While obsolete and damaged IT assets like DVDs, CDs, PCs, smartphones, flash drives, memory cards, and hard drives can be reformatted, erased, wiped, or degaussed, if the physical devices themselves remain intact, it is likely that data can still be retrieved. To reduce the risks, secure data destruction should be implemented.