Secure deletion | Fluid Attacks Help

Secure deletion

Laptops

When a talent leaves the company, their computer is locked through our MDM (Mobile Device Management) solution on their last day of work. Once we physically manage the device, a secure deletion process is completed as follows:

  1. The device is selected in the MDM console
  2. The Erase device command is chosen
  3. That command is executed


Several actions are performed in the device when the command is executed:

  • Sign the end user out of all Apple services, such as iCloud
  • Remove fingerprints from Touch ID
  • Unpair Bluetooth accessories
  • Turn off Find My Mac and Activation Lock
  • Erase apps, data, and user settings
  • Erase all other volumes, including system volumes, using BOOTCAMP

It is unnecessary to physically destroy hard drives for devices if they have successfully passed the data erasure process through the MDM.

Mobile phones and tablets

The previously described process is also applied to this type of device. All SIM cards must be removed before disposal, and data must be erased on all memory cards that may reside in the unit.