End-user computers should be scanned on a regular basis to locate High Risk Confidential Information so that it can be securely removed and destroyed. Scanning software such as Identity Finder is used for this purpose.
View instructions for Identity Finder for PC users.
View instructions for Identity Finder for Mac users.
Contact your local IT support group or email@example.com for advice or help choosing suitable software.