Destruction of Private Data: Pushing the “Delete” Button is Not Enough