

In this seven cycle variation (DoD 5220.22-M ECE), data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific random value, and finally once again with DoD 5220.22-M (E). The method for high security is based on the January 1995 'National Industrial Security Program Operating Manual' by the DoD. In this method, deleted data is overwritten by a series of 35 different deletion cycles that are executed in a random order. The method that offers the highest level of security is based on a process developed by Peter Gutmann and presented in his article “Secure Deletion of Data from Magnetic and Solid-State Memory”. This indicator basically serves to illustrate the differences in time needed for deletion according to the volume of data and the deletion method selected. The actual amount of time needed for deletion can vary significantly, depending on the system’s capacity and condition of the hardware.

The display of time remaining is only an approximation.
