Skip to content
arrow_back
search
ISM-1723 policy ASD Information Security Manual (ISM)

Methods for Destroying Magnetic Floppy Disks

Magnetic floppy disks should be destroyed by burning, grinding, degaussing, or cutting to prevent data recovery.

record_voice_over

Plain language

This control is about making sure old magnetic floppy disks are completely destroyed so no one can access the data on them. If this isn't done, sensitive information could be stolen, leading to privacy breaches or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Magnetic floppy disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, degausser or by cutting.
policy ASD Information Security Manual (ISM) ISM-1723
priority_high

Why it matters

If magnetic floppy disks are not destroyed (e.g., degaussed, incinerated or cut), recoverable data may be extracted, causing a breach and reputational and financial harm.

settings

Operational notes

Use only approved floppy disk destruction methods (incinerator/furnace, hammer mill, disintegrator, degausser or cutting) and record chain-of-custody and completion.

Mapping detail

Mapping

Direction

Controls