Secure disposal or re-use of equipment
Ensure device data is erased or secured before disposal or reuse to prevent data breaches.
Plain language
This control is about making sure that any device you want to throw away or give to someone else has all its data completely wiped clean. If you don't do this, someone could find your sensitive information and use it against you.
Framework
ISO/IEC 27001:2022
Control effect
Preventative
ISO 27001 domain
Physical controls
Classifications
N/A
Official last update
24 Oct 2022
Control Stack last updated
19 Mar 2026
Maturity levels
N/A
Official control statement
Items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.
Why it matters
Failing to securely erase devices can cause data breaches or licensing issues, exposing sensitive information to unauthorised parties.
Operational notes
Train staff in secure disposal. Before re-use or disposal, verify data removal and use approved wiping or destruction methods; keep disposal logs and certificates from recyclers.
Implementation tips
- IT Manager: Develop a clear process for wiping data from old computers, phones, or any other devices with storage before they leave the organisation. Use software tools that overwrite data multiple times—this makes sure the data is not just 'deleted' but really gone.
- Office Manager: Before you sell or donate any of your office equipment, make sure to check whether it still has storage media inside. Remove any labels or stickers that say who owns it to keep this information private.
- Procurement: Whenever you buy new equipment, ensure it comes with the tools and instructions needed for secure data wiping when it's time to replace it. This helps plan for future secure disposal or re-use from the start.
- HR Department: Make employees aware of the importance of secure data disposal. Train them to report any old equipment so it can be handled correctly by the IT department.
- Compliance Officer: Reference applicable local data protection laws like the Privacy Act 1988 and CPS 234 to ensure compliance with data handling requirements. This will help avoid legal issues related to data breaches.
Audit / evidence tips
-
Askevidence of a data disposal policy
Goodclear procedures with defined responsibilities and tools for secure data erasure
-
Askto see records of disposed equipment
Gooda log that matches with the organisation’s policy on data disposal
-
Aska demonstration of the data wiping software
Gooda reputable tool with certifications or evaluations (e.g., ISO standards) showing it does a thorough data wipe
-
Askto see training records for employees on data disposal processes
Goodregular, detailed sessions that cover the importance and methods of data wiping
-
Askto inspect the physical disposal or recycling facilities
Goodsecure storage with access control until data is verified as wiped
Cross-framework mappings
How Annex A 7.14 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ASD ISM
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (22) expand_less | ||
| ISM-0312 | ISM-0312 requires that overseas IT equipment (including associated media) that has processed, stored or communicated AUSTEO or AGAO data ... | |
| ISM-0317 | ISM-0317 requires printing at least three full pages of random text (with no blank areas) on each colour printer cartridge or MFD print d... | |
| ISM-0318 | ISM-0318 requires destruction of printer cartridges or print drums when sanitisation is not possible to prevent residual data exposure | |
| ISM-0351 | ISM-0351 requires volatile media to be sanitised by removing power for at least 10 minutes | |
| ISM-0352 | ISM-0352 mandates a specific sanitisation technique for SECRET and TOP SECRET volatile media: full overwrite with random data followed by... | |
| ISM-0354 | ISM-0354 mandates a specific, verifiable overwriting process to sanitise non-volatile magnetic media so that prior data cannot be accessed | |
| ISM-0357 | ISM-0357 requires a specific sanitisation method for non-volatile EPROM media, including extended UV erasure and a full overwrite with ve... | |
| ISM-0368 | ISM-0368 requires physical destruction of media such that waste particles are no larger than 9 mm to prevent data recovery | |
| ISM-0373 | ISM-0373 requires personnel supervising destruction of media storing accountable material to supervise handling through to destruction, v... | |
| ISM-0836 | Annex A 7.14 requires ensuring sensitive data is removed or securely overwritten from storage media before equipment disposal or re-use | |
| ISM-1067 | Annex A 7.14 requires ensuring sensitive data is removed or securely overwritten from storage media prior to disposal or re-use | |
| ISM-1157 | ISM-1157 requires that when destroying magnetic storage media, organisations use NSA-evaluated degaussers to ensure the destruction metho... | |
| ISM-1160 | Annex A 7.14 requires ensuring sensitive data is removed or securely overwritten before equipment containing storage media is disposed of... | |
| ISM-1218 | ISM-1218 requires IT equipment (and associated media) located overseas that has handled AUSTEO or AGAO data to be sanitised in situ | |
| ISM-1219 | ISM-1219 requires MFD print drums and image transfer rollers to be inspected and destroyed if remnant toner cannot be removed or an image... | |
| ISM-1220 | ISM-1220 requires organisations to inspect printer and MFD platens and destroy them if any text or images are retained | |
| ISM-1222 | ISM-1222 requires televisions and computer monitors that cannot be sanitised to be physically destroyed to prevent residual data compromise | |
| ISM-1223 | ISM-1223 requires network device memory to be sanitised using device-specific evaluation guidance, vendor sanitisation guidance, or a dum... | |
| ISM-1517 | ISM-1517 requires the secure destruction of microfiche and microfilm using equipment that reduces microform to a fine powder such that fr... | |
| ISM-1641 | ISM-1641 requires that after degaussing, magnetic media is physically damaged (e.g | |
| ISM-1726 | ISM-1726 requires optical disks to be physically destroyed using specific methods (e.g | |
| ISM-1727 | ISM-1727 requires semiconductor memory to be physically destroyed using specialised destruction methods (e.g., furnace/incinerator, hamme... | |
| sync_alt Partially overlaps (28) expand_less | ||
| ISM-0161 | ISM-0161 requires IT equipment and media to be secured when not in use to prevent unauthorised access | |
| ISM-0307 | ISM-0307 requires sanitising IT equipment and any associated media before maintenance or repair when the technician is not appropriately ... | |
| ISM-0313 | ISM-0313 requires organisations to develop, implement and maintain IT equipment sanitisation processes and procedures | |
| ISM-0315 | ISM-0315 requires that high assurance IT equipment is destroyed prior to disposal to prevent any data leakage | |
| ISM-0316 | ISM-0316 requires that, after sanitisation, destruction or declassification, a formal administrative decision authorises releasing IT equ... | |
| ISM-0321 | ISM-0321 requires the organisation to contact ASD for disposal requirements when disposing of emanation security (TEMPEST-like) equipment | |
| ISM-0330 | ISM-0330 requires that before media is reclassified to a lower sensitivity or classification, it is sanitised or destroyed and a formal a... | |
| ISM-0350 | ISM-0350 mandates destruction of media that cannot be sanitised before disposal | |
| ISM-0360 | ISM-0360 requires that sanitised SECRET and TOP SECRET flash media still retains its classification and must continue to be treated and c... | |
| ISM-0363 | ISM-0363 requires media destruction processes and supporting procedures to be developed, implemented and maintained so media is securely ... | |
| ISM-0371 | ISM-0371 requires personnel to supervise the handling of media through to destruction and verify that destruction is completed successfully | |
| ISM-0374 | ISM-0374 requires organisations to develop, implement and maintain media disposal processes and supporting procedures | |
| ISM-0375 | ISM-0375 requires that after sanitisation, destruction or declassification, an authorised administrative decision is formally made before... | |
| ISM-0378 | ISM-0378 requires removal of labels/markings from media before disposal so the media cannot be linked to an owner, classification, or pri... | |
| ISM-0835 | ISM-0835 requires that, even after sanitisation, TOP SECRET volatile media may retain its TOP SECRET classification where data persistenc... | |
| ISM-0839 | ISM-0839 requires that the destruction of media storing accountable material is not outsourced | |
| ISM-0947 | ISM-0947 requires that when data is manually transferred between systems in different security domains, any rewritable transfer media is ... | |
| ISM-1217 | ISM-1217 requires labels and markings that could identify the owner, sensitivity or classification of IT equipment to be removed before d... | |
| ISM-1361 | Annex A 7.14 requires verification that data and licensed software are removed or securely overwritten before equipment is disposed of or... | |
| ISM-1550 | ISM-1550 requires organisations to develop, implement and maintain IT equipment disposal processes and supporting procedures | |
| ISM-1599 | ISM-1599 requires IT equipment handling according to sensitivity or classification | |
| ISM-1642 | ISM-1642 requires media to be sanitised before it is reused in a different security domain to prevent data leakage across domains | |
| ISM-1724 | ISM-1724 requires magnetic hard disks to be physically destroyed using approved methods to prevent data recovery | |
| ISM-1729 | ISM-1729 specifies how destroyed TOP SECRET media waste particles must be classified, stored, and handled after destruction based on part... | |
| ISM-1735 | ISM-1735 requires that media which cannot be successfully sanitised is destroyed prior to disposal | |
| ISM-1741 | ISM-1741 requires organisations to develop, implement and maintain end-to-end IT equipment destruction processes and supporting procedures | |
| ISM-1742 | ISM-1742 requires that IT equipment that cannot be sanitised is destroyed to prevent residual data compromise | |
| ISM-2021 | ISM-2021 requires system owners to minimise data held in their systems by limiting what is collected and retained | |
| handshake Supports (6) expand_less | ||
| ISM-0359 | ISM-0359 offers a detailed approach for flash memory sanitisation, supporting the overall data removal goals of Annex A 7.14 | |
| ISM-0361 | ISM-0361 focuses on ensuring effective destruction of magnetic media, thereby supporting Annex A 7.14's goal of preventing data leakage d... | |
| ISM-0362 | ISM-0362 ensures quality control in degaussing as a sanitisation method, which supports the broader data removal requirement of Annex A 7.14 | |
| ISM-1065 | ISM-1065 requires organisations to reset the host-protected area (HPA) and device configuration overlay (DCO) on non-volatile magnetic ha... | |
| ISM-1221 | Annex A 7.14 requires verification that sensitive data is removed prior to disposal or re-use of equipment containing storage media | |
| ISM-2053 | ISM-2053 covers end-of-life procedures for software, indirectly supporting Annex A 7.14 by addressing licensed software management during... | |
| link Related (1) expand_less | ||
| ISM-0311 | Annex A 7.14 and ISM-0311 both focus on ensuring sensitive data is not left on media through secure sanitisation processes | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.