Effective Data Security Policy, Data Recovery Techniques, And Secure Data Deletion Process