Step-By-Step Necessary Elements For Secure Data Destruction