{"id":6280,"date":"2026-04-11T15:27:44","date_gmt":"2026-04-11T14:27:44","guid":{"rendered":"https:\/\/wir-lernen-weiter.ch\/"},"modified":"2026-04-13T21:43:22","modified_gmt":"2026-04-13T20:43:22","slug":"datenloeschung","status":"publish","type":"ht_kb","link":"https:\/\/wir-lernen-weiter.ch\/en\/knowledge-base\/datenloeschung\/","title":{"rendered":"Data deletion"},"content":{"rendered":"<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon\"><strong>\ud83d\udcd1 No exception and no room for manoeuvre!<\/strong><br><br>Your laptops are in safe hands with us. Regardless of whether they have already been cleaned or not, all data carriers undergo the same processes to achieve maximum security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Standards and certifications<\/h4>\n\n\n\n<p>In general, all our processes are based on the following guidelines:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data deletion<\/strong>NIST 800-88 (Clear \/ Purge)<\/li>\n\n\n\n<li><strong>Data carrier destruction<\/strong>: DIN 66399 \/ ISO 21964<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-success\"><strong>\ud83c\udf42 Data erasure before destruction<\/strong><br><br>Destruction of data storage media is no better than a clean deletion. That is why we endeavour to reuse data carriers in the best possible way.<\/p>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-alert\"><strong>\u26a0\ufe0f<\/strong> <strong>Be careful with \u00abcertified\u00bb deletions!<\/strong><br><br>Standards such as ISO 9001, ISO 14001 and ISO 27001 say nothing about how securely data is deleted and how data storage media are handled. <br><br>This is a popular \u00abtrick\u00bb used by IT service providers to feign security that has never been externally tested and verified. In any case, our organisation is effectively certified.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">How does data erasure work?<\/h4>\n\n\n\n<p>Depending on the data carrier and its capabilities, our erasure system selects one of the secure Secure Erase \/ Sanitise commands. Verification takes place after successful execution of these erasure methods.<\/p>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-danger\"><strong>\ud83d\udd0e Verification is essential! <\/strong><br><br>A command can be executed quickly. The only way to prove whether or not it has been properly cancelled is with verification. To do this, our deletion system compares the statuses before and after the deletion: and it is precisely this comparison that is not easy!<\/p>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-alert\"><strong>\ud83e\udd37 Where can I see the details of the cancellation? <\/strong><br><br>The classification of erasure processes is carried out according to the \u00abClear\u00bb and \u00abPurge\u00bb categories defined in NIST 800-88 in the <a href=\"https:\/\/wir-lernen-weiter.ch\/en\/knowledge-base\/audit-trail\/\" data-type=\"ht_kb\" data-id=\"5321\"><strong>Deletion documentation<\/strong><\/a> per data carrier.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">How does the destruction work?<\/h4>\n\n\n\n<p>If a data carrier cannot be deleted or accessed, it is physically destroyed. For this purpose, our organisation has industrial shredder systems as well as a camera system that is unique in Switzerland and creates a video as evidence for each destruction process.<\/p>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-danger\"><strong>\ud83d\udd0e Trust is good, proof is better!<\/strong><br><br>If a data carrier is installed in a storage device, the risk of data loss is still relatively low. But what do the processes look like as soon as a hard drive is removed? We can track the path of every hard drive down to the metre and second.<br><\/p>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-alert\"><strong>\ud83e\udd37 Where can you see the details of the destruction that took place?<\/strong><br><br>Destruction processes are classified according to the safety levels defined in DIN 66399 \/ ISO 21964 in the <a href=\"https:\/\/wir-lernen-weiter.ch\/en\/knowledge-base\/audit-trail\/\" data-type=\"ht_kb\" data-id=\"5321\"><strong>Deletion documentation<\/strong><\/a> per data carrier. In addition, all videos are also stored individually in the deletion documentation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Storage until deletion \/ destruction?<\/h4>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon\"><strong>Triple secured<\/strong><br><br>The processing site is generally burglar-proof, has a video surveillance system and an alarm system that alerts us and the police in the event of a break-in.<\/p>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-alert\"><strong>\ud83d\udea8 Additional protection for unprocessed goods<\/strong><br><br>Unslaked goods are stored in an additionally secured and hardened area of our processing area. This area is again separately monitored and alarm-protected. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">Deletion documentation<\/h4>\n\n\n\n<p class=\"wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon\"><strong>\ud83e\uddd1\ud83c\udffc\u200d\ud83d\udd27 Free of charge, ready to use and audit-proof<\/strong><br><br>It should be easy for donors to understand what has been deleted and how. That is why we have very detailed deletion documentation that shows all the work carried out.<br><br>Click here for the info page -&gt; <a href=\"https:\/\/wir-lernen-weiter.ch\/en\/knowledge-base\/audit-trail\/\" data-type=\"ht_kb\" data-id=\"5321\"><strong>Deletion documentation<\/strong><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Standards und Zertifizierungen Generell richten sich s\u00e4mtliche unsere Prozesse an folgenden Richtlinien: Wie funktioniert die Datenl\u00f6schung? Abh\u00e4ngig vom Datentr\u00e4ger und dessen M\u00f6glichkeiten w\u00e4hlt unser L\u00f6schsystem eine der sicheren Secure Erase \/ Sanitize-Befehle aus. Nach erfolgreicher Ausf\u00fchrung dieser L\u00f6schmethoden findet eine Verifizierung statt. Wie funktioniert die Zerst\u00f6rung? Falls ein Datentr\u00e4ger nicht gel\u00f6scht oder angesteuert werden kann,&hellip;<\/p>","protected":false},"author":6,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"iawp_total_views":17,"footnotes":""},"ht-kb-category":[51],"ht-kb-tag":[],"class_list":["post-6280","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-unsere-arbeit"],"_links":{"self":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb\/6280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/comments?post=6280"}],"version-history":[{"count":0,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb\/6280\/revisions"}],"wp:attachment":[{"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/media?parent=6280"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb-category?post=6280"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/wir-lernen-weiter.ch\/en\/wp-json\/wp\/v2\/ht-kb-tag?post=6280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}