. . . "Therefore, all hosts, such as workstations, servers, and compatible devices, shall use software utilities provided by the university to identify and remove any Restricted data (such as SSNs) to eliminate the risk of data loss or disclosure." .