Simplifying Critical Elements Of Secure Data Destruction