Important Information on ITAD and Data Breaches

ITAD and Data Breaches

When it comes to protecting your data, you probably have firewalls, security patches and virus detection in place. Data breaches are, in fact, no laughing matter. So what measures do you have in place for asset disposition? If this question caught you off-guard, keep reading. Here are some important tips for the ITAD process that will ensure your data remains secure.

Secure your data

When electronic assets are taken out of service, all too often they end up piled in a storage room or in an abandoned cubicle, hard drives still intact. This means sensitive data is left exposed and susceptible to a breach. In other instances, retired assets are deposited at loading docks and left unattended, exposing sensitive data.

When it’s time to retire your assets, keep your data secure by working with a trusted ITAD vendor.

Choose the right ITAD vendor

When searching for an ITAD vendor for your business, it’s important to choose one who is familiar with your industry. Hospitals, for example, have different data disposal criteria than schools or retail stores. It’s also important that the ITAD vendor you choose possesses all certifications required by your company’s procedures. NAID, R2 (Responsible Recycling) and e-Stewards certifications are examples of these certifications.

And don’t neglect to ask potential vendors which security standards they implement throughout the data-disposal process. NIST 800-88r1 is the industry-standard in data erasure and a vendor who doesn’t meet this standard can jeopardize your data security. Taking the time to do your due diligence instead of picking an arbitrary vendor will help ensure the security of your sensitive data.

Some important questions to ask

In addition to asking which certifications potential vendors hold and which security standards they implement…

  • Be sure to ask potential vendors how they destroy assets that can’t be refurbished and what that process entails. You don’t want your computers discarded in a manner that harms the environment.
  • Inquire about the physical security of the facility, employee training practices and the chain of custody involved in the pick up of materials from your business.
  • Schedule a time to tour the processing facility to ensure the practices mentioned are upheld.
  • Ask for documentation of data destruction, either through a Certificate of Destruction (COD) or Certificate of Sanitization (COS). This provides additional documentation of the ITAD process and can put your mind at ease that discarded assets are handled properly.

Do you want to implement an ITAD process, but you’re worried about data security? Tech Dump has you covered! We operate legally and ethically, making sure your data is destroyed and recycled with your best interest and the environment in mind. Give us a call at 763-432-3117 to learn more.

If you’d like to learn more about the importance of implementing an ITAD process for your business, check out one of our latest posts here!