Skip to content
arrow_back
search
ISM-1722 policy ASD Information Security Manual (ISM)

Methods for Destroying Electrostatic Memory Devices

Use specialized machines or incineration to securely destroy memory storage devices.

record_voice_over

Plain language

Electrostatic memory devices, like USB drives and solid-state drives, need to be destroyed properly to ensure sensitive information doesn't fall into the wrong hands. If these devices are not securely destroyed, data can be recovered and lead to privacy violations or even financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Electrostatic memory devices are destroyed using a furnace/incinerator, hammer mill, disintegrator or grinder/sander.
policy ASD Information Security Manual (ISM) ISM-1722
priority_high

Why it matters

Improper destruction of electrostatic memory devices could allow data recovery, exposing sensitive information and causing financial loss.

settings

Operational notes

Verify furnaces/incinerators and grinders/disintegrators are used correctly and document destruction to ensure electrostatic memory devices cannot be recovered.

Mapping detail

Mapping

Direction

Controls