Data Security: Stay Compliant and Dispose of Used IT Equipment Correctly

All businesses should practice extreme caution when disposing of any IT equipment containing sensitive data. Hard drives found intact in open markets around the world are becoming the norm. They are available on various auction sites. Contrary to what most people think, simply deleting files or reformatting a hard drive does not remove all data. Specific softwares can easily restore the information. Overwriting a hard drive is not an effective means of destruction either. Forensic software can read overwritten drives.

Companies have a responsibility to properly dispose of any equipment or storage media containing sensitive information. In order to stay compliant with data security regulations, equipment disposal can be processed by a reputable IT recycling company which uses certified data destruction methods or by using high-security data destruction machines.

It is not uncommon for businesses to experience lost or stolen laptops which indicates poor security practices. This is especially true for companies with telecommuting employees who download sensitive company data to their personal computers.

Used computers and hard drives bought on auction sites have had sensitive information contained on them to include bank account information, credit card details, car registration information, corporate information, and more. In many cases, the previous owners did not erase their hard drives at all. It proves that much of the used equipment belonged to employees who worked from home.

How to Correctly Dispose of IT Equipment

Large companies often erase drives in PC’s before selling them by using industrial-strength erasing tools. However, this is often not enough to ensure complete destruction of data contained on a hard drive. The best way to guarantee secure removal of information is by complete destruction of the hard drive by crushing, mangling, and rendering it unreadable. This is accomplished by using a high-security data destruction machine.

Managers and other office staff responsible for data security should make it a priority to ask electronic waste service providers what happens to the equipment once it leaves their hands. It is not enough to go on the word of someone else about proper disposal of the equipment.  So, someone needs to ensure that they followed all the proper procedures.

In addition to our suite of High-Security Data Destruction products, Phiston provides services that enable companies to properly manage destruction and disposition of electronic data storage media. Contact us today to learn more.

 

Download Whitepaper

'Download

Product Enquiry

Request Quote


    Button