Mechanisms exist to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data.