Erase Personal Devices Before Disposal

Before disposing of any device or media, you should take steps to make sure you have removed all personal and other sensitive data from it. Vulnerable data that might be stolen from a device could include your bank or investment account number and password, your credit card numbers, information in databases, spreadsheets, tax software, and data from research projects.

If you use your personally owned device to access or work with sensitive U-M data, you are expected to secure it in compliance with Security of Personally Owned Devices That Access or Maintain Sensitive Institutional Data (SPG 601.33). This includes sanitizing it before disposal.

Michigan Medicine Faculty, Staff, and Students who have personal devices using Airwatch should immediately report lost or stolen devices to the Michigan Medicine Service Desk at 734-936-8000. The Service Desk will assist with locking or wiping the device as needed.

Preparing your personal device for resale, transfer, or recycling? You should use AirWatch to erase data from the device. There are two options for erasing data on your device:

  • Enterprise Wipe. Removes all data that was put on there by AirWatch, for example, Michigan Medicine Outlook Exchange email or any enterprise applications.
  • Device Wipe. Removes ALL data on the device and returns it to factory defaults.

Before resale, transfer, or recycling, you should use the Device Wipe option on any device using AirWatch.

For additional information, see AirWatch-Security Considerations.

Erase Computers and Mobile Devices

U-M Computer Showcase Tech Repair offers Secure Device Sanitization services for individuals and U-M departments, as well as assistance moving data to a new device if needed.

See these how-to instructions for securely deleting data from university or personally owned computing devices and storage media.

Securely Delete Files from Computers

Physical Destruction of Devices or Media for Secure Disposal

When devices or drives are inoperable, it may be necessary to destroy them to ensure secure disposal. Destruction may also be required by some laws or regulations governing certain types of data. See Destroy Devices and Media for instructions.