{"id":5321,"date":"2024-10-08T08:44:13","date_gmt":"2024-10-08T07:44:13","guid":{"rendered":"https:\/\/wir-lernen-weiter.ch\/?post_type=ht_kb&#038;p=5321"},"modified":"2025-02-26T14:32:06","modified_gmt":"2025-02-26T13:32:06","slug":"audit-trail","status":"publish","type":"ht_kb","link":"https:\/\/wir-lernen-weiter.ch\/en\/knowledge-base\/audit-trail\/","title":{"rendered":"Deletion documentation"},"content":{"rendered":"<div class=\"wp-block-media-text is-stacked-on-mobile is-style-tw-shadow\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"788\" src=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635-1024x788.png\" alt=\"\" class=\"wp-image-5322 size-full\" srcset=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635-1024x788.png 1024w, https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635-300x231.png 300w, https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635-768x591.png 768w, https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635-50x38.png 50w, https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635-16x12.png 16w, https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-08-091635.png 1104w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-h-4-font-size\"><strong>Leave nothing to chance!<\/strong><\/p>\n\n\n\n<p>The clean deletion of data is an integral part of donation processing. This is documented in detail.<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon\">The association <em>Wir lernen weiter<\/em> (wLw) offers all organisations in Switzerland a secure and transparent solution for wiping data from laptops and hard drives. We rely on physical data destruction or certified erasure procedures in accordance with NIST 800-88.<br><br>All the steps taken are fully documented and thus form the <strong>Audit trail<\/strong>. This audit trail is important to ensure that every process remains traceable and verifiable. The organisation is certified in accordance with DIN-66399 (protection class 2).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Why an audit trail?<\/h4>\n\n\n\n<p>An audit trail enables organisations to provide evidence of secure and complete data destruction. It provides transparent documentation and ensures that legal data protection requirements are met. <\/p>\n\n\n\n<p>We ensure that all processes are optimised by our <strong>DIN-66399-Zertifizierung<\/strong> meet the highest security standards. This certification guarantees professional data destruction and erasure that ensures the protection of sensitive information.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Advantages of an audit trail<\/h4>\n\n\n\n<p>Every device that is passed on or sold should first be cleared of all data. A clean audit trail therefore helps with the following points:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Legal security: <\/strong>An audit trail makes it possible to provide clear evidence of data destruction in the event of audits or legal issues.<\/li>\n\n\n\n<li><strong>Safe processing:<\/strong> Organisations can demonstrate transparent processes to their own customers and partners.<\/li>\n\n\n\n<li><strong>Data protection<\/strong>Minimised risk through certified processes and documentation that enable and identify data erasure in the first place.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Our audit documents at a glance:<\/h4>\n\n\n\n<p><strong>Confirmation of receipt \/ dispatch<\/strong>Documents the handover of devices and data carriers. This confirmation of receipt shows how many devices were received by us or sent to us. It also contains a PAR number (unique identification of the donor) and a LOT number (unique identification of the collection).<\/p>\n\n\n\n<p><strong>Running sheet: <\/strong>\"Runs\" with the donation as long as it is being processed.<\/p>\n\n\n\n<p><strong>Data cleansing certificate<\/strong>Confirms the secure data erasure of a device. Each device is uniquely identified with a WLW number. Each of these documents also refers to the corresponding collection and its own data carriers.<\/p>\n\n\n\n<p><strong>Certificate of deletion<\/strong>Certifies the data deletion or destruction of a data carrier in accordance with the specifications of NIST 800-88 and DIN 66399. Each data carrier is uniquely identified with a DRV number.<\/p>\n\n\n\n<p><strong>Destruction video<\/strong>: Documents the physical destruction of hard discs using video recordings. The complete destruction process per data carrier is recorded from three angles.<\/p>\n\n\n\n<p><strong>Batch overview<\/strong>Summarises the processing of an entire batch, including the number of processed devices and data carriers, as well as the donation value. A CSV list with all serial numbers is also created.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Storage and data protection<\/h4>\n\n\n\n<p>All unslaked appliances or appliances still to be processed are stored in a hardened and locked storage area. Only employees who have completed appropriate safety training have access to this area. <\/p>\n\n\n\n<p>The processing site is burglar-proof, has a video surveillance system and an alarm system that alerts us or the police in the event of a break-in. <\/p>\n\n\n\n<p>Data protection is our top priority. Our employees and volunteers are bound by strict non-disclosure agreements to ensure the protection of our customers' sensitive data.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Document storage<\/h4>\n\n\n\n<p><em>Wir lernen weiter<\/em> offers password-protected access to the document platform, where all of an organisation's documents are collected. These can be downloaded within 30 days and then obtained on request. The data is stored securely for at least 10 years.<\/p>\n\n\n\n<p>Our processes are subject to regular internal and external audits to ensure that all DIN-66399 and NIST 800-88 requirements are consistently met. This enables us to guarantee the highest quality and security in data processing at all times.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">FAQ<\/h4>\n\n\n\n<p><strong>What is DIN-66399 and NIST 800-88?<\/strong><\/p>\n\n\n\n<div class=\"collapseomatic\" id=\"id69d7a11a93f5d\"  tabindex=\"0\" title=\"Answer\"    >Answer<\/div><div id=\"target-id69d7a11a93f5d\" class=\"collapseomatic_content\">\n\n\n\n<p><strong>DIN-66399<\/strong>This standard specifies standards for the secure destruction of data storage media, including particle sizes and security levels. <em>Wir lernen weiter<\/em> fulfils these requirements to guarantee the highest safety standards.<\/p>\n\n\n\n<p><strong>NIST 800-88<\/strong>An internationally recognised standard for the secure erasure of data on digital storage media. Our procedures are based on these best practices to securely purge data carriers.<\/p>\n\n\n\n<\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Who processes devices?<\/strong><\/p>\n\n\n\n<div class=\"collapseomatic\" id=\"id69d7a11a93ffc\"  tabindex=\"0\" title=\"Answer\"    >Answer<\/div><div id=\"target-id69d7a11a93ffc\" class=\"collapseomatic_content\">\n\n\n\n<p>Employees and volunteers who have passed our security checks. This includes obtaining extracts from debt collection and criminal records, signing non-disclosure agreements and several personal interviews. Every work process is traceable.<\/p>\n\n\n\n<\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Who processes data carriers?<\/strong><\/p>\n\n\n\n<div class=\"collapseomatic\" id=\"id69d7a11a94017\"  tabindex=\"0\" title=\"Answer\"    >Answer<\/div><div id=\"target-id69d7a11a94017\" class=\"collapseomatic_content\">\n\n\n\n<p>As soon as a data storage medium needs to be removed, the processing and IT operations managers are authorised to carry out these operations. Visual and acoustic signals will sound on the work surface if this occurs.<\/p>\n\n\n\n<\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>What technical procedures are used for erasure?<\/strong><\/p>\n\n\n\n<div class=\"collapseomatic\" id=\"id69d7a11a9402b\"  tabindex=\"0\" title=\"Answer\"    >Answer<\/div><div id=\"target-id69d7a11a9402b\" class=\"collapseomatic_content\">\n\n\n\n<p>The data erasure procedures are different for each data carrier and depend on the manufacturer and model, among other things. Our proprietary erasure system automatically selects the appropriate procedure. <\/p>\n\n\n\n<p>Successful data erasure is verified using mathematical models and comparative data, which are temporarily stored in the device's working memory.<\/p>\n\n\n\n<\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>According to which specifications are data carriers destroyed?<\/strong><\/p>\n\n\n\n<div class=\"collapseomatic\" id=\"id69d7a11a9403e\"  tabindex=\"0\" title=\"Answer\"    >Answer<\/div><div id=\"target-id69d7a11a9403e\" class=\"collapseomatic_content\">\n\n\n\n<p>Our shredder systems are designed for the following material classes on SK2:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SSDs and motherboards<\/strong>E-3 (particle size = max. 160mm2)<\/li>\n\n\n\n<li><strong>HDDs up to 2.5\u2033: <\/strong>H-4 (particle size = max. 2'000mm2)<\/li>\n\n\n\n<li><strong>HDDs up to 3.5\u2033: <\/strong>H-3 <\/li>\n<\/ul>\n\n\n\n<p>USB sticks, CDs and other possible data carriers are also destroyed after E-3. <\/p>\n\n\n\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Sample documents<\/h4>\n\n\n\n<p>Proof of purge per laptop<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-29166.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WLW-29166.\"><\/object><a id=\"wp-block-file--media-e821a8ba-fe6a-4112-b19a-72bcf7d86ecb\" href=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-29166.pdf\">WLW-29166<\/a><a href=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-29166.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e821a8ba-fe6a-4112-b19a-72bcf7d86ecb\">Download<\/a><\/div>\n\n\n\n<p>Erasure certificate per data carrier<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-29166_DRV-11848.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WLW-29166_DRV-11848.\"><\/object><a id=\"wp-block-file--media-4126c9c0-a1b6-4c98-9479-b4ece8b11039\" href=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-29166_DRV-11848.pdf\">WLW-29166_DRV-11848<\/a><a href=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-29166_DRV-11848.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4126c9c0-a1b6-4c98-9479-b4ece8b11039\">Download<\/a><\/div>\n\n\n\n<p>Video of a hard disc destruction<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-14c56154-96db-4723-b455-cbc74c5ab44c\" href=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-31661_DRV-14123_Video.mp4\">WLW-31661_DRV-14123_Video<\/a><a href=\"https:\/\/wir-lernen-weiter.ch\/wp-content\/uploads\/2024\/10\/WLW-31661_DRV-14123_Video.mp4\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-14c56154-96db-4723-b455-cbc74c5ab44c\">Download<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Leave nothing to chance! The clean deletion of data is an integral part of donation processing. This is documented in detail. Why an audit trail? An audit trail enables organisations to provide evidence of secure and complete data erasure. It provides transparent documentation and ensures that legal data protection requirements are met. We make sure that all processes are checked by our...<\/p>","protected":false},"author":6,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"ht-kb-category":[51],"ht-kb-tag":[],"class_list":["post-5321","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-unsere-arbeit"],"_links":{"self":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb\/5321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/comments?post=5321"}],"version-history":[{"count":11,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb\/5321\/revisions"}],"predecessor-version":[{"id":5514,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb\/5321\/revisions\/5514"}],"wp:attachment":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/media?parent=5321"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb-category?post=5321"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb-tag?post=5321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}