Skip to content
arrow_back
search
ISM-1727 policy ASD Information Security Manual (ISM)

Methods for Destroying Semiconductor Memory

Specialised equipment like a furnace or hammer mill is used to destroy semiconductor memory to ensure security.

record_voice_over

Plain language

This control is about making sure that when you don’t need your computer memory chips anymore, they’re completely destroyed. If you don’t do this properly, confidential data could be recovered by someone else later, posing a risk to your privacy and security.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Semiconductor memory is destroyed using a furnace/incinerator, hammer mill or disintegrator.
policy ASD Information Security Manual (ISM) ISM-1727
priority_high

Why it matters

Failure to physically destroy semiconductor memory can allow data recovery from chips, leading to leakage of sensitive information and compromise.

settings

Operational notes

Regularly verify furnaces/incinerators, hammer mills or disintegrators meet required destruction outcomes, and record device IDs and destruction logs for audit.

Mapping detail

Mapping

Direction

Controls