Investigating Key Details Of Secure Data Destruction