CEN/TC 263/WG 5 - Secure destruction of confidential material
Secure destruction of confidential material
General Information
Frequently Asked Questions
CEN/TC 263/WG 5 is a Working Group within the European Committee for Standardization (CEN). It is named "Secure destruction of confidential material". This committee has published 1 standards.
CEN/TC 263/WG 5 develops CEN standards in the area of Information technology. Currently, there are 1 published standards from this working group.
The European Committee for Standardization (CEN) is a public standards organization that brings together the national standardization bodies of 34 European countries. CEN provides a platform for developing European Standards (ENs) and other technical documents in relation to various products, materials, services, and processes, supporting the European Single Market.
A Working Group in CEN is a specialized group responsible for developing standards or technical work within a defined scope. These bodies bring together international experts to create consensus-based standards that support global trade, safety, and interoperability.
This document provides recommendations and requirements for the procedures, processes and performance monitoring to be implemented for the management and control of the physical destruction of confidential and sensitive material to ensure that such material is disposed of securely and safely.
This document can be referenced by anyone who processes such material on behalf of others and covers the following scenarios:
- on site - using mobile equipment at the location of use (destruction equipment is brought to the confidential or sensitive material);
- off site - transport followed by destruction using equipment at a destruction facility (the confidential or sensitive material is brought to the destruction equipment, such as used at a dedicated external facility operated by a service provider);
- use of equipment at the Data Controller’s location (confidential or sensitive material and destruction equipment co-located, such as a shredder in a building occupied by a client or clients).
Destruction by erasure (e.g. crypto erasure, data overwriting, degaussing or other forms of magnetic/electronic erasure) is not covered in this document.
- Standard51 pagesEnglish languagee-Library read for1 day