Skip to content
arrow_back
search
ISM-1361 policy ASD Information Security Manual (ISM)

Use Approved Equipment for Media Destruction

Use officially approved devices for destroying media to ensure proper disposal.

record_voice_over

Plain language

When you have old or unnecessary storage devices like hard drives or USBs, it's important to destroy them properly so that sensitive data can't be recovered by anyone else. Using equipment approved by security bodies like the Security Construction and Equipment Committee ensures that the data is absolutely unrecoverable. If you don't do this, you risk private information getting into the wrong hands, which can lead to identity theft, data breaches, or financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Security Construction and Equipment Committee-approved equipment or ASIO-approved equipment is used when destroying media.
policy ASD Information Security Manual (ISM) ISM-1361
priority_high

Why it matters

Improper media destruction using unapproved equipment can allow sensitive data recovery, causing data breaches, legal exposure and reputational damage.

settings

Operational notes

Maintain a register of ASIO/SCEC-approved destroyers, verify approvals before use, and train staff to operate devices per vendor guidance.

Mapping detail

Mapping

Direction

Controls