{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/www.protondata.com\/blog\/#Blog","headline":"BLOG","description":"Brilliant Data Security Solutions","url":"https:\/\/www.protondata.com\/blog\/","hasPart":[{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/importance-data-retention-deletion-officer\/","headline":"The importance of a data retention and deletion officer","url":"https:\/\/www.protondata.com\/blog\/data-security\/importance-data-retention-deletion-officer\/","datePublished":"2018-02-09","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/importance-data-retention-deletion-officer\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/02\/Data-retention-officers-can-police-internal-policy-determining-which-data-should-be-kept-and-which-should-be-destroyed_2410_40170922_0_14139578_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/02\/Data-retention-officers-can-police-internal-policy-determining-which-data-should-be-kept-and-which-should-be-destroyed_2410_40170922_0_14139578_500.jpg","height":333,"width":500},"wordCount":1797,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/considering-data-sanitization-edge-computing-rises\/","headline":"Considering data sanitization as edge computing rises","url":"https:\/\/www.protondata.com\/blog\/data-security\/considering-data-sanitization-edge-computing-rises\/","datePublished":"2018-02-07","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/considering-data-sanitization-edge-computing-rises\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/02\/Edge-computing-is-bringing-cloudlike-functionality-to-the-network-edge_2410_40170721_0_14094569_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/02\/Edge-computing-is-bringing-cloudlike-functionality-to-the-network-edge_2410_40170721_0_14094569_500.jpg","height":375,"width":500},"wordCount":1360,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/understanding-securely-sanitize-hybrid-drives\/","headline":"Understanding how to securely sanitize hybrid and SSD drives","url":"https:\/\/www.protondata.com\/blog\/data-security\/understanding-securely-sanitize-hybrid-drives\/","datePublished":"2018-02-05","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/understanding-securely-sanitize-hybrid-drives\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/01\/While-hybrid-drives-improve-upon-HDD-and-SSD-limitations-they-can-present-a-problem-for-secure-data-destruction_2410_40170091_0_14100851_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/01\/While-hybrid-drives-improve-upon-HDD-and-SSD-limitations-they-can-present-a-problem-for-secure-data-destruction_2410_40170091_0_14100851_500.jpg","height":333,"width":500},"wordCount":1252,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/beginning-2018-proper-data-sanitization\/","headline":"Beginning 2018 with proper data sanitization","url":"https:\/\/www.protondata.com\/blog\/data-security\/beginning-2018-proper-data-sanitization\/","datePublished":"2018-02-02","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/beginning-2018-proper-data-sanitization\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/01\/With-data-more-valuable-than-ever-in-2018-it-is-best-to-decommission-devices-thoroughly-_2410_40169750_0_14080390_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/01\/With-data-more-valuable-than-ever-in-2018-it-is-best-to-decommission-devices-thoroughly-_2410_40169750_0_14080390_500.jpg","height":343,"width":500},"wordCount":1385,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/gdpr-increases-importance-documentation-comes-data-destruction\/","headline":"GDPR increases importance of documentation when it comes to data destruction","url":"https:\/\/www.protondata.com\/blog\/data-security\/gdpr-increases-importance-documentation-comes-data-destruction\/","datePublished":"2018-02-01","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/gdpr-increases-importance-documentation-comes-data-destruction\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/02\/The-GDPR-is-putting-an-added-emphasis-on-data-destruction-documentation_2410_40170722_0_14107487_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/02\/The-GDPR-is-putting-an-added-emphasis-on-data-destruction-documentation_2410_40170722_0_14107487_500.jpg","height":400,"width":500},"wordCount":600,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/growing-automation-new-iot-devices-creating-challenges-data-destruction\/","headline":"How growing automation and new IoT devices are creating challenges for data destruction","url":"https:\/\/www.protondata.com\/blog\/data-security\/growing-automation-new-iot-devices-creating-challenges-data-destruction\/","datePublished":"2018-01-02","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/growing-automation-new-iot-devices-creating-challenges-data-destruction\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/12\/IoTenabled-devices-are-spreading-and-wearable-technology-is-allowing-people-to-store-even-more-data-on-their-person_2410_40168727_0_14112733_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/12\/IoTenabled-devices-are-spreading-and-wearable-technology-is-allowing-people-to-store-even-more-data-on-their-person_2410_40168727_0_14112733_500.jpg","height":400,"width":500},"wordCount":1560,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/operating-system-affect-data-destruction\/","headline":"Does an operating system affect data destruction?","url":"https:\/\/www.protondata.com\/blog\/data-security\/operating-system-affect-data-destruction\/","datePublished":"2017-12-21","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/operating-system-affect-data-destruction\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/12\/Companies-must-know-how-to-properly-sanitize-data-used-by-each-operating-system-_2410_40168433_0_14086601_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/12\/Companies-must-know-how-to-properly-sanitize-data-used-by-each-operating-system-_2410_40168433_0_14086601_500.jpg","height":416,"width":499},"wordCount":1675,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/advice-implementing-data-destruction-policy\/","headline":"Advice for implementing a data destruction policy","url":"https:\/\/www.protondata.com\/blog\/data-security\/advice-implementing-data-destruction-policy\/","datePublished":"2017-12-18","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/advice-implementing-data-destruction-policy\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/11\/Every-company-regardless-of-size-or-industry-houses-data-and-needs-a-thorough-method-to-delete-that-information-_2410_40167428_0_14101009_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/11\/Every-company-regardless-of-size-or-industry-houses-data-and-needs-a-thorough-method-to-delete-that-information-_2410_40167428_0_14101009_500.jpg","height":338,"width":499},"wordCount":1660,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/","headline":"How HIPAA handles the data destruction of PHI","url":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/","datePublished":"2017-12-12","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/11\/PHI-has-a-set-of-unique-rules-to-ensure-its-confidentiality_2410_40167087_0_14117479_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/11\/PHI-has-a-set-of-unique-rules-to-ensure-its-confidentiality_2410_40167087_0_14117479_500.jpg","height":357,"width":500},"wordCount":1350,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/physical-destruction\/hard-disk-destruction-can-therapeutic-employees\/","headline":"Why Hard Disk Destruction Can Be Therapeutic For Employees","url":"https:\/\/www.protondata.com\/blog\/physical-destruction\/hard-disk-destruction-can-therapeutic-employees\/","datePublished":"2017-12-08","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/physical-destruction\/hard-disk-destruction-can-therapeutic-employees\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/09\/Hard-drive-destruction-can-be-fun_2410_40165443_0_14097915_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/09\/Hard-drive-destruction-can-be-fun_2410_40165443_0_14097915_500.jpg","height":334,"width":500},"wordCount":697,"keywords":null}]}