A-Z Popular Blog Security Search »
Information Security
Related Guides
Defensive Computing
Confidential Information

Cybersecurity Risk

7 Examples of Delete

 , updated on
Delete is a term for removing or obliterating data on a computer. The following are illustrative examples.


There is a delete key or function on most devices such as a keyboard or virtual keyboard that can be used to delete words from text. Deleted text may remain recorded. For example, the software you are using may retain a version history for a document.


Modern software may process and store your data in data centers as opposed to on your device. This is often referred to as cloud computing. When a user deletes data on a cloud service it may be retained by the cloud service provider. This can be done by setting a flag to indicate data is logically deleted without actually deleting it. In other cases, data in the cloud is actually physically deleted. This all depends on the policies and practices of the firm providing the cloud service.

Local Software

As with cloud, deleting things in software that runs from a device you own may not result in physical deletion of the data. For example, office productivity software may retain recovery data after a document is deleted.


Uninstalling a program from a device often deletes some files and leaves behind other files that aren't removed. In some cases, an uninstall will leave behind your preferences and anything you have created using the software. This is done so that your data will come up if you reinstall the software.


When a file is deleted on a device it often goes into a recycle bin or similar structure where it can be recovered later.

Recycle Bin

When a file is deleted from a recycle bin it may be marked as deleted by the operating system but the data may physically remain on the disk. With time, the operating system will reuse this disk space and the data will typically become unrecoverable.


A data wipe is a process of removing physical data on a disk by overwriting it with data. Data wiping programs may be implemented with various security measures to ensure that data is difficult to recover. For example, a wipe may write all zeros to the data storage device or file to be deleted. This may be followed by writing all ones or randomly generated combinations of 0s and 1s. Generally speaking, data that has been properly wiped is unrecoverable.
Overview: Delete
Removing or obliterating digital data.
Related Concepts
Next: Data Wipe
More about secure computing:
Data Backup
Offline Network
Patch Management
Strong Password
If you enjoyed this page, please consider bookmarking Simplicable.

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.


A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.

Privacy Examples

The definition of privacy with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map