Skip to content
arrow_back
search
ISM-1726 policy ASD Information Security Manual (ISM)

Methods for Destructing Optical Disks

Optical disks should be destroyed using various methods like incineration or grinding to ensure data is unreadable.

record_voice_over

Plain language

This control is about making sure that old or unwanted optical disks, like CDs or DVDs, are disposed of in a way that any data on them can't be read anymore. This is important because if someone finds a disk you threw away, they might access sensitive information, which could lead to financial loss, embarrassment, or legal troubles.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Optical disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, grinder/sander or by cutting.
policy ASD Information Security Manual (ISM) ISM-1726
priority_high

Why it matters

If optical disks are not physically destroyed (e.g., cut, disintegrated or incinerated), data may be recovered, causing compromise and reportable breaches.

settings

Operational notes

Use approved methods (furnace/incinerator, hammer mill, disintegrator, grinder/sander or cutting) and record disposal details, including method and date, for traceability.

Mapping detail

Mapping

Direction

Controls