What special data protection features must be taken into account when destroying data? What protective measures must be taken to achieve sufficient security during data destruction? What must a data processor take into account when commissioning a third-party company with data destruction?
Source: FDPIC – Data destruction