Practical Secrets In Secure Data Destruction Explained