Watch this video on YouTube
From an information security perspective, what should be done with information that no longer supports the main purpose of the business?