High-quality cutting head with x 4 mm particle size for high security needs according to German BSI – TL and North American NSA/CSS The Federal Office for Information Security (German: BSI) recommends a particle the strict requirements of the Technical Guideline BSI TLversion High-quality cutting head with x 4 mm particle size for high security needs according to German BSI – TL and North American NSA/CSS
|Published (Last):||1 December 2011|
|PDF File Size:||11.35 Mb|
|ePub File Size:||19.74 Mb|
|Price:||Free* [*Free Regsitration Required]|
Our engineers bwi-tl specialists in the subject. For the secure deletion or destruction of the information, there must be suitable methods available on the one hand, as well as suitable devices, applications, or services on the other hand. It must be documented comprehensibly which methods were selected for deleting and destroying the various types of data and the corresponding protection requirements and how to apply these methods.
The following questions, amongst other things, must be answered during the requirements analysis:.
They can also be burned. Overwriting the entire data medium with a random numerical pattern and verification. For normal protection requirements, the information should be deleted from the cache after printout using a delete function. How many data media of a bs-tl type must be deleted or destroyed according to the expectations? Does the destruction method selected for a data medium meet the state of the art e.
The following provides an overview of the methods available for deleting the most commonly used data media: Every new development undergoes intensive testing at our Technical Centre. The systems are particularly highly efficient for paper shredding in that they adjust their speed to the input and have a frequency-controlled direct belt drive ESC drive. Open the catalog to page 8. Our engineers are specialists in the subject.
EBA 0201 OMD
The bsi–tl of data or the destruction of data media should be performed promptly and at bsi-tp near the workplace so that the data media do not need to be stored temporarily. Keep on reaping the benefits from robust construction, the latest, partly patented technology and interplay of VEZ pre- and re-shredding in on production line.
Shredding instead of cutting! Are they suitable for the protection requirements identified and the types of data media used?
BSI: IT-Grundschutz catalogues – 13th version
The following provides an overview of the methods available for deleting the most commonly used data media:. Smaller particle sizes may be necessary for mechanically small drives. Hard disks can be shredded mechanically using a shredder. Whether stationary or mobile: The V-ECO series document and data shredders are a brand new development. Upgrading the re-shredder VAZ T doubles throughput and delivers output material that is considerably more homogeneous with the same drive capacity.
The employees must receive instructions on bsk-tl to apply the methods selected for deleting and destroying information, especially if the employees themselves will be using the corresponding tools. A brief overview can be found in S 2. The Vecoplan washing and recycling system was fully assembled in just 10 days and since then it has been producing continuously and reliable.
EBA OMD – Paper Shredders
With a wide product range specifically developed bxi-tl document and data carrier destruction, we can offer you just the right solution for your data carrier, required security level and Magnetic tapes, magnetic tape cassettes: Were suitable methods selected for the deletion or destruction of the various types of data and the corresponding protection requirements?
A simple screen change allows the use of different screen hole sizes for achieving the necessary security level. For this reason, it may make sense to sign service contracts with external service providers to this end.
For high protection requirements, the hard disk must be overwritten once using suitable software after each printout. Open the catalog to page 6.
These data media can be shredded mechanically using a suitable device. Were the employees instructed how to apply the methods used to delete and destroy information, and in particular how to use bsitl tools and devices available for this purpose?