook or handheld device.

The podcast, How To Properly Discontinue The Use of Old Computers (available here) is good on the discontinue portion of the process, particularly the importance (overlooked more often than you might think) of insuring that all the information you need from the old machine has been replicated elsewhere.

Bearing in mind that the 'cast is only three minutes long, and of necessity very general, I'd still take some issue with the security company's perspective on wiping the disk clean of data. Symantec is of course correct about not relying the operating system's delete or desktop trashcan functions to remove sensitive information.

Likewise bearing in mind that Symantec offers disk-wipe solutions among its security and utility suites -- and the podcast is admirably low-key about pushing them -- I'd still argue that the safest way to dispose of a computer is to do so after removing the hard disk after you've wiped it clean.

And, once removed, either physically destroy, melt, disintegrate or otherwise end its existence, or store it with other data-bearing disks whose hardware homes have been gotten rid of.

Belt and suspenders? Yep -- overkill, sure, but you won't be caught with your pants down.

Nice that Symantec suggests donating cast-off computers to worthy causes or, if the junk heap is where they're headed, recommends environmentally friendly, green disposal. Here are some computer recycling sources bMighty's readers recommend.

About the Author(s)

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights