Summary

The present document addresses the requirements on secure data deletion. It aims to give a valid and compliant method to assess if this specific requirement on data deletion has been met.