Description

What is your IT asset disposal obligation? Properly Sanitize End-0f-Life Media. There is no statute of limitations or safe harbor for improper IT asset disposition. If it can happen to Morgan Stanley, it can happen to you. When Morgan Stanley closed two data centers in 2016, they hired an outsourced data wiping (overwriting) vendor. Morgan Stanley expected total security of their customers’ private data. 

IT Asset Disposal: Properly Sanitize End-0f-Life Media with Degaussing

What is your IT asset disposal obligation? Properly Sanitize End-0f-Life Media. There is no statute of limitations or safe harbor for improper IT asset disposition. If it can happen to Morgan Stanley, it can happen to you. When Morgan Stanley closed two data centers in 2016, they hired an outsourced data wiping (overwriting) vendor. Morgan Stanley expected total security of their customers’ private data. However, this year, they learned they didn’t get what they expected. Instead, data remained on the “wiped” drives, which violated customer privacy and has left Morgan Stanley with a huge cost risk. Today, the company is facing lawsuits from employees and customers, because the personal information they thought was destroyed came back to haunt them. 

The Hidden Landmine – Discarded Media

Partially destroyed data is a ticking time bomb. There is no statute of limitations or safe harbor for improperly discarded IT assets. Improper IT Asset Disposal (ITAD) is a risk carried forward indefinitely. Consequently, the organization that hired the service provider is still liable for data records discovered, even years later. This is true for all data carrying assets, not just electronic equipment.

riskvscost-databreach-landmine-1024x576

Data breaches happen when best practices for data sanitization are ignored or not fully followed. That includes failure to maintain a proper chain of custody for all data from acquisition to the end of life, not verifying nor documenting the data erasure and destruction for audit purposes.

Best practices for IT asset disposal recommend:

  • Secure, dedicated areas for data destruction
  • Limited access
  • Procedures for each type of data storage device
  • A timeline to sanitize data that reflects the entire life cycle of the media

“Organizations need to do better (about ITAD),” 

says Bob Johnson, CEO of the International Secure Information Governance & Management Association (i-SIGMA), Phoenix.

“They need to be sure 1) they are accounting for IT equipment from the moment it is acquired to the point it is finally disposed of, and, 2) elevate the selection criteria, operating criteria, monitoring procedures, and contracts of IT asset disposal services they use.”

New Realities of IT Asset Disposal

IT Asset Disposition (ITAD) is the process of disposing of unwanted electronic equipment responsibly. Proper ITAD programs ensure organizations mitigate risk, minimize cost, and maximize value recovery. We are seeing a major shift in ITAD policies and practices moving away from concern about the residual value of the equipment to securing data across its lifecycle. Companies used to look for ways to sell old equipment, now they focus on data erasure and destruction because of the risk of a data breach.  

Best Practices

You can mitigate your risk and avoid data breaches like that experienced by Morgan Stanley in 2016, with a simple three-step hard drive decommissioning process: 

  1. Degauss
  2. Destroy
  3. Verify

Degaussing

is the only data erasure method that guarantees that no data is left behind on the hard drive because it eliminates the magnetic field patterns on the drive in a matter of seconds. Degaussing is the primary method of data sanitation approved by the NSA for Top Secret hard drive data erasure.

Physical Hard Drive Destruction

For optimum security, follow degaussing with physical destruction of the hard drive using a hard drive destroyer, such as Garner’s PD-5 destroyer. Physically damaging the hard drive casing and bending the disk platters provides visual confirmation that the hard drive has been securely processed. It also discourages attempts to retrieve data from the drive and visually indicates the drive is ready to leave the controlled environment for recycling or disposal.

Certificate of Erasure and Destruction

Finally, verify your data sanitization process with a system that captures and keeps a record of the destruction process. IRONCLAD Erasure Verification System captures JPG images of degaussed and destroyed media automatically generating a report log, and certificate of erasure and destruction.Garner Products is the internationally recognized leading manufacturer of NSA/CSS EPL-Listed data erasure and destruction equipment. Garner offers a full line of hard drive degaussers and destroyers, from office-quiet desktop units to equipment for Top Secret data elimination. Learn more about Garner Products at GarnerProducts.com

Published by

Chief Global Development Officer at Garner Products, Inc

 

LEAVE A REPLY

NSA-LISTED DEGAUSSER

TS-1XT IRONCLAD

Add an IRONCLAD Erasure Verification System to the TS-1XT to automatically generate a Certificate of Erasure / Destruction report that includes JPG images of degaussed media, hard drive serial numbers and more.

Learn More

HOW TO DESTROY SOLID-STATE MEDIA

RECENT POST