> Note that if the information is encrypted, you can just delete the decryption key and it is effectively deleted.
Does this satisfy the legal requirements you mention? I assume there are further requirements on what constitutes sufficient encryption?