{"id":80314,"date":"2025-10-09T10:01:49","date_gmt":"2025-10-09T17:01:49","guid":{"rendered":"https:\/\/drivesaversdatarecovery.com\/?p=80314"},"modified":"2026-03-03T01:11:42","modified_gmt":"2026-03-03T09:11:42","slug":"nist-800-88-and-data-erasure-verification","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-800-88-and-data-erasure-verification\/","title":{"rendered":"NIST 800-88 and Data Erasure Verification"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div id=\"case-study-image-and-title\" class=\"vc_section blog-header-top-padding vc_custom_1742716765886 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t  <style>\n\n\n.blog-educational-image img {}\n\n.vcex-video.wpex-bg-black {\n  border-radius: 15px;\n  overflow: hidden;\n}\n\n.vcex-video-inner video {\n  border-radius: 15px;\n}\n\n.vcex-image vcex-image-img {\n  border-radius: 15px;\n}\n\n\n.case-study-video {\nborder-radius: 15px !important;\n}\n\n.cs-red-heading {\n      color: #EC0912;\nfont-weight: 600;\n    }\n.vcex-heading-inner {\nmargin-bottom:12px;\n}\n        .single-post-title {\n            display: none;\n        }\n    ul.meta {\n       display:none;\n        }\n\n.parent-div {\n  display: flex !important;       \/* Lay the items out in a row by default (desktop) *\/\n  flex-wrap: nowrap !important;   \/* Prevent wrapping on large screens *\/\n}\n\n\/* When the screen is below, say, 768px, wrap and make each child 50% width *\/\n@media (max-width: 768px) {\n  .parent-div {\n    flex-wrap: wrap !important;   \/* Allow wrapping on smaller screens (mobile) *\/\nfont-size: 15px !important;\n  }\n  .parent-div > div {\n    width: 50% !important;        \/* 2 columns (two items per row) *\/\n    box-sizing: border-box !important; \n  }\n.cs-quote-headshot {text-align: center;margin-bottom:13px;}\n.cs-quote-box {\n    margin-left: 30px;\n    margin-right: 30px;\n\n}\n.cs-quote-headshot-image {\nmax-width: 170px;\nmargin-bottom:13px;\nmargin: auto;\n}\n.cs-quote-nametitle {\ntext-align: center !important;\nalign-items: center !important;\n}\n\n}\n\n.cs-main-image-header .wpex-p-30 {\n    padding: 0 !important;\n    padding-left: 3% !important;\n    padding-bottom: 3% !important;\n}\n\n.cs-main-image-header .wpex-items-center {\n    align-items: end !important;\n}\n\n@media screen and (max-width: 1300px) {\n    .cs-main-image-header .vcex-ib-content .vcex-ib-title {\n        font-size: 3.5vw !important;\n    }\n\n    .cs-main-image-header .vcex-ib-content .vcex-ib-caption {\n        font-size: 5.5vw !important;\n    }\n}\n\n.cs-main-image-header .vcex-ib-content {\n text-shadow: 0 0 10px #000; \n}\n\n\/* \u2705 Normalize all watermark containers *\/\n[class*=\"blog-watermark-\"] .vcex-image-inner {\n    position: relative;\n    display: block !important;   \/* Force block layout to override wpex-inline-block *\/\n    width: 100%;\n    height: auto;\n    line-height: 0;              \/* Remove inline spacing *\/\n    text-align: left;\n    vertical-align: top;\n}\n\n\/* \u2705 Normalize the image itself *\/\n[class*=\"blog-watermark-\"] .vcex-image-img {\n    display: block;\n    width: 100%;\n    height: auto;\n}\n\n\/* \u2705 Bottom Right Watermark *\/\n.blog-watermark-low-right .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    bottom: 2%;\n    right: -5% !important;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20%;\n    height: 20%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\/* \u2705 Bottom Left Watermark *\/\n.blog-watermark-low-left .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    bottom: 2%;\n    left: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20%;\n    height: 20%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\/* \u2705 Top Right Watermark *\/\n.blog-watermark-up-right .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    top: 2%;\n    right: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 15%;\n    height: 15%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\/* \u2705 Top Left Watermark *\/\n.blog-watermark-up-left .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    top: 2%;\n    left: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20%;\n    height: 20%;\n    pointer-events: none;\n    z-index: 10;\n}\n\n.blog-watermark-first .vcex-image-inner {\n    position: relative !important;\n    display: block !important;\n    width: 100% !important;\n    height: auto !important;\n    line-height: 0 !important;\n    text-align: left !important;\n    vertical-align: top !important;\n}\n\n\/* Optional: Fix the image itself too *\/\n.blog-watermark-first .vcex-image-img {\n    display: block !important;\n    width: 100% !important;\n    height: auto !important;\n}\n\n\/* Force the watermark position *\/\n.blog-watermark-first .vcex-image-inner::after {\n    content: \"\";\n    position: absolute;\n    bottom: 2%;\n    right: 2%;\n    background-image: url('https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/02\/DriveSavers-Logo-Web-1.png');\n    background-size: contain;\n    background-repeat: no-repeat;\n    width: 20% !important;\n    height: 20% !important;\n    pointer-events: none;\n    z-index: 10;\n}\n\n\n@media screen and (max-width: 768px) {\n  .cs-main-image-header .wpex-p-30 {\n    padding-bottom: 1% !important;\n  }\n}\n\n  <\/style>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative visible-phone no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 50px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1738079979763 wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-image-banner.vcex_69dea062debed .vcex-ib-overlay-bg{background-color:#000000;opacity:0.5;}.vcex-image-banner.vcex_69dea062debed .vcex-ib-title{color:#fefefe;font-size:45px;font-family:'DM Sans', sans-serif;font-weight:600;}.vcex-image-banner.vcex_69dea062debed .vcex-ib-caption{color:#ffffff;font-size:60px;font-family:'DM Sans', sans-serif;font-weight:600;line-height:var(--wpex-leading-snug);}@media (max-width:1024px){.vcex-image-banner.vcex_69dea062debed .vcex-ib-title{font-size:45px;}.vcex-image-banner.vcex_69dea062debed .vcex-ib-caption{font-size:60px;}}@media (max-width:959px){.vcex-image-banner.vcex_69dea062debed .vcex-ib-title{font-size:35px;}.vcex-image-banner.vcex_69dea062debed .vcex-ib-caption{font-size:38px;}}@media (max-width:767px){.vcex-image-banner.vcex_69dea062debed .vcex-ib-title{font-size:45px;}.vcex-image-banner.vcex_69dea062debed .vcex-ib-caption{font-size:60px;}}@media (max-width:479px){.vcex-image-banner.vcex_69dea062debed .vcex-ib-title{font-size:35px;}.vcex-image-banner.vcex_69dea062debed .vcex-ib-caption{font-size:38px;}}<\/style><div class=\"vcex-module vcex-image-banner wpex-flex wpex-flex-col wpex-w-100 wpex-justify-center wpex-relative wpex-overflow-hidden wpex-bg-gray-900 wpex-text-white wpex-hover-text-white wpex-text-left wpex-rounded-md vcex-has-img-tag cs-main-image-header vcex_69dea062debed\"><img  src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/erasure-verification.jpg\" class=\"vcex-ib-img wpex-block wpex-transition-all wpex-duration-500\" alt=\"Data Erasure\"><div class=\"vcex-ib-content-wrap wpex-w-100 wpex-transition-all wpex-duration-500 wpex-absolute wpex-inset-0 wpex-flex wpex-items-center wpex-p-30\"><div class=\"vcex-ib-content wpex-flex-grow wpex-mr-auto\"><h3 class=\"vcex-ib-title wpex-heading\">NIST 800-88 and<\/h3><div class=\"vcex-ib-caption wpex-text-lg wpex-last-mb-0\">Data Erasure Verification<\/div><\/div><\/div><\/div><style>.vcex_69dea062df5be{font-size:25px!important;}@media (max-width:1024px){.vcex_69dea062df5be{font-size:18px!important;}}@media (max-width:959px){.vcex_69dea062df5be{font-size:18px!important;}}@media (max-width:767px){.vcex_69dea062df5be{font-size:18px!important;}}@media (max-width:479px){.vcex_69dea062df5be{font-size:18px!important;}}<\/style>\n\t<div style=\"color:#ebebeb;\" class=\"wpb_text_column vcex_69dea062df5be has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760473571184\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>NIST 800-88 guidelines mandate that after data sanitization, organizations or contractors must verify data unavailability and provide certification if requested. Your company should retain written proof of data sanitization.<\/p>\n<p><em>The Register<\/em> reached out to DriveSavers for expert commentary regarding this topic.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"case-study-blurb-and-scenario\" class=\"vc_section vc_custom_1737675848429 wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>When organizations retire laptops, servers, hard drives, or solid-state storage, most believe they are following the <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/88\/r1\/final\" target=\"_blank\" rel=\"noopener\">NIST 800-88 guidelines for data sanitization<\/a> to eliminate risk and ensure compliance. However, a high-profile case covered in a recent article by <a href=\"https:\/\/www.theregister.com\/2025\/09\/14\/destroy_data_company_laptops_or_else\/\" target=\"_blank\" rel=\"noopener\"><i>The Register<\/i><\/a> reported that a company faced over $150 million in fines and settlements, revealing a critical oversight:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470322454\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Data erasure doesn\u2019t guarantee that data is gone.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Whether you&#8217;re dealing with HDDs, SSDs, RAID arrays, or standalone systems, modern storage technologies can leave recoverable data behind \u2014 even after \u201csecure\u201d deletion. Inconsistent command behavior, hidden sectors, firmware-level quirks, and incomplete sanitization processes all contribute to a single risk: data that remains accessible when it shouldn\u2019t.<\/p>\n<p>That\u2019s why <b>data erasure verification<\/b> is essential.<\/p>\n<p>In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between <b>intention and assurance<\/b>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545700301 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69dea062e1991{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69dea062e1991{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69dea062e1991{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69dea062e1991{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69dea062e1991{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69dea062e1991\"><span class=\"vcex-heading-inner wpex-inline-block\">What NIST 800-88 <strong><span style=\"color: #e31f26\">Actually Says<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>The <b>NIST Special Publication 800-88 Revision 1<\/b> is the leading data sanitization guideline used by federal agencies, corporations, and regulated industries. It provides a flexible but rigorous framework for determining <b>how to securely erase data from any type of storage device<\/b> \u2014 from individual hard drives and SSDs to servers, multi-drive arrays, and removable media.<\/p>\n<p>But here\u2019s what many miss:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470418087\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>NIST 800-88 doesn\u2019t prescribe specific tools \u2014 it defines outcomes.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>To be compliant, your sanitization process must render data <b>unrecoverable by any known forensic method<\/b>. NIST doesn\u2019t care how you get there \u2014 only that you do it.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>The Three Sanitization Methods<\/h3>\n<p>NIST outlines <b>three levels of data sanitization<\/b>, depending on the sensitivity of the data and how the media will be handled afterward:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1760029613704 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-4 wpex-vc_col-has-fill\"><div style=\"border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1745304237632\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062e4820{font-size:25px;}.vcex-icon.vcex_69dea062e4820 .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062e4820\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fas fa-pen\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Clear<\/strong><\/p>\n<p>Overwrites the storage space with non-sensitive data using standard read\/write commands. This may involve reformatting, factory resets, or basic overwrite tools. However, some sectors \u2014 especially those used for system logs or wear-leveling \u2014 may not be accessible with this method.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 wpex-vc_col-has-fill\"><div style=\"border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1745304623786\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062e521d{font-size:25px;}.vcex-icon.vcex_69dea062e521d .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062e521d\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fas fa-eraser\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Purge<\/strong><\/p>\n<p>Uses more advanced techniques such as cryptographic erase or secure erase commands built into storage firmware. This method targets inaccessible areas of the device and provides greater assurance that data cannot be recovered \u2014 even from hidden or remapped sectors.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1745304701063\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062e5e4a{font-size:25px;}.vcex-icon.vcex_69dea062e5e4a .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062e5e4a\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fas fa-fire-alt\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Destroy<\/strong><\/p>\n<p>Physically damages the media (e.g., shredding, melting, incineration) to prevent reuse and eliminate any possibility of recovery. Often used for highly sensitive data or when a device is leaving organizational control.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1760040049541 wpex-relative wpex-vc_row-has-fill no-bottom-margins wpex-vc-reset-negative-margin\" style=\"border-color:#000000!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12 wpex-vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1760029818507\"><div class=\"wpb_wrapper\"><style>.vcex-icon-box.vcex_69dea062e73f1 .vcex-icon-box-content{color:#7a7a7a;}.vcex-icon-box.vcex_69dea062e73f1 .vcex-icon-box-icon{font-size:25px;color:#f60000;}<\/style><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left vc_custom_1760033258764 vcex_69dea062e73f1\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--icon wpex-flex-shrink-0 wpex-mr-20\"><div class=\"vcex-icon-box-icon wpex-items-center wpex-justify-center wpex-child-inherit-color wpex-text-center wpex-leading-none wpex-flex wpex-text-1\"><span class=\"wpex-flex wpex-icon--w fas fa-search\" aria-hidden=\"true\"><\/span><\/div><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><b>Key takeaway:<\/b> The method you choose must match the <b>risk level of the data<\/b> and the <b>likelihood of media reuse or exposure<\/b>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Why This Matters<\/h3>\n<p>Even if your IT team or vendor performs a wipe that seems to follow these categories, NIST compliance requires <b>evidence that the outcome was achieved<\/b> \u2014 not just that a method was applied.<\/p>\n<p>This is the critical compliance gap many organizations overlook \u2014 and where <b>data erasure verification<\/b> becomes essential.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545710295 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69dea062e95a6{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69dea062e95a6{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69dea062e95a6{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69dea062e95a6{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69dea062e95a6{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69dea062e95a6\"><span class=\"vcex-heading-inner wpex-inline-block\">Where Secure Erasure <strong><span style=\"color: #e31f26\">Falls Short<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Following NIST 800-88 is a critical step in secure data disposal \u2014 but even when organizations apply the right sanitization method (Clear, Purge, or Destroy), that doesn\u2019t guarantee the outcome.<\/p>\n<p>In real-world conditions, data can remain recoverable from <b>a wide range of storage devices<\/b>, including hard disk drives (HDDs), solid-state drives (SSDs), enterprise servers, and multi-drive storage systems. These risks stem not from intent, but from the <b>technical and operational complexity<\/b> of modern data storage.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1760030176318 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill no-bottom-margins wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-8 wpex-vc_col-has-fill\"><div style=\"background-color:#ebebeb!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760032665166\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760031013915 quote-style\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: left;\"><em><span style=\"font-weight: 400;\">\u201cJust because a drive has been \u2018erased\u2019 doesn\u2019t always mean the data is truly gone.\u201d<\/span><\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column cstm-width vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1717161166493 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-4 vc_col-xs-4\"><div class=\"vc_column-inner vc_custom_1727284399200\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img width=\"553\" height=\"553\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2024\/05\/Mike_Cobb.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Mike_Cobb\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2024\/05\/Mike_Cobb.png 553w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2024\/05\/Mike_Cobb-300x300.png 300w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2024\/05\/Mike_Cobb-150x150.png 150w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-8 vc_col-xs-8\"><div class=\"vc_column-inner vc_custom_1726698323478\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760031041534\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Mike Cobb<\/strong><br \/>\nDirector of Engineering at DriveSavers, via The Register<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Common Failure Points in Erasure Processes<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1759165154284 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#f1f1f1!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1759164300036\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062ee2fb{font-size:25px;}.vcex-icon.vcex_69dea062ee2fb .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062ee2fb\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"vc-material vc-material-signal_cellular_no_sim\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Residual Data in Inaccessible Areas<\/strong><\/p>\n<p>Many storage devices include sectors that standard overwrite tools can\u2019t reach \u2014 including remapped blocks, bad sectors, overprovisioned space, and system-reserved regions. On HDDs, this can include HPA (Host Protected Area); on SSDs, wear-leveling and hidden reserves create similar challenges.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#f1f1f1!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1759164314087\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062ef1cb{font-size:25px;}.vcex-icon.vcex_69dea062ef1cb .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062ef1cb\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fas fa-backspace\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Inconsistent Firmware Behavior<\/strong><\/p>\n<p>Secure erase commands (including those built into drive firmware) are not consistently implemented across vendors. In some cases, the command may execute without fully sanitizing all logical and physical areas of the device.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1759165154284 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#f1f1f1!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1759164300036\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062f04dc{font-size:25px;}.vcex-icon.vcex_69dea062f04dc .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062f04dc\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fas fa-cogs\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Complex Server &amp; RAID Configurations<\/strong><\/p>\n<p>In servers and storage arrays, data may be mirrored, striped, or cached across multiple drives \u2014 making it difficult to verify that every copy of every block has been fully erased. Misconfigured logical volumes or leftover snapshots can also persist without detection.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#f1f1f1!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1759164314087\"><div class=\"wpb_wrapper\"><style>.vcex-icon.vcex_69dea062f1373{font-size:25px;}.vcex-icon.vcex_69dea062f1373 .vcex-icon-wrap{color:#f60000;}<\/style><div class=\"vcex-icon vcex-module vcex-icon-normal wpex-text-center vcex_69dea062f1373\"><div class=\"vcex-icon-wrap wpex-inline-flex wpex-items-center wpex-justify-center wpex-leading-none\"><span aria-hidden=\"true\" class=\"fas fa-unlock\"><\/span><\/div><\/div>\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Encryption \u2260 Erasure<\/strong><\/p>\n<p>While encryption helps reduce recoverability, it\u2019s only effective if the encryption keys are fully destroyed. If keys are stored in external systems (e.g., cloud-based BitLocker recovery), the encrypted data may still be vulnerable.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Why It\u2019s a Compliance Risk<\/h3>\n<p>From a distance, it may look like the erasure process completed successfully. But without independently validating the result, organizations run the risk of:<\/p>\n<p><i class=\"fas fa-exclamation-triangle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> Leaking sensitive data via decommissioned or resold devices<\/p>\n<p><i class=\"fas fa-exclamation-triangle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> Failing audits for regulatory frameworks like HIPAA, GLBA, or GDPR<\/p>\n<p><i class=\"fas fa-exclamation-triangle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> Assuming NIST 800-88 compliance \u2014 without achieving it<\/p>\n<p>At DriveSavers, we have found data on devices that had been \u201cwiped\u201d according to standard procedures \u2014 including enterprise HDDs, encrypted SSDs, and data center hardware slated for recycling.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470484251\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>The problem isn\u2019t usually <b>what<\/b> was done \u2014 it\u2019s that <b>no one verified<\/b> that the process worked.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545726432 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69dea06300d7d{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69dea06300d7d{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69dea06300d7d{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69dea06300d7d{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69dea06300d7d{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69dea06300d7d\"><span class=\"vcex-heading-inner wpex-inline-block\"><strong><span style=\"color: #e31f26\">The Legal and Compliance <\/span><\/strong>Stakes<\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Technical oversights in data sanitization aren\u2019t just operational risks \u2014 they are also legal liabilities. When data remains accessible on decommissioned devices, organizations may find themselves in violation of <b>privacy regulations, industry rules, or contractual obligations<\/b>, regardless of whether the erasure process was followed in good faith.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470545012\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Regulatory bodies and courts don\u2019t just ask <i>what method you used<\/i> \u2014 they ask <b>how you know it worked<\/b>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>This applies to all types of media: HDDs in servers, SSDs in laptops, and drives pulled from enterprise storage arrays. If a device held sensitive or regulated data and is later found to contain recoverable information, your organization can be held responsible.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Key Regulations That Require Verified Data Destruction<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1759165154284 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760035603321\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>HIPAA<br \/>\n<\/strong><\/span><strong>(Health Insurance Portability and Accountability Act)<\/strong><\/p>\n<p>Healthcare organizations must safeguard and properly dispose of patient records, including those stored on electronic media.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760035623628\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>GLBA<br \/>\n<\/strong><\/span><strong>(Gramm-Leach-Bliley Act)<\/strong><\/p>\n<p>Financial institutions are required to protect customer information under the Safeguards Rule \u2014 including through secure data disposal.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1760038383405 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760035631883\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>FTC Disposal Rule<\/strong><\/span><\/p>\n<p>Requires businesses to take \u201creasonable measures\u201d to dispose of consumer data stored on digital media \u2014 not just attempt to delete it.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760035639986\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>CCPA &amp; GDPR<\/strong><\/span><\/p>\n<p>Global privacy laws are increasingly demanding that personal data be securely deleted upon request or when no longer necessary \u2014 and that organizations <strong>prove it has been erased.<\/strong><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>The Cost of Assumption: A Real-World Example<\/h3>\n<p>In a widely reported case covered by <i>The Register<\/i>, Morgan Stanley relied on a third-party vendor to handle the disposal of old storage equipment. That vendor sold thousands of devices without properly wiping the data \u2014 leading to the exposure of personally identifiable information (PII).<\/p>\n<p>Despite outsourcing the work, <b>Morgan Stanley was still held responsible<\/b>:<\/p>\n<p><i class=\"fas fa-minus-circle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> $35 million SEC fine<\/p>\n<p><i class=\"fas fa-minus-circle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> $60 million from the Office of the Comptroller of the Currency<\/p>\n<p><i class=\"fas fa-minus-circle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> $60 million class action settlement<\/p>\n<p><b>Total liability: $155 million<\/b><\/p>\n<p>The failure wasn\u2019t that the data wasn\u2019t supposed to be erased \u2014 it was that <b>no one verified<\/b> that it was.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Why Verification Matters<\/h3>\n<p>If your organization is audited, sued, or asked to demonstrate compliance, intent is no defense without proof. This is where <b>erasure verification<\/b> becomes an essential risk management and legal protection tool \u2014 not just a technical step.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470578446\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>A certificate of destruction or verification can make the difference between a compliance gap and a defensible position.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545750569 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69dea0630a04f{color:#3e3d3e;font-size:35px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69dea0630a04f{font-size:25px;}}@media (max-width:959px){.vcex-heading.vcex_69dea0630a04f{font-size:25px;}}@media (max-width:767px){.vcex-heading.vcex_69dea0630a04f{font-size:25px;}}@media (max-width:479px){.vcex-heading.vcex_69dea0630a04f{font-size:25px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div vcex_69dea0630a04f\"><span class=\"vcex-heading-inner wpex-inline-block\">Introducing Erasure Verification: <strong><span style=\"color: #e31f26\">Closing the Loop\n<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>If your organization follows NIST 800-88 and applies the appropriate erasure method \u2014 Clear, Purge, or Destroy \u2014 you\u2019re already on the right track. But in regulated and high-risk environments, that\u2019s only part of the equation.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470633207\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Don&#8217;t miss the step that proves it worked.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><b>Erasure verification<\/b> is the final layer in a comprehensive data sanitization process, a method to ensure that the storage media no longer contain recoverable data <b>and<\/b> <b>provide<\/b> d<b>ocumentation to prove it<\/b>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>What Is Erasure Verification?<\/h3>\n<p>Erasure verification is a <b>forensic validation process<\/b> that confirms whether data was fully and effectively removed from a storage device \u2014 using techniques that go beyond what standard erasure tools or IT audits can detect.<\/p>\n<p>The <a href=\"https:\/\/drivesaversdatarecovery.com\/data-erasure-verification-service\/\"><b>Data Erasure Verification Service<\/b><\/a> at <b>DriveSavers <\/b>was built specifically to help organizations close the compliance and assurance gap. After decades of recovering data from devices assumed to be clean, we designed a way to <b>test for failure \u2014 before it becomes a breach<\/b>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>What the Process Looks Like<\/h3>\n<p><span style=\"display: inline-block; background-color: #f60000; color: white; font-size: 15px; width: 25px; height: 25px; border-radius: 50%; text-align: center; line-height: 25px; font-weight: bold; margin-left: 20px;\">1<\/span> <strong>Submission<\/strong>: You provide the device(s) for verification \u2014 individual drives, entire servers, or mixed inventory.<\/p>\n<p><span style=\"display: inline-block; background-color: #f60000; color: white; font-size: 15px; width: 25px; height: 25px; border-radius: 50%; text-align: center; line-height: 25px; font-weight: bold; margin-left: 20px;\">2<\/span> <strong>Forensic Analysis<\/strong>: Our engineers conduct data recovery testing using both industry-standard and proprietary methods to detect residual data.<\/p>\n<p><span style=\"display: inline-block; background-color: #f60000; color: white; font-size: 15px; width: 25px; height: 25px; border-radius: 50%; text-align: center; line-height: 25px; font-weight: bold; margin-left: 20px;\">3<\/span> <strong>Detailed Reporting<\/strong>: We deliver a report indicating whether any recoverable data was found, the type of data it was, and its location.<\/p>\n<p><span style=\"display: inline-block; background-color: #f60000; color: white; font-size: 15px; width: 25px; height: 25px; border-radius: 50%; text-align: center; line-height: 25px; font-weight: bold; margin-left: 20px;\">4<\/span> <strong>Certificate of Verification<\/strong>: For devices that pass, we issue formal documentation confirming that the media meets NIST 800-88 outcome expectations \u2014 a valuable asset for audits and internal records.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545760295 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative wpex-vc_section-has-fill wpex-vc-reset-negative-margin\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69dea0630f138{color:#3e3d3e;font-size:45px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69dea0630f138{font-size:30px;}}@media (max-width:959px){.vcex-heading.vcex_69dea0630f138{font-size:30px;}}@media (max-width:767px){.vcex-heading.vcex_69dea0630f138{font-size:30px;}}@media (max-width:479px){.vcex-heading.vcex_69dea0630f138{font-size:30px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div wpex-text-left vcex_69dea0630f138\"><span class=\"vcex-heading-inner wpex-inline-block\">When to Use a <strong><span style=\"color: #e31f26\">Verification Service<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Verification isn\u2019t necessary for every device or scenario; however, in cases involving high-risk data, regulated industries, or large-scale decommissioning, it becomes essential. In these situations, the difference between assumed compliance and actual protection can come down to proof.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470681830\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>It\u2019s not just about erasing data\u2014it\u2019s about <b>proving it&#8217;s been erased\u2014 across all media types, at every stage of the disposition process.<\/b><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Here are the most common \u2014 and most critical \u2014 times to use a data erasure verification service.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Key Scenarios for Erasure Verification<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1760545815220 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760038404269\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>Device Retirement<\/strong><\/span><\/p>\n<p>Decommissioning end-user laptops, servers, or data center equipment requires verification to ensure that erasure efforts are effective \u2014 even across large inventories and varied device types.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760038301095\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>Regulatory or Internal Audit Preparation<\/strong><\/span><\/p>\n<p>Industries bound by HIPAA, GLBA, GDPR, or other privacy laws often require organizations to demonstrate that devices were properly sanitized. Verification provides <strong>documentation you can show to auditors<\/strong> or legal teams \u2014 not just logs or vendor claims.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1759331870851 vc_column-gap-30 vc_row-o-equal-height vc_row-flex wpex-relative wpex-vc-has-custom-column-spacing wpex-vc-column-spacing-30 no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-4 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760038313160\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>Vendor Oversight and Erasure Validation<\/strong><\/span><\/p>\n<p>If you rely on a third-party ITAD provider, recycler, or internal IT team, verification offers <strong>objective confirmation<\/strong> that their process meets expectations \u2014 before liability leaves your hands.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 wpex-vc_col-has-fill\"><div style=\"background-color:#ffffff!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760038321596\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>Before Resale, Donation, or Redeployment<\/strong><\/span><\/p>\n<p>Devices that will leave your organizational control should be verified after they have been encrypted or wiped. Once a device is out of your possession, recovery risk becomes <strong>your responsibility<\/strong>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 wpex-vc_col-has-fill\"><div style=\"background-color:#fefefe!important;border-color:#000000!important;\" class=\"vc_column-inner vc_custom_1760038332537\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #f60000;\"><strong>Testing New Tools or Processes<\/strong><\/span><\/p>\n<p>Planning to switch erasure software, update sanitization SOPs, or onboard a new vendor? Verification allows you to <strong>test outcomes in a controlled setting<\/strong>, so you\u2019re confident before going live.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>A Practical, Defensible Layer of Assurance<\/h3>\n<p>Verification helps IT leaders confirm their work, provides compliance teams with documentation to stand on, and protects the business in the event of an issue.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_section vc_custom_1760545776117 wpex-vc-full-width-section wpex-vc-full-width-section--centered wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative no-bottom-margins\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69dea063166e9{color:#3e3d3e;font-size:45px;font-weight:400;}@media (max-width:1024px){.vcex-heading.vcex_69dea063166e9{font-size:30px;}}@media (max-width:959px){.vcex-heading.vcex_69dea063166e9{font-size:30px;}}@media (max-width:767px){.vcex-heading.vcex_69dea063166e9{font-size:30px;}}@media (max-width:479px){.vcex-heading.vcex_69dea063166e9{font-size:30px;}}<\/style><div class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-div wpex-text-left vcex_69dea063166e9\"><span class=\"vcex-heading-inner wpex-inline-block\">Conclusion: <strong><span style=\"color: #e31f26\">Verify<\/span><\/strong><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Following NIST 800-88, using secure erasure tools, and engaging qualified vendors are all important steps in protecting data \u2014 but none of them <b>guarantee<\/b> that the job is complete.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-start:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#7a7a7a;font-size:18px;letter-spacing:var(--wpex-tracking-tight);text-align:center;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1760470732642\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Assumption is not assurance, whether you&#8217;re sanitizing laptops, HDDs in servers, SSDs in workstations, or storage arrays from the data center.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"margin-block-end:20px;margin-inline:8%;border-color:#7a7a7a;\"><\/div>\n\t<div style=\"color:#6f737e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>In high-risk and regulated environments, organizations are expected to do more than act in good faith \u2014 they\u2019re expected to provide <b>proof<\/b>. That proof isn\u2019t built into the erasure process itself. It comes from independently verifying that the data is gone and having the documentation to stand behind that claim.<\/p>\n<p>This is why erasure verification matters:<\/p>\n<p><i class=\"fas fa-check-circle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> It supports your compliance strategy<\/p>\n<p><i class=\"fas fa-check-circle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> It protects your audit trail<\/p>\n<p><i class=\"fas fa-check-circle\" style=\"font-size: 25px; color: #f60000; margin-left: 20px; margin-right: 6px;\"><\/i> It reinforces trust in your processes<\/p>\n<p>And it reduces the risk that something missed today becomes tomorrow\u2019s liability<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 50px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid center-buttons-row wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_custom_1760546826996 wpex-clr\"><div class=\"theme-button-wrap textcenter wpex-clr\"><a href=\"https:\/\/drivesaversdatarecovery.com\/data-erasure-verification-service\/\" class=\"vcex-button theme-button align-center inline\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Learn more about DriveSavers Data Erasure Verification Service<\/span><\/a><\/div><\/div> <\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_custom_1760546837281 wpex-clr\"><div class=\"theme-button-wrap textcenter wpex-clr\"><a href=\"https:\/\/www.theregister.com\/2025\/09\/14\/destroy_data_company_laptops_or_else\/\" class=\"vcex-button theme-button align-center inline\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Read the original article in The Register<\/span><\/a><\/div><\/div> <\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p class=\"translation-block\">In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between <b>intention and assurance<\/b>.<\/p>","protected":false},"author":25,"featured_media":80436,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264,10570],"tags":[11455],"post_series":[],"class_list":["post-80314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-featured-homepage","tag-erasure","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIST 800-88 andData Erasure Verification<\/title>\n<meta name=\"description\" content=\"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-800-88-and-data-erasure-verification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST 800-88 and Data Erasure Verification\" \/>\n<meta property=\"og:description\" content=\"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-800-88-and-data-erasure-verification\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-09T17:01:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T09:11:42+00:00\" \/>\n<meta name=\"author\" content=\"Mike Cobb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"NIST 800-88 and Data Erasure Verification\" \/>\n<meta name=\"twitter:description\" content=\"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/NIST-800-88-Data-Erasure-Verification.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Cobb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/\"},\"author\":{\"name\":\"Mike Cobb\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\"},\"headline\":\"NIST 800-88 and Data Erasure Verification\",\"datePublished\":\"2025-10-09T17:01:49+00:00\",\"dateModified\":\"2026-03-03T09:11:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/\"},\"wordCount\":6286,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/NIST-800-88-Data-Erasure-Verification.webp\",\"keywords\":[\"erasure\"],\"articleSection\":[\"DriveSavers Blog\",\"Featured Homepage\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/\",\"name\":\"NIST 800-88 andData Erasure Verification\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/NIST-800-88-Data-Erasure-Verification.webp\",\"datePublished\":\"2025-10-09T17:01:49+00:00\",\"dateModified\":\"2026-03-03T09:11:42+00:00\",\"description\":\"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/NIST-800-88-Data-Erasure-Verification.webp\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/NIST-800-88-Data-Erasure-Verification.webp\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/nist-800-88-and-data-erasure-verification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST 800-88 and Data Erasure Verification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\",\"name\":\"Mike Cobb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"caption\":\"Mike Cobb\"},\"description\":\"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.\",\"sameAs\":[\"http:\\\/\\\/\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/en-ca\\\/author\\\/mikecobb\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST 800-88 andData Erasure Verification","description":"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-800-88-and-data-erasure-verification\/","og_locale":"en_US","og_type":"article","og_title":"NIST 800-88 and Data Erasure Verification","og_description":"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.","og_url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/nist-800-88-and-data-erasure-verification\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2025-10-09T17:01:49+00:00","article_modified_time":"2026-03-03T09:11:42+00:00","author":"Mike Cobb","twitter_card":"summary_large_image","twitter_title":"NIST 800-88 and Data Erasure Verification","twitter_description":"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.","twitter_image":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/NIST-800-88-Data-Erasure-Verification.webp","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Written by":"Mike Cobb","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/"},"author":{"name":"Mike Cobb","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6"},"headline":"NIST 800-88 and Data Erasure Verification","datePublished":"2025-10-09T17:01:49+00:00","dateModified":"2026-03-03T09:11:42+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/"},"wordCount":6286,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/NIST-800-88-Data-Erasure-Verification.webp","keywords":["erasure"],"articleSection":["DriveSavers Blog","Featured Homepage"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/","name":"NIST 800-88 andData Erasure Verification","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/NIST-800-88-Data-Erasure-Verification.webp","datePublished":"2025-10-09T17:01:49+00:00","dateModified":"2026-03-03T09:11:42+00:00","description":"In this article, we\u2019ll break down what NIST 800-88 actually requires, why storage media of all types can defy expectations, and how verification services close the gap between intention and assurance.","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/NIST-800-88-Data-Erasure-Verification.webp","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2025\/10\/NIST-800-88-Data-Erasure-Verification.webp","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/nist-800-88-and-data-erasure-verification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"NIST 800-88 and Data Erasure Verification"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Data Recovery Services","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6","name":"Mike Cobb","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","caption":"Mike Cobb"},"description":"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.","sameAs":["http:\/\/\/"],"url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/author\/mikecobb\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/80314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/comments?post=80314"}],"version-history":[{"count":1,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/80314\/revisions"}],"predecessor-version":[{"id":82179,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/80314\/revisions\/82179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media\/80436"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media?parent=80314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/categories?post=80314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/tags?post=80314"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/post_series?post=80314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}