We have Iron Mountain do it.  That way the destruction is legally
documented.......

On 8/29/08, Kelsay, Mark <[EMAIL PROTECTED]> wrote:
>
>  One place I worked we used a powerful degausser and then took them into
> the woods and used them for target practice.  Then burn the leftovers.
> Great fun….
>
>
>
>
>
>
>
>
>
> *From:* Todd Arnett [mailto:[EMAIL PROTECTED]
> *Sent:* 29 August 2008 15:16
> *To:* NT System Admin Issues
> *Subject:* Backup Tape Destruction
>
>
>
> Just curious how everyone destroys their backup tapes?
>
>
>
> Thanks,
>
>
>
> *Todd Arnett*
>
> IT System Administrator
>
> Lastar Inc.
>
> 937.224.8646 x338
>
> www.lastar.com
>
>
>
>
>
>
>
>
>
>
>
>
> ______________________________________________________________________
> This email has been scanned by the MessageLabs Email Security System.
> For more information please visit http://www.messagelabs.com/email
> ______________________________________________________________________
>
> ****** This email is sent for and on behalf of Inspop.com Limited ******
>
> Authorised and regulated by the Financial Services Authority. Registration
> no. 310635.
>
> Inspop.com Limited (also trading as "Confused.com") is registered in
> England and Wales at 2nd Floor, Friary House, Greyfriars Road, Cardiff, CF10
> 3AE (Reg. No. 03857130 ). Any opinions expressed in this email are those of
> the individual and not necessarily the company. This email and any files
> transmitted with it, including replies and forwarded copies (which may
> contain alterations) subsequently transmitted from the Company, are
> confidential and solely for the use of the intended recipient. It may
> contain material protected by attorney-client privilege. If you are not the
> intended recipient or the person responsible for delivering to the intended
> recipient, be advised that you have received this email in error and that
> any use is strictly prohibited.
>
> If you have received this email in error please notify the Information
> Security Officer by telephone on +44 (0) 29 2043 4200. Please then delete
> this email and destroy any copies of it. This email has been swept for
> viruses before leaving our system.
>
> Security Warning: Please note that this email has been created in the
> knowledge that Internet email is not a 100% secure communications medium. We
> advise that you understand and accept this lack of security when emailing
> us.
>
> Viruses: Although we have taken steps to ensure that this email and any
> attachments are free from any virus, we advise that in keeping with good
> computing practice the recipient should ensure they are actually virus free.
>
> We may monitor the content of E-mails sent and received via our network for
> viruses or unauthorised use and for other lawful business purposes.
>
>
>
> ________________________________________________________________________
> This e-mail has been scanned for all viruses by Messagelabs. The
> service is powered by MessageLabs.
> ________________________________________________________________________
>
>
>
>
>
>


-- 
Sherry Abercrombie

"Any sufficiently advanced technology is indistinguishable from magic."
Arthur C. Clarke

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to