Computing systems — including desktops and laptops, networking equipment, cell phones, smart phones, and other mobile devices — store many kinds of personal and institutional data.
From text messages to emails and contact lists, this data is often sensitive and in need of protections. Learn how to:
* Protect any devices you’re using:
* Securely remove data before disposing of or transferring possession of devices you’re no longer using: