This phase involves planning for the disposal of the old hardware, software, and information to pave way for a new system. This could mean either storing the information on another system or deleting, erasing, or even overwriting the data as required.
However, the utmost care is required when choosing the disposal method, to avoid the unauthorized disclosure of sensitive data.