With the release of the current macOS 26 Tahoe, Apple continues its steady march toward stronger default security. One significant change is that FileVault disk encryption is now enabled by default for users who sign in with an Apple ID during setup. This ensures that even if a Mac is lost or stolen, the data on its drive remains protected at the hardware level.
NIST 800-88 and Data Erasure Verification
NIST 800-88 guidelines mandate that after data sanitization, organizations or contractors must verify data unavailability and provide certification if requested. Your company should retain written proof of data sanitization.
The Register reached out to DriveSavers for expert commentary regarding this topic.
When organizations retire laptops, servers, hard drives, or solid-state storage, most believe they are following the NIST 800-88 guidelines for data sanitization to eliminate risk and ensure compliance. However, a high-profile case covered in a recent article by The Register reported that a company faced over $150 million in fines and settlements, revealing a critical oversight:
Data erasure doesn’t guarantee that data is gone.
Whether you’re dealing with HDDs, SSDs, RAID arrays, or standalone systems, modern storage technologies can leave recoverable data behind — even after “secure” deletion. Inconsistent command behavior, hidden sectors, firmware-level quirks, and incomplete sanitization processes all contribute to a single risk: data that remains accessible when it shouldn’t.
That’s why data erasure verification is essential.
In this article, we’ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.
What NIST 800-88 Actually Says
The NIST Special Publication 800-88 Revision 1 is the leading data sanitization guideline used by federal agencies, corporations, and regulated industries. It provides a flexible but rigorous framework for determining how to securely erase data from any type of storage device — from individual hard drives and SSDs to servers, multi-drive arrays, and removable media.
But here’s what many miss:
NIST 800-88 doesn’t prescribe specific tools — it defines outcomes.
To be compliant, your sanitization process must render data unrecoverable by any known forensic method. NIST doesn’t care how you get there — only that you do it.
The Three Sanitization Methods
NIST outlines three levels of data sanitization, depending on the sensitivity of the data and how the media will be handled afterward:
Clear
Overwrites the storage space with non-sensitive data using standard read/write commands. This may involve reformatting, factory resets, or basic overwrite tools. However, some sectors — especially those used for system logs or wear-leveling — may not be accessible with this method.
Purge
Uses more advanced techniques such as cryptographic erase or secure erase commands built into storage firmware. This method targets inaccessible areas of the device and provides greater assurance that data cannot be recovered — even from hidden or remapped sectors.
Destroy
Physically damages the media (e.g., shredding, melting, incineration) to prevent reuse and eliminate any possibility of recovery. Often used for highly sensitive data or when a device is leaving organizational control.
Why This Matters
Even if your IT team or vendor performs a wipe that seems to follow these categories, NIST compliance requires evidence that the outcome was achieved — not just that a method was applied.
This is the critical compliance gap many organizations overlook — and where data erasure verification becomes essential.
Where Secure Erasure Falls Short
Following NIST 800-88 is a critical step in secure data disposal — but even when organizations apply the right sanitization method (Clear, Purge, or Destroy), that doesn’t guarantee the outcome.
In real-world conditions, data can remain recoverable from a wide range of storage devices, including hard disk drives (HDDs), solid-state drives (SSDs), enterprise servers, and multi-drive storage systems. These risks stem not from intent, but from the technical and operational complexity of modern data storage.
“Just because a drive has been ‘erased’ doesn’t always mean the data is truly gone.”

Mike Cobb
Director of Engineering at DriveSavers, via The Register
Common Failure Points in Erasure Processes
Residual Data in Inaccessible Areas
Many storage devices include sectors that standard overwrite tools can’t reach — including remapped blocks, bad sectors, overprovisioned space, and system-reserved regions. On HDDs, this can include HPA (Host Protected Area); on SSDs, wear-leveling and hidden reserves create similar challenges.
Inconsistent Firmware Behavior
Secure erase commands (including those built into drive firmware) are not consistently implemented across vendors. In some cases, the command may execute without fully sanitizing all logical and physical areas of the device.
Complex Server & RAID Configurations
In servers and storage arrays, data may be mirrored, striped, or cached across multiple drives — making it difficult to verify that every copy of every block has been fully erased. Misconfigured logical volumes or leftover snapshots can also persist without detection.
Encryption ≠ Erasure
While encryption helps reduce recoverability, it’s only effective if the encryption keys are fully destroyed. If keys are stored in external systems (e.g., cloud-based BitLocker recovery), the encrypted data may still be vulnerable.
Why It’s a Compliance Risk
From a distance, it may look like the erasure process completed successfully. But without independently validating the result, organizations run the risk of:
Leaking sensitive data via decommissioned or resold devices
Failing audits for regulatory frameworks like HIPAA, GLBA, or GDPR
Assuming NIST 800-88 compliance — without achieving it
At DriveSavers, we have found data on devices that had been “wiped” according to standard procedures — including enterprise HDDs, encrypted SSDs, and data center hardware slated for recycling.
The problem isn’t usually what was done — it’s that no one verified that the process worked.
The Legal and Compliance Stakes
Technical oversights in data sanitization aren’t just operational risks — they are also legal liabilities. When data remains accessible on decommissioned devices, organizations may find themselves in violation of privacy regulations, industry rules, or contractual obligations, regardless of whether the erasure process was followed in good faith.
Regulatory bodies and courts don’t just ask what method you used — they ask how you know it worked.
This applies to all types of media: HDDs in servers, SSDs in laptops, and drives pulled from enterprise storage arrays. If a device held sensitive or regulated data and is later found to contain recoverable information, your organization can be held responsible.
Key Regulations That Require Verified Data Destruction
HIPAA
(Health Insurance Portability and Accountability Act)
Healthcare organizations must safeguard and properly dispose of patient records, including those stored on electronic media.
GLBA
(Gramm-Leach-Bliley Act)
Financial institutions are required to protect customer information under the Safeguards Rule — including through secure data disposal.
FTC Disposal Rule
Requires businesses to take “reasonable measures” to dispose of consumer data stored on digital media — not just attempt to delete it.
CCPA & GDPR
Global privacy laws are increasingly demanding that personal data be securely deleted upon request or when no longer necessary — and that organizations prove it has been erased.
The Cost of Assumption: A Real-World Example
In a widely reported case covered by The Register, Morgan Stanley relied on a third-party vendor to handle the disposal of old storage equipment. That vendor sold thousands of devices without properly wiping the data — leading to the exposure of personally identifiable information (PII).
Despite outsourcing the work, Morgan Stanley was still held responsible:
$35 million SEC fine
$60 million from the Office of the Comptroller of the Currency
$60 million class action settlement
Total liability: $155 million
The failure wasn’t that the data wasn’t supposed to be erased — it was that no one verified that it was.
Why Verification Matters
If your organization is audited, sued, or asked to demonstrate compliance, intent is no defense without proof. This is where erasure verification becomes an essential risk management and legal protection tool — not just a technical step.
A certificate of destruction or verification can make the difference between a compliance gap and a defensible position.
Introducing Erasure Verification: Closing the Loop
If your organization follows NIST 800-88 and applies the appropriate erasure method — Clear, Purge, or Destroy — you’re already on the right track. But in regulated and high-risk environments, that’s only part of the equation.
Don’t miss the step that proves it worked.
Erasure verification is the final layer in a comprehensive data sanitization process, a method to ensure that the storage media no longer contain recoverable data and provide documentation to prove it.
What Is Erasure Verification?
Erasure verification is a forensic validation process that confirms whether data was fully and effectively removed from a storage device — using techniques that go beyond what standard erasure tools or IT audits can detect.
The Data Erasure Verification Service at DriveSavers was built specifically to help organizations close the compliance and assurance gap. After decades of recovering data from devices assumed to be clean, we designed a way to test for failure — before it becomes a breach.
What the Process Looks Like
1 Submission: You provide the device(s) for verification — individual drives, entire servers, or mixed inventory.
2 Forensic Analysis: Our engineers conduct data recovery testing using both industry-standard and proprietary methods to detect residual data.
3 Detailed Reporting: We deliver a report indicating whether any recoverable data was found, the type of data it was, and its location.
4 Certificate of Verification: For devices that pass, we issue formal documentation confirming that the media meets NIST 800-88 outcome expectations — a valuable asset for audits and internal records.
When to Use a Verification Service
Verification isn’t necessary for every device or scenario; however, in cases involving high-risk data, regulated industries, or large-scale decommissioning, it becomes essential. In these situations, the difference between assumed compliance and actual protection can come down to proof.
It’s not just about erasing data—it’s about proving it’s been erased— across all media types, at every stage of the disposition process.
Here are the most common — and most critical — times to use a data erasure verification service.
Key Scenarios for Erasure Verification
Device Retirement
Decommissioning end-user laptops, servers, or data center equipment requires verification to ensure that erasure efforts are effective — even across large inventories and varied device types.
Regulatory or Internal Audit Preparation
Industries bound by HIPAA, GLBA, GDPR, or other privacy laws often require organizations to demonstrate that devices were properly sanitized. Verification provides documentation you can show to auditors or legal teams — not just logs or vendor claims.
Vendor Oversight and Erasure Validation
If you rely on a third-party ITAD provider, recycler, or internal IT team, verification offers objective confirmation that their process meets expectations — before liability leaves your hands.
Before Resale, Donation, or Redeployment
Devices that will leave your organizational control should be verified after they have been encrypted or wiped. Once a device is out of your possession, recovery risk becomes your responsibility.
Testing New Tools or Processes
Planning to switch erasure software, update sanitization SOPs, or onboard a new vendor? Verification allows you to test outcomes in a controlled setting, so you’re confident before going live.
A Practical, Defensible Layer of Assurance
Verification helps IT leaders confirm their work, provides compliance teams with documentation to stand on, and protects the business in the event of an issue.
Conclusion: Verify
Following NIST 800-88, using secure erasure tools, and engaging qualified vendors are all important steps in protecting data — but none of them guarantee that the job is complete.
Assumption is not assurance, whether you’re sanitizing laptops, HDDs in servers, SSDs in workstations, or storage arrays from the data center.
In high-risk and regulated environments, organizations are expected to do more than act in good faith — they’re expected to provide proof. That proof isn’t built into the erasure process itself. It comes from independently verifying that the data is gone and having the documentation to stand behind that claim.
This is why erasure verification matters:
It supports your compliance strategy
It protects your audit trail
It reinforces trust in your processes
And it reduces the risk that something missed today becomes tomorrow’s liability


