4.4.2 Emergency data destruction tools on paper