Computers, Laptops & Tablets Accessories & Hardware 66 66 people found this article helpful Data Sanitization Methods A list of software based data destruction methods by Tim Fisher General Manager, VP, Lifewire.com Tim Fisher has 30+ years' professional technology support experience. He writes troubleshooting content and is the General Manager of Lifewire. our editorial process Facebook Twitter LinkedIn Tim Fisher Updated on November 01, 2019 Jeffrey Coolidge / Getty Images Accessories & Hardware HDD & SSD The Quick Guide to Webcams Keyboards & Mice Monitors Cards Printers & Scanners Raspberry Pi Tweet Share Email A data sanitization method is a specific way in which a data destruction program or file shredder overwrites the data on a hard drive or other storage device. Most data destruction programs support multiple data sanitization methods so that you can pick and choose which method to use for the particular kind of data you're erasing. Other Names for Data Sanitization Data sanitization methods are also often referred to as data erasure methods, data wipe methods, wipe algorithms, and data wipe standards. When you see terminology like this, the program is talking about data sanitization as it's described on this page. Technically, other methods of destroying data not based on software overwriting are also referred to as data sanitization methods but most of the time the term is referring to these software-based methods of erasing data. List of Data Sanitization Methods Here are several popular data sanitization methods used by data destruction programs and, when applicable, the organization or individual credited with originating the method: Secure EraseDoD 5220.22-M (US Department of Defense)NCSC-TG-025 (US National Security Agency)AFSSI-5020 (US Air Force)AR 380-19 (US Army)NAVSO P-5239-26 (US Navy)RCMP TSSIT OPS-II (Canada)CSEC ITSG-06 (Canada)HMG IS5 (UK)ISM 6.2.92 (Australia)NZSIT 402 (New Zealand)VSITR (Germany)GOST R 50739-95 (Russia)Gutmann (Peter Gutmann)Schneier (Bruce Schneier)Pfitzner (Roy Pfitzner)Random DataWrite Zero Most data destruction programs also let you customize your own data sanitization method with whatever overwriting pattern and number of passes you want. For example, the program might let you choose to overwrite the data with a zero during the first pass, a one in the second pass, and then random characters for eight more passes. The effect would be a modified version of the Schneier method, which normally supports just seven passes in a slightly different pattern. Which Data Sanitization Method is Best? Overwriting one or more files, or an entire hard drive, just once with a single character, should prevent any software-based file recovery method from recovering data from a hard drive. This is almost universally agreed upon. According to some researchers1, a single overwriting of data is enough to prevent even advanced, hardware-based methods of extracting information from hard drives, meaning that most data sanitization methods are an overkill. This is not so agreed upon. Most experts agree that Secure Erase is the best way to overwrite an entire hard drive in a single pass. The very simple Write Zero method accomplishes essentially the same thing, albeit much slower. Using any wipe method to erase data is really just writing other data over top of your previous data so that the information gets replaced with something useless — each method works this way. The new data is essentially random and doesn't actually contain any of your personal information, which is why ones, zeros, and random characters are used. If a Single Overwrite Is Enough, Why Are There so Many Data Sanitization Methods? As we mentioned above, not everyone agrees on a software-based data sanitization method that will prevent all possible methods of recovering the data. Because advanced, hardware-based methods of extracting information from hard drives exist, several governmental organizations and researchers have independently devised certain methods of overwriting data that, according to their research, should prevent these advanced recovery methods from working. What Does It Mean to "Verify the Write"? If you read more about the individual data sanitization methods, you'll see that most of them run a verification after writing a character over the data, meaning that it checks the drive to ensure that the contents were actually written over. In other words, a data write verification is like a "did I really just do this the right way?" sort of check. Some data wipe software tools will let you change the number of times it verifies that the files are gone. Some may verify just once at the very end of the entire process (after all of the passes have been completed), while others will verify the write after each and every pass. To check an entire drive after each and every pass to ensure that the files are being deleted will certainly take much longer to complete because it has to check it more often than just once at the very end.  Craig Wright, Dave Kleiman, and Shyaam Sundhar R.S. in Overwriting Hard Drive Data: The Great Wiping Controversy available here [PDF].