Data Destruction, Retention & Legal Hold
TiΓͺu hα»§y, LΖ°u giα»― Dα»― liα»u & Lα»nh BαΊ£o quαΊ£n
Theory
Data Destruction Methods β NIST SP 800-88
NIST SP 800-88 (Guidelines for Media Sanitization) defines the standard framework for data destruction. Method selection depends on the media type, classification level, and intended next use of the media.
| Method | How It Works | Use Case | Media | Security Level |
|---|---|---|---|---|
| Clearing | Overwrite all addressable storage locations with non-sensitive data (zeros, ones, or random) | Reuse within the organization; lower classification data | HDD, USB | LowβMedium |
| Purging (Degaussing) | Apply a strong magnetic field to destroy the magnetic alignment storing data; or use hardware-level cryptographic erase | Reuse outside the organization; higher classification data | HDD, Tape (magnetic only) | MediumβHigh |
| Destroying | Physical destruction: shredding, incineration, disintegration, pulverization | Disposal of media containing highest-classified data | Any media type | Highest |
SSD Warning β Overwriting Is Unreliable
SSDs use wear leveling β a firmware technique that distributes writes across cells to extend drive life. This means overwrite commands may not reach all physical storage locations. Data may persist in cells the wear-leveling algorithm has redirected away from. For SSDs, use: cryptographic erasure (delete the encryption key if the data was encrypted) or physical destruction.
Data Remanence
Data remanence is the residual representation of data that remains after deletion attempts. This is why simple "delete" operations are insufficient for sensitive data β the OS marks the space as available but the data persists until overwritten. Even degaussed HDDs can sometimes have residual signals detectable by lab-grade equipment.
Data Retention Policies
Retention policies define how long each data type must be kept before it can be destroyed. Retaining data beyond the required period increases breach impact and regulatory exposure (especially under GDPR "storage limitation" principle).
| Data Type | Typical Retention | Regulatory Driver |
|---|---|---|
| Financial / banking records | 7 years | Various financial regulations (VN: Circular 09, PH: BSP guidelines) |
| PCI-DSS audit logs | Minimum 12 months (3 months immediately available online) | PCI-DSS Requirement 10.7 |
| Healthcare records | 5β10 years (jurisdiction-dependent) | Local health regulations |
| Personal data (GDPR/DPA basis) | Only as long as necessary for original purpose | GDPR Art. 5(1)(e), DPA 2012 (PH) |
| Loan application data (TS) | Duration of loan + 7 years | BSP (PH), SBV (VN) guidelines |
Legal Hold (Litigation Hold)
A legal hold is a directive to suspend all routine deletion and retention schedule enforcement for data that is relevant to anticipated or active litigation, regulatory investigation, or audit.
- Must be applied immediately upon notice β even anticipation of litigation is sufficient
- Overrides all retention schedules β you cannot delete data under legal hold even if the retention period has expired
- Failure to preserve data under legal hold = spoliation
Spoliation
Spoliation is the intentional or negligent destruction, alteration, or concealment of evidence under a legal hold. Consequences include:
- Criminal charges (obstruction of justice)
- Civil sanctions (adverse inference β court assumes destroyed evidence was harmful)
- Regulatory penalties
Legal Hold vs GDPR Right to Erasure β Conflict Resolution
Key Terms
Exam Tips
Work Application β FinTech Company X
| Data Store | Deletion Action Required | Risk if Missed |
|---|---|---|
| MariaDB / PostgreSQL | Overwrite PII fields with null/anonymous values; delete or anonymize the record | PII persists in primary store β DPA 2012 / Decree 13 violation |
| Redis cache | Ensure TTL has expired; explicitly evict keys if TTL longer than 30 days | Customer PII accessible via cache after account deletion |
| Kafka topics | Kafka is append-only β cannot delete records. Anonymize payload via stream processor (e.g., Kafka Streams / Flink) | PII in event log indefinitely β serious GDPR/DPA violation |
| Elasticsearch index | Delete document by ID or anonymize indexed fields | PII searchable in audit/log index after deletion |
| GCS (signed PDFs) | Delete GCS object; verify no backup copies in archive buckets | Signed loan documents with PII accessible in storage |
| eKYC Vendor biometrics | Call eKYC Vendor deletion API per DPA terms; get confirmation receipt | Biometric template persists at processor β DPA 2012 violation; biometrics cannot be reissued |
Practice Questions
Q1. A decommissioned Partner A loan processing server has SSD drives that stored customer PII classified as Restricted. The drives will be physically disposed of (not reused). What is the most appropriate destruction method?
A) Overwriting (7-pass) B) Degaussing C) Physical destruction (shredding) D) Clearing and reassigning to another team
β C) Physical destruction (shredding)Q2. A legal hold is issued for a specific customer's loan account. The 30-day Platform B deletion job runs that evening. When should the legal hold have been applied relative to the job run?
A) Immediately upon issuance of the hold β before the deletion job ran B) After the current deletion cycle completes C) Only after litigation is formally filed in court D) At the end of the standard retention period
β A) Immediately upon issuance β before the deletion job ranQ3. A FinTech Company X engineer proposes degaussing old SSD drives before reselling them to a third-party recycler. What should you tell them?
A) Degaussing is sufficient for SSDs at any classification level B) Degaussing only works on magnetic media β SSDs are NAND flash and will not be sanitized by degaussing C) Degaussing should be combined with a 3-pass overwrite for SSDs D) Degaussing is approved for Confidential data but not Restricted
β B) Degaussing only works on magnetic media β SSDs are NAND flashQ4. A Philippine Partner C customer submits a GDPR-equivalent erasure request under DPA 2012. Their account is currently under investigation by BSP (Bangko Sentral ng Pilipinas). What should FinTech Company X do?
A) Honor the erasure request immediately β data subject rights are absolute B) Deny the erasure and issue a legal hold; legal obligation overrides the erasure right during investigation C) Partially delete data not relevant to the investigation D) Escalate to the NPC (National Privacy Commission) before taking action
β B) Deny the erasure and issue a legal holdQ5. What is "spoliation" and what legal consequence can result from it?
A) Deletion of outdated data per retention schedule β standard practice with no legal risk B) Intentional or negligent destruction of evidence under legal hold β can result in criminal charges and adverse inference C) Unauthorized access to data β triggers a breach notification requirement D) Over-retention of personal data β triggers GDPR fines only
β B) Destruction of evidence under legal hold β criminal charges and adverse inference