The Currently, there is a growing interest in various methods and means of protecting information, which is due to the growing number of crimes related to the violation of confidentiality of information, including through physical access to a computer. There are many ways to protect information from unauthorized access, such as physical security measures, password protection, and so on. However, a situation may arise when all defense lines have already been overcome and there is no other way to quickly block or destroy confidential information in any other way than with the help of a voice command. Thus, the topic of the article is relevant. The object of research is an information system containing confidential information. The subject of the research is the methods of emergency deletion of confidential information. The purpose of this article is to develop an algorithm for urgent deletion of files by voice command. In the course of the work, the algorithm for the emergency deletion of files by voice command was developed, which allows blocking the means of inputting information (keyboard and mouse) and deleting files located in a predetermined folder. The algorithm provides protection against accidental pronunciation of a voice command: before deleting files, a timer is first started, the time of which is pre-set by the user. During the duration of the timer, it is possible to cancel the deletion of files by entering a password, however, there is no way to access the information until the appropriate password is entered.