Ways Through Which Data Can Be Destroyed