Skip to main content

💼 37 Decommissioning and destruction controls are typically used to ensure that information security is not compromised as information assets reach the end of their useful life. Examples include archiving strategies and the secure data deletion (that is, deleting data using techniques to ensure data is irrecoverable) of sensitive information prior to the disposal of information assets.

  • ID: /frameworks/apra-cpg-234/13/37

Description​

Empty...

Similar​

  • Internal
    • ID: dec-c-5184f346

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance