Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?