Solved

I'm leaving company.  Best practice to delete my files

Posted on 2014-03-10
4
254 Views
Last Modified: 2014-08-24
I'm leaving this company.  I have a computer with my AD profile on it.  I want to make sure the next individual who owns this machine can't get to some of my folders.  My photo Stream was there (I deleted it).  My Dropbox was on there ( I deleted it).  I've emptied the recycle bin.  Unable to format the drive or completely remove my profile.  All my stuff I kept under Users\MyName.  Is there anything else I can do?
0
Comment
Question by:tangot2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 8

Expert Comment

by:Mohit Vijay
ID: 39918648
Delete your user profile from computer. But I think when you leave the company, your company network team should be taking care of these kind of thing, isnt it?
0
 
LVL 20

Expert Comment

by:netcmh
ID: 39918649
After following the proper procedure of document and knowledge transfer, and getting the approval to delete personal files from your manager, you can delete your files. Then, run a zeroizer of unused space. Alternatively download and run sdelete http://technet.microsoft.com/en-us/sysinternals/bb897443.aspx
0
 
LVL 21

Expert Comment

by:CompProbSolv
ID: 39918719
It seems inappropriate to me to be deleting any files under these circumstances unless there is a company policy that explicitly allows you to.  Aren't the files that reside on your employer's computer the property of your employer?  I agree with Mohit that this is something that is appropriately left to the company to handle.
0
 
LVL 15

Accepted Solution

by:
achaldave earned 500 total points
ID: 39918763
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question