Key Aspects In Secure Data Destruction - An Analysis