Technical data

6.5 Deletion methods
6.5.1.3 High security – 7 runs
This deletion method provides internationally approved security against recovering deleted
data even in a special data recovery laboratory. That is why its 7 runs require a certain peri -
od of time to perform the deletion.
6.5.2 Standards
This category allows you to perform the deletion according to one of the international stand-
ards. This category is particularly designed for users having to or wanting to fulfil a certain dele-
tion standard for themselves or for their clients. Simply select the desired standard and the de-
letion will be performed according to the parameters required by this standard.
6.5.2.1 VSITR
Country: Germany
Origin: Bundesministerium des Innern (BMI) – German department of the interior
Passes: 1
6.5.2.2 BSI-GSB
Country: Germany
Origin: Bundesamt für Sicherheit in der Informationstechnik
Passes: 3
6.5.2.3 ACSI 33
Country: Australia
Origin: Communications-Electronic Security Instruction
Passes: 16
6.5.2.4 AFSSI 5020
Country: USA
Origin: Air Force System Security Instruction
Passes: 4
6.5.2.5 AR380-19
Country: USA
Origin: Army Regulation – Information Systems Security
Passes: 3
6.5.2.6 DoD5200.28M
Country: USA
Origin: Department of Defense – ADP Security Manual
Passes: 3
6.5.2.7 DoD5220.22M
Country: USA
Origin: Department of Defense National Industrial Security Program Operating Manual
(NISPOM)
Passes: 4
6.5.2.8 NCSC-TG-025
Country: USA
42