Thoughts On Effective Secure Data Destruction Programs