The Scottish Government’s recent FOI release details the software-based data destruction protocols used by the Accountancy in Bankruptcy department. It outlines the shift from physical shredding to audited software sanitization to meet sustainability goals while maintaining GDPR compliance for end-of-life IT hardware across gov.scot’s infrastructure.
For the uninitiated, “deleting” a file is a lie. When you hit delete, the OS simply removes the pointer to the data, leaving the actual bits scattered across the platter or NAND cells until they are overwritten. In the high-stakes environment of bankruptcy accountancy—where PII (Personally Identifiable Information) and sensitive financial forensics are the norm—this latency is a catastrophic vulnerability. The gov.scot release isn’t just a bureaucratic checkbox. it is a window into how public sector entities are grappling with the “data remanence” problem in an era of pervasive flash storage.
We are currently seeing this play out in mid-May 2026, as government audits shift toward “circular economy” mandates. The push is clear: stop shredding perfectly fine laptops and start trusting the code to wipe them. But as any kernel engineer will tell you, trusting software to erase hardware is a gamble dictated by the controller’s architecture.
The NAND Flash Nightmare: Why Overwriting is Obsolete
The core technical friction in the gov.scot FOI lies in the transition from Hard Disk Drives (HDDs) to Solid State Drives (SSDs). On an old-school HDD, a software tool could perform a “Gutmann pass” or a simple zero-fill, physically overwriting the magnetic polarity of the disk. It was brute-force, but it worked.
SSDs are a different beast entirely. Because of wear leveling—a process where the drive controller distributes writes across the NAND flash to prevent any one cell from wearing out—the software has no direct control over where data is physically written. When a sanitization tool tells the drive to “overwrite Sector A,” the controller might actually write that zero to Sector Z, leaving the original sensitive data in Sector A untouched and invisible to the OS, but accessible to anyone with a flash memory reader and a bit of patience.
This represents where the NVMe specification and the SANITIZE command set become critical. Rather than trying to “write over” data, modern enterprise-grade erasure relies on the drive’s internal firmware to trigger a block-erase. This is a hardware-level voltage spike that clears the cells. If the gov.scot protocols aren’t explicitly calling these firmware-level commands, they aren’t erasing data; they’re just rearranging the furniture.
The 30-Second Verdict: Software vs. Physical
- Physical Shredding: 100% effective, 0% sustainable. High e-waste, high cost.
- Software Overwriting: Effective for HDDs, dangerously unreliable for SSDs/NVMe.
- Cryptographic Erasure: The gold standard. Fast, scalable, and architecture-independent.
The Pivot to Cryptographic Erasure (Crypto Erase)
The most sophisticated part of the modern data destruction pipeline—and the part the FOI hints at through “assurance processes”—is Cryptographic Erasure (CE). In a CE workflow, the data on the drive is always encrypted by default using a Media Encryption Key (MEK). To “erase” the drive, the software doesn’t bother wiping the terabytes of data; it simply destroys the MEK.

Without the key, the data remains on the NAND cells as ciphertext, which is computationally infeasible to decrypt. This turns a multi-hour wipe process into a millisecond operation. However, this relies on the assumption that the encryption implementation is flawless and that no copies of the key exist in the TPM (Trusted Platform Module) or a backup vault.
“The industry is moving away from the ‘overwrite’ mentality because the abstraction layer between the OS and the physical storage has become too thick. If you can’t address the physical cell, you can’t guarantee the erasure. Cryptographic erasure is the only way to scale security in a cloud-native, flash-heavy world.”
This approach aligns with NIST SP 800-88 Rev. 1, the global benchmark for media sanitization. NIST categorizes sanitization into three levels: Clear (software-based overwriting), Purge (firmware-level commands or CE), and Destroy (physical disintegration). For the Accountancy in Bankruptcy department, anything less than “Purge” is a compliance nightmare waiting to happen.
The Liability Loop: GDPR and the Ghost in the Machine
From a regulatory standpoint, the gov.scot FOI release highlights a massive liability gap. Under GDPR and the UK Data Protection Act, the “Right to Erasure” isn’t a suggestion—it’s a legal mandate. If a decommissioned server from the bankruptcy office ends up on eBay with a “wiped” drive that still contains recoverable debtor records, the fine isn’t based on the intent, but on the failure of the process.
The technical challenge is the Verification Phase. How do you prove a drive is empty? You can’t read the data to verify it’s gone, because if you can read it, it’s not gone. Most “assurance processes” rely on sampling—reading a random 1% of the sectors to ensure they return zeros or random noise. But in a 2TB drive, a 1% sample is a statistical lottery.

| Method | Mechanism | Reliability (SSD) | Audit Trail |
|---|---|---|---|
| Zero-Fill | Sequential Write | Low (Wear Leveling) | Software Log |
| Firmware Sanitize | Block Erase | High | Hardware Confirmation |
| Crypto Erase | Key Destruction | Very High | Key Management Log |
| Degaussing | Magnetic Field | Zero (Non-Magnetic) | Physical Cert |
The “Accountancy in Bankruptcy” context adds another layer of complexity. These records often have statutory retention periods. The software must not only destroy data but provide a cryptographically signed certificate of destruction that links the drive’s serial number to the specific erasure timestamp. This creates a chain of custody that is as important as the erasure itself.
Closing the Gap: The Future of Government IT Disposal
The move toward software-based destruction is a necessary evolution, but it requires a shift in how we view hardware. One can no longer treat a drive as a “bucket of bits” but as a complex embedded system with its own OS (the controller firmware). To truly secure government data, the procurement process must mandate drives that support TGC Opal or IEEE 1667 standards, ensuring that the hardware is designed for erasure from day one.
If gov.scot is relying on legacy “wipe” software that treats an NVMe drive like a 2005-era HDD, they are merely performing security theater. The real victory is in the integration of automated API-driven erasure audits—where the hardware reports its own sanitization status back to a central ledger, removing the human element from the loop.
For the tech community, this is a reminder that the most dangerous vulnerability isn’t always a zero-day exploit in a running app; sometimes, it’s the ghost of data left behind on a “destroyed” drive in a government warehouse. The code must be as ruthless as the shredder.