In some cases, you may instruct the end-user to destroy his Harddisk
Key (using the Destroy utility). Every time a Harddisk Key is destroyed, a
Destroy-Code is generated. You can ensure that the end-user has indeed
destroyed the Harddisk Key by asking the end-user for the Destroy-Code and the
date/time of the action; then, verify them. The result will show the date/time
stamp and Program ID of the Harddisk Key destroyed.