<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; sensitive data</title>
	<atom:link href="https://www.informationlife.net/tag/sensitive-data/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>4 Tips for Destroying Sensitive Data</title>
		<link>https://www.informationlife.net/4-tips-destroying-sensitive-data/</link>
		<comments>https://www.informationlife.net/4-tips-destroying-sensitive-data/#comments</comments>
		<pubDate>Thu, 19 Sep 2013 08:55:48 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[sensitive data]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4630</guid>
		<description><![CDATA[<p>As businesses continue reel under data loss and theft, destroying sensitive information in a timely manner is imperative for risk mitigation and continued operational security. There are various techniques for destroying sensitive data that will safeguard personally identifiable information (PII), payment card industry (PCI) transaction data, and proprietary secrets. Principal among these techniques are: Obliterating...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/4-tips-destroying-sensitive-data/">4 Tips for Destroying Sensitive Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As businesses continue reel under data loss and theft, destroying sensitive information in a timely manner is imperative for risk mitigation and continued operational security. There are various techniques for destroying sensitive data that will safeguard personally identifiable information (PII), payment card industry (PCI) transaction data, and proprietary secrets. Principal among these techniques are: Obliterating old hard drives without risking your security, shredding hard drives, overwriting, and degaussing. <a href="http://www.firmology.com/2013/09/18/4-tips-for-destroying-sensitive-data/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/4-tips-destroying-sensitive-data/">4 Tips for Destroying Sensitive Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/4-tips-destroying-sensitive-data/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
