Guidance Protect 8
Guidance Note:
One of the easiest ways for malevolent third parties to access company data is by stealing data which has not been disposed of correctly even when deemed obsolete.
------
When you throw devices that contain information away, they can still be accessed. This has to be stopped in advance by making sure that the information is properly wiped away.