Watch this video on YouTube
Data can be encrypted and then the encryption keys can be destroyed as a method of data sanitation. This process is known as?