Watch this video on YouTube
To protect sensitive information, when is sanitization or destruction required?