Consider the three major methods of destroying data. Compare the relative benefits and drawbacks of any TWO of the methods, and explain at least one kind of data owner who might consider using that method.