NIST 800-88: Secure Data Destruction Standards for Media Sanitization

NIST 800-88 Guidelines for Secure Data Destruction

In today’s data-driven world, where information is both currency and vulnerability, ensuring secure data destruction is paramount. A company will inevitably have computers and data drives that have reached the end of their useful life, but adopting robust standards for data destruction is essential if your company handles sensitive data that you would not want to fall into the wrong hands. Enter NIST 800-88, a set of guidelines for media sanitization based on determining the best methods for data sanitization or destruction after classifying the data into clear, purge, or destroy categories. Established by the National Institute of Standards and Technology (NIST) the NIST 800-88 guidelines provide standards to guide companies in choosing the best method of destruction for each classification. 

NIST 800-88 Guidelines
NIST

Understanding NIST 800-88

NIST Special Publication 800-88, formally titled “Guidelines for Media Sanitization,” is a comprehensive resource for organizations and individuals seeking to dispose of data-bearing media securely. Initially published in 2006 and subsequently revised, this document provides guidelines for effectively sanitizing various media types, including hard drives, solid-state drives, optical media, etc. The U.S. Federal government requires this standard and many private businesses and organizations have also adopted it.

The Importance of Secure Data Destruction

Why is secure data destruction so crucial? The answer lies in mitigating the risk of data breaches and unauthorized access. When data is no longer needed, simply deleting files or formatting drives is insufficient. Sophisticated data recovery techniques can retrieve sensitive information, posing significant security threats. Secure data destruction ensures that information is irretrievably erased, safeguarding against data leaks and identity theft.

Classified data destruction

Critical Principles of NIST 800-88

NIST 800-88 outlines several key principles for secure data destruction:

Media Sanitization Categories 

The guidelines categorize data based on sensitivity, which helps determine the appropriate sanitization method. Highly sensitive information, such as classified or confidential data, requires more stringent sanitization than less sensitive data. The guidelines categorize media sanitization into three levels: Clear, Purge, and Destroy. Each level corresponds to different methods and levels of assurance in data sanitization.

  1. Clear: Clearing involves removing data from storage media through methods that render the data unreadable but may still be recoverable through advanced techniques. It’s suitable for media that will be reused within an organization.
  2. Purge: Purging ensures that data is irreversibly removed and cannot be reconstructed or retrieved. This level of sanitization is recommended when media will be released from organizational control or repurposed within the organization.
  3. Destroy: Destruction methods physically render the media unusable and unreadable. This level is appropriate when the media will not be reused or if there is any risk of sensitive data being recovered.

Federal Data Classification and Media Sanitization Best Practices

Federal Data Classification and Media Sanitization Best Practices

Commercial Data Classification and Media Sanitization Best Practices

Commercial Data Classification and Data Sanitization Best Practices*These are common customer examples based on our experience. Your CISO (Chief Information Security Officer) should approve the data sanitization or destruction method.

What to Look for in an IT Asset Disposal Partner

Adhering to NIST 800-88 standards requires careful planning and execution. Companies must balance concerns about the risks of harming the environment with e-waste, ensuring they comply with data security standards such as NIST 800-88 and the costs of disposing of end-of-life equipment. Look for companies that can assure you are compliant with NIST 800-88 standards by: 

ITAD Balance Cost Security Sustainability for e-Waste
  • Working with You to Develop a Sanitization Policy: Your data destruction provider should establish clear policies and procedures for data destruction based on NIST guidelines.
  • Selecting Appropriate Methods: Based on the sensitivity of the data, type of media, and intended reuse or disposal, choose a provider who will work with you to determine if your electronics need to be wiped, degaussed, shredded or disintegrated, or some combination of those data destruction methods.   A Certified Secure Data Destruction Specialist (CSDS) at Securis can help you balance security, disposal costs, and environmental concerns.
  • Employ Certified Tools and Services: Your IT Asset Disposition Provider should be able to purge data to NIST 800-88 standards and shred confidential or classified media down to NSA-approved standards of 2mm. Securis can offer these services on-site at your offices or off-site at our secure facilities. 
  • Verification and Documentation:  Regardless of the sanitization methodology, it’s crucial to verify the effectiveness of the process and maintain proper documentation to demonstrate compliance with security policies and regulations. Ensure you are provided with detailed inventory lists that can be easily accessed. These lists should be detailed, accurate, and provided promptly after completing your asset destruction project. At the end of the asset destruction process, you should be provided with an official certificate of destruction that you can use in any future audit.

NIST 800-88 Secure Data Destruction with Securis

In an age where data privacy and security are paramount, adhering to established standards for data destruction is non-negotiable. NIST 800-88 is the most widely adopted standard and provides a comprehensive framework for effectively sanitizing any and all data-bearing media, helping organizations and individuals mitigate the risk of data breaches and protect sensitive information.

By understanding the principles outlined in NIST 800-88 and working with a data destruction provider, like Securis, who can implement robust data destruction and media sanitization practices, you can ensure that data is securely managed throughout its lifecycle, safeguarding privacy and trust for your company.  

Other Data Sanitization and Destruction Standards include IEEE 2883-2022, NSA/CSS Policy Manual 9-12, and DoD 5220.22-M.  For most government contractors, military branches, and data protection experts, the 2006 DoD 5220.22-M standard has been replaced with the NIST 800-88 (1 Pass) standard.  The 2022 IEEE standard focuses on technology created after the latest revision to NIST 800-88 (2014) and clarifies much of the confusion that often exists in data erasure guidance.

HITECH Compliance: Secure Medical Equipment Recycling & Data Destruction

In this article, learn:

  • What is the HITECH Act?
  • How do medical equipment recycling and data destruction support HITECH compliance?
  • How does Securis assist with the proper disposal of electronic medical equipment?

HITECH complianceIn the digital age, where data reigns supreme and information proliferates across numerous platforms and devices, safeguarding sensitive medical data is paramount. The Health Information Technology for Economic and Clinical Health Act (HITECH) is a crucial piece of legislation in the United States that aims to enhance the protection of electronic health information. Among its provisions lies a critical aspect often overlooked: the secure and proper disposal of electronic medical equipment, including secure data destruction.

Mishandling sensitive patient information can lead to severe repercussions, including privacy breaches and financial penalties. Securely destroying medical records involves the systematic and irreversible deletion of data from electronic devices, such as computer hard drives or data storage devices in medical equipment, to prevent unauthorized access or retrieval. This process is essential for protecting patient confidentiality and HITECH compliance. 

What Is the HITECH Act?

HIPPA requirementsEnacted in 2009, the HITECH Act was introduced as part of the American Recovery and Reinvestment Act (ARRA). Its primary objective was to promote the adoption and meaningful use of health information technology, thereby improving healthcare quality, safety, and efficiency. 

Among its various provisions, the HITECH Act strengthened the privacy and security protections outlined in the Health Insurance Portability and Accountability Act (HIPAA). It extended the scope of HIPAA by encompassing business associates of covered entities, mandating stricter enforcement, and imposing substantial penalties for non-compliance.

Key Provisions of the HITECH Act Include:

  • Expansion of HIPAA Regulations:

proper disposal of electronic medical equipmentThe HITECH Act extends the scope of HIPAA by imposing stricter requirements on covered entities and their business associates regarding the security and privacy of electronic health information.

  • Breach Notification Requirements:

Covered entities must notify individuals and relevant authorities in case of a breach involving their protected health information (PHI), promoting transparency and accountability.

  • Enforcement and Penalties:

The HITECH Act introduced enhanced enforcement mechanisms and increased penalties for HIPAA violations, including fines for non-compliance with data security standards.

HITECH Compliance and Secure Data Destruction

What is the HITECH ActAmong the HITECH Act’s requirements lies a critical aspect often overlooked: the secure destruction of data on medical equipment and any computers or electronic devices used in a medical setting.  

Mishandling sensitive patient health information can lead to severe repercussions, including privacy breaches and financial penalties. 

Secure data destruction involves the systematic and irreversible deletion of data from electronic devices, such as computer hard drives or data storage devices in medical equipment, to prevent unauthorized access or retrieval. This process is essential for protecting patient confidentiality and maintaining HITECH compliance. 

Here’s how the HITECH Act is relevant to secure medical equipment recycling and data destruction:

  • Protection of Patient Privacy:

The HITECH Act emphasizes the importance of protecting the privacy and confidentiality of patient health information. Securely destroying data ensures that sensitive information stored on computers and medical equipment is inaccessible to unauthorized individuals.

  • Compliance With Regulatory Requirements:

Healthcare organizations must comply with the security and privacy standards outlined in the HITECH Act to avoid penalties and maintain regulatory compliance. Secure data destruction is crucial to these requirements, demonstrating adherence to best practices in safeguarding electronic health information.

  • The HITECH Act: The HITECH Act: medical equipment disposalRisk Management and Data Breach Prevention:

Healthcare providers can mitigate the risk of data breaches and unauthorized access to patient information by implementing proper data destruction protocols. This proactive approach aligns with the HITECH Act’s objectives of enhancing data security and protecting individuals’ rights to privacy.

  • Lifecycle Management of Medical Equipment:

Medical devices and equipment often contain sensitive patient data, such as electronic health records (EHRs) or diagnostic images. When decommissioning or disposing of such equipment, healthcare facilities must ensure that all data stored on these devices is securely erased to prevent potential data breaches.

Securis Ensures HIPAA & HITECH Act Compliance With Reliable Medical Equipment Recycling Services

how to recycle medical equipmentAs healthcare organizations continue to embrace innovative digital technologies to enhance patient care and administrative efficiency, protecting electronic health information will remain a top priority. 

The HITECH Act serves as a cornerstone in safeguarding patients’ medical records and privacy, with provisions that extend to secure data destructionon computers and hard drives. This includes the encryption and transmission of data and its disposal at the end of its lifecycle. 

Secure medical equipment recycling and data destruction are essential to mitigate the risk of data breaches and safeguard patient privacy. When these electronic devices reach the end of their usefulness or are decommissioned, it is imperative to ensure that any stored electronic information is irreversibly erased to mitigate the risk of unauthorized access or data breaches.

By working with a fully compliant and experienced company like Securis, healthcare entities can uphold their obligations under the HITECH Act while fostering trust among patients and stakeholders in the digital healthcare landscape. Our transparent and trusted process from project analysis to project completion guarantees the proper disposal of electronic medical equipment and the secure destruction of its data.i. 

We invite you to learn more about the data destruction process at Securis and how we can fulfill your medical asset disposal project.

How to Send ESG Ratings Up and Data Security Risk Down

Environmental, Social, and Governance (ESG) ratings are increasingly scrutinized in today’s corporate landscape, leaving many companies searching for ways to improve their eco-friendly practices.  ITAD (IT Asset Disposition) is one area where a company can make decisions that significantly impact its ESG score. However, companies need to consider data security in addition to ESG-boosting practices when disposing of end-of-life electronics. 

ESG scoreEvery year, companies dispose of countless tons of electronic waste (also known as e-waste) often with little consideration for environmental consequences. In fact, according to the World Economic Forum, “The United States generates about 46 pounds of e-waste per capita annually, according to the United Nations 2020 e-waste monitoring report. Globally, 53.6 million metric tons of e-waste are produced every year worlwide, the analysis estimates. Maybe unsurprisingly, but still alarmingly, only about 17% of this waste is properly collected, documented, and recycled across the globe each year. Much of the remaining 83% of e-waste sits idle in homes and businesses or is disposed of improperly, according to the analysis.*1 

E-waste often contains hazardous substances like cadmium, lead, arsenic, and polyvinyl chlorides (PVC), which can lead to soil, water, and air contamination with far-reaching ecological consequences. 

The Importance of R2v3 Certification 

R2v3 certified The best way to increase your ESG score when you are ready to dispose of end-of-life equipment is to make sure that you are working with an R2v3-certified company that understands the circular economy of technology. This type of company can make sure that every component of an electronic device is reused or recycled to maximize the value of the waste or to make sure that it is disposed of in a way that causes minimal harm to the environment. 

Support a Circular Economy 

support a circular economy

Working with a company committed to re-using all possible components of your retired electronics allows companies to develop a more sustainable and efficient economic model regarding the lifecycle of their electronic devices, resulting in improved ESG ratings. 

Once decommissioned, Securis processes each component using a procedure that determines if a component has any residual value. If so, that value is shared with our clients in our Value Recovery Program; if not, each component is recycled in the most environmentally friendly way possible. We even require our downstream vendors to sign an Agreement for the Responsible Disposal of Sensitive Materials. 

Prioritize Data Security While Improving ESG Ratings

While increasing ESG ratings is an admirable goal for any company, prioritizing data security is paramount when disposing of electronic equipment. This is because devices such as servers, laptops, and hard drives often contain sensitive information. 

shredding electronic wastePartnering with a certified IT asset disposition (ITAD) specialist like Securis can ensure that data is securely destroyed to NSA standards before equipment is decommissioned. 

In addition to knowing that you are working with a responsible partner in decommissioning and recycling your assets, you need proof that shows exactly what your company decommissioned and recycled. 

Working with a company that provides detailed inventory lists and a certified Certificate of Destruction can provide physical proof that your company is a responsible steward of the environment, making the right choices to protect the planet. 

The inventory lists do not yet have ESG ratings, but they will detail all re-used or responsibly recycled assets. By keeping those end-of-life electronics out of landfills, you contribute to a circular economy of technology and increase that all-important ESG score.

certified data destructionSecuris Makes the Following Environmental Commitments: 

  • Securis will not export electronics to developing countries and continents like China, India, and Africa to comply with the Basel Action Network (BAN). 
  • Securis will commit to doing all it can to recycle 100% of everything it receives. 
  • Securis will continually look for ways to improve e-waste recycling efficiency. 
  • Securis will exceed U.S. federal recycling mandates to comply with the widely adopted international standard. 
  • All downstream processors receiving shredded material from Securis must complete an Agreement for Responsible Disposal of Sensitive Materials. 
  • Currently, all magnetic media is incinerated using the cleanest methods available. Smelting documentation can be provided upon request. 
  • All metal-based material is sent to a domestic-based refinery for refinement based on its content.

boost your ESG ratingBuild a Sustainable Future & Boost Your ESG Score

By embracing compliant, certified, and responsible IT Asset decommissioning and recycling vendors like Securis and adopting responsible e-waste management practices, companies can assure their data security and improve their ESG ratings while contributing to a sustainable future for generations. 

Contact Securis today for more information.

1) https://www.weforum.org/agenda/2023/03/the-enormous-opportunity-of-e-waste-recycling/#:~:text= Globally%2C%2053.6%20million%20metric%20tons,across%20the%20globe%20each%20year

 

How Are Magnetic Hard Drives Shredded?

Quite a few customers have asked us exactly how we shred a hard drive. To help explain this, below are the steps that a magnetic hard drive goes through.

Introduction to the Shredder:

The hard drive is placed into the shredder. Industrial shredders for electronic equipment like hard drives typically have solid and metal-cutting blades. 

Cutting Mechanism:

The blades in the shredder are made of heavy-duty metals, such as hardened steel or tungsten carbide. Depending on the shredder’s design, they are arranged in a crisscross pattern or a spiral or helical arrangement.

Initial Contact and Cutting:

When the magnetic hard drive passes through these blades, the outer casing, usually aluminum or hard plastic for external drives, is first cut. The strength and sharpness of the blades allow them to slice through this material.

hard drive destructionDestruction of the Magnetic Hard Drive’s Internal Components:

As the shredding continues, the blades come into contact with the hard drive’s internal components. This includes the platters (which store the data), the spindle, the read/write arms, and the circuit board. The blades are designed to cut through these materials, breaking them into smaller pieces.

Fragmentation of Platters:

The platters, typically made of aluminum, glass, or ceramic coated with a thin layer of magnetic material, are the most crucial part of data storage. The shredder blades must be strong enough to deform and fragment these platters, making them unreadable.

Discharge of Shredded Material:

The resulting debris, consisting of small metal, plastic, and other materials, is expelled from the shredder. This material is usually collected for disposal or recycling.

magnetic hard drive recyclingEnsuring Data Destruction for Magnetic Hard Drives:

The effectiveness of the shredding process in destroying data is due to the physical deformation and fragmentation of the platters. Since data is stored magnetically on the surface of the platters, their physical destruction renders the data unrecoverable.

The entire process is quite forceful and noisy, requiring robust machinery. The shredders must exert significant force to break down the hard drive’s materials, especially the metal components. The shredder’s design, including the blades’ pattern and strength, is crucial for thoroughly destroying magnetic hard drives. 

Read more about how Securis destroys hard drives here.

 

 

 

What Is R2 Certification in E-Waste Recycling?

R2 certification, established by Sustainable Electronics Recycling International (SERI), is a global standard for any R2-certified recycler. This certification encompasses environmental, health, safety, quality, and data security standards. It is a hallmark of responsible operation for R2-certified recyclers, ensuring they minimize environmental and health risks.

Why Is Choosing an R2 Certified Recycler Important for E-Waste Recycling?

Opting for an R2-certified recycler is critical in e-waste management. These recyclers are held to stringent standards, ensuring the protection of the environment, human health, and safety. Furthermore, an R2-certified recycler assures data protection, ensuring that any data from end-of-life technology is destroyed correctly.

circular economyHow Does R2 Certification Promote a Circular Economy in Electronics?

R2 certification is essential for recyclers in promoting a circular economy. An R2-certified recycler plays a pivotal role in extending each device’s life through reuse and recycling. This process, endorsed by R2 standards, helps conserve natural resources and ensures responsible electronic waste handling and disposal.

What Risks Are Associated With Non-R2 Certified E-Waste Recyclers?

Recyclers without R2 certification often lack accountability, leading to irresponsible recycling practices. Unlike an R2-certified recycler, they may inadequately protect sensitive data and cause harmful environmental impacts due to the improper disposal of toxic materials.

R2 recyclerHow Can I Verify if a Company Is Truly an R2 Certified Recycler?

To verify a company’s R2 certification, it’s recommended to consult the SERI website. They provide a searchable database to identify R2-certified recyclers based on region or name. This verification is crucial to ensure you are dealing with a genuinely R2-certified recycler and not a company falsely claiming such certification.

What Role Does R2 Certification Play in Data Protection?

For an R2-certified recycler, data protection is a significant aspect of their service. R2 standards ensure that these recyclers effectively destroy any data contained in end-of-life technology. This is a critical consideration in e-waste recycling, particularly for businesses and individuals concerned about data security.

Read more about the certifications and compliance standards that Securis has attained. 

Securis: Past, Present and Future of ITAD

It’s 2023, and at Securis, we’re looking forward to serving you with the best data destruction and end-of-life equipment recycling services in the universe (we have big ambitions)! Today, we highlight the milestones and stepping stones that have taken us to where we are. We’ll also give you a preview of the future as we think about the past, present, and future of ITAD (Information Technology Asset Destruction).

Some moments blend with others, are blurry or aren’t listed in the timeline below. That doesn’t mean they don’t hold monumental significance in Securis’ and our individual growth.

We thank each and every employee, vendor, partner, and customer – past, present, and future. We wouldn’t be here without you.

2023

We’re expanding! The new facility has 67,000 square feet. Can you imagine how much more data we can destroy and how much equipment we’ll keep out of landfills? It’s exciting, to say the least! It’s HUGE!

2022

  • We turned 22 years old and have two tractors, six trucks, two end dumps, and 11 trailers. 
  • 72 employees, many of whom attended the High Tech Prayer Breakfast for the third year.
  • 2023 will be the 17th year of partnering with a local high school to provide children in the special education program with an opportunity to get hands-on work experience.

2020 2021

  • Securis added a conveyor belt and bulb crusher to improve efficiency and service capabilities.
  • Expanded operations to the warehouse next door for better access and team productivity.
  • In November 2020, long-term employee Dan Mattock celebrated 10 years with Securis. We were impressed with six trucks and 35,000 warehouse space at that time. We had 45 employees compared to today’s 72.

2018 – 2019

  • Partnered with Service Source to provide additional employment opportunities for people with disabilities.

  • Added a second warehouse, expanding our facilities from 12,000 to 22,000 square feet.
  • Our customers were introduced to our IT Asset Value Recovery Program. This rebate system allows Securis to provide value from end-of-life equipment and scrap. They choose to use the credit for an upcoming project, or we’ll write them a check.
  • Accompanied Justice & Mercy to The Amazon to help them provide people in remote villages with health and dental care while spreading the love of Jesus.

2017 

  • Sponsored a young woman in Moldova. Victoria, a 16-year-old who loves the color yellow, is at risk. In Moldova, the government’s institutional care of abandoned and orphaned children only lasts until they turn 16. At that time, without support, they’d be on their own with nowhere to stay and no family. Read more about giving back and being of service here.

2014-2016

  • Began offering franchise opportunities along the east coast. 
  • Considered partnering with Nascar Driver Jeff Maupin to sponsor his Nascar Truck. We couldn’t justify the project at the time, but the idea was fun to think about (it would have been really cool – think about the Securis-branded earplugs we could have given away).

2013

  • Added microshredding technology to our service portfolio, allowing for data destruction that goes beyond traditional shredding and pulverizes devices into 2MM e-crumbs.
  • Advanced cloud-based mobile inventory tracking system and began the beta rollouts of our proprietary customer inventory portal.

2012

  • Rebranded the company from PC Recycler to Securis, focusing on ultra-secure data destruction services.
  • Obtained R2 Certification and earned the Inc 500 fastest-growing private companies award.
The team was sharp, even back then!

2010-2011

  • Added on-site degaussing services to our portfolio, and implemented capabilities to provide on-site, high-speed degaussing and shredding. 
  • 13 people and six trucks. 13 people then was a lot of people for us! 

2009-2010

  • GSA Contract Schedule and obtained NAID AAA Certification with an expansion to 12,000 square feet!
  • On-site High-Speed Data Shredding and custom Cloud CRM & ERP software on Salesforce.com.

2005-2007

  • Moved from New York City to the Washington DC area, expanding from 4,000 square feet to 8,000 square feet.
  • Scanning technology implementation.
  • On-site hard drive destruction was introduced, allowing highly secure companies to witness the destruction at their location.
  • Salesforce.com implementation.

2003

  • First Fortune 500 customer (Coca-Cola).

2000

  • Our founder, Jeremy Farber, established PC Recycler in New York.

We’re looking forward to the next 23 years with you!

Can You Make Money from End-Of-Life Electronics?

End-of-life electronics contain precious metals and elements, such as gold, silicon, platinum, and more. Your end-of-life computers and IT assets must be worth a fortune, right? Not exactly, but there are ways that IT departments can maximize the value of old IT equipment. The greatest value is when computers can be repurposed and upcycled, but some equipment is too damaged and must be dismantled and sold for scrap. 

Can You Make Money from End-Of-Life Electronics?

How IT Departments Can Maximize IT Asset Value

It may be tempting for an organization to keep employees on old technology. New electronic equipment is expensive, there’s downtime for installations and training, and any upgrade is disrupting. However, a survey recently found that $1.8 trillion (not a typo – TRILLION!) is lost each year due to technology that should have been retired. Old computers and other electronic devices are slower and often unable to be upgraded to the latest version. 

Make Money from End-Of-Life Electronics

Storage of End-Of-Life Electronics to Gain the Highest Recovery Value (Make Money from End-Of-Life Electronics)

Once a computer or server “dies,” it’s easy to dismiss and throw it in a trash bin for collection. Taking care of how you store these items may greatly increase the value you receive. However, you can make money from end-of-life electronics. 

Make Money from End-Of-Life Electronics

Here’s How to Make Money from End-of-Life Electronics

  • Store it safely without damage in dry, cool environments
  • Laptops should be placed on their sides if put in boxes. Be careful not to stack too many on top of each other on a pallet, which can damage the screens of bottom units. This is especially common in MacBooks.  
  • Don’t write or add labels to items that are still in the original boxes & packaging 

Data & Parts Removal

  • Hard drive data erasure can increase the value of retired equipment by 5-10%. Shredding or degaussing is costly and returns no additional revenue.
  • Keep the covers or panels with the unit (laptop).  Serial-numbered plastic pieces may not be recycled properly. A complete unit will return a higher value than if this part is missing or damaged.  
  • WiFi Cards, Optical Drives, and Memory (RAM) contain NO DATA. Mistakenly removing these parts can significantly limit an item’s resale value. Review the below examples to ensure only the hard drive is removed, or let Securis handle it for you.

Laptop Hard Drives and WiFi Cards

Hard Drives usually have a size capacity such as 256GB, 500GB, 1TB printed on the label.

hard drives and wifi cards that hold data and don't hold data

IT asset value recovery isn’t top of mind for most organizations. That concern only comes after obtaining peace of mind regarding keeping sensitive data safe. 4,145 publicly disclosed breaches exposed over 22 billion records in 2021. 

4,145 publicly disclosed breaches exposed over 22 billion records in 2021

Make Money from End-Of-Life Electronics

If you’re not sure what value your retired IT equipment holds, we’ll help you. Schedule an onsite visit with us with no obligation. We’ll come to you, evaluate your end-of-life equipment and let you know what we predict you’ll regain from your retired assets. 

Working for a Company with Great Core Values

One of the most important aspects of hiring people to work with Securis is how potential employees fit in with the company culture and our existing team. Specifically, this means that each candidate is measured using Securis’ core values. 

Securis’ Great Core Values

Helps First: Put the team first
Fun: Have the right attitude and stay positive
Hungry: Have big goals and want to conquer the world
Humbly Confident: Be humble, but be confident also
Work-Life Harmony: Both are important but must be in balance
Coachable: Never stop learning
Innovative: Nothing’s carved in stone, Question everything, Look for new ways

The Core Value “Fun” in Action

This weekend, the team celebrated Securis employees and their families while demonstrating some of the company’s core values. The Human Resources team was fun, innovative, and exhibited helping first. 

core value helps first fun

They organized a great event with games, prizes, food, and even a magic show for the children and Franklin the dog (and let’s admit it, the adults as well).  

core value fun with magic show

Core Value: Innovative

The day of fun included quite a variety of innovative games and activities including an Oreo contest, a whipped cream game, and a competitive watermelon eating contest.

It got a bit messy, but we don’t judge. We’re all in for commitment and team playing (and perhaps a bit of friendly competition).

Looks like an Olympian-tiered medal ceremony, although there seems to be a bit of confusion, as the 3rd place winner seems to have not even taken a single bite. Perhaps this is her second or third watermelon?

These kids are obviously taking each competition very seriously…

Two lucky winners took home raffle prizes. Congratulations!

Good food, good friends, and workplace diversity come together as a true work family, solidified in core values, mission, and focus.

There are a lot of job opportunities out there, and many different life paths. Secuirs offers an amazing workplace that’s growing, hiring, and will be the best place you’ll ever work. Securis people come together to make great things happen for families, companies, government agencies, and the planet through equipment recycling, data destruction, and a commitment to serving employees, customers, and vendors the way that Christ served his people.

Interested in working for Securis? Here are our current career opportunities.

Eighth-Grader Saves End-of-Life Electronics from Landfills

When his family threw out an old microwave, eighth-grader Eric Akers figured there must be a better way to get rid of old electronics. Concern for the environment and his future led him to Google, where he researched electronics recycling and available options. He wondered where that old microwave could have gone rather than ending up in a landfill.

safest place to recycle old electronics

Eric’s search led him to Securis, where he learned about Securis’ monthly electronic waste recycling event. He found the event nearest him, located in Northern Virginia.

Eric decided to help his neighbors bring their end-of-life electronics to Securis for recycling. He knew right then how he could help his neighborhood, the planet, and meet the requirements for his J.L. Simpson Middle School National Junior Honor Society project, which was happening during the same time.

Through his neighborhood’s and school’s Facebook groups, Eric began to figure out how to best collect the most end-of-life electronics. He wanted to make a big impact and keep retired computers and other e-waste from seeping harmful chemicals into the earth.

To make it easy for nearby schools and communities, he placed a box on his front porch. He was pleased to see how quickly it was filled. His efforts were so popular that neighbors were calling him to make sure he still wanted their unusable electronic devices. He did want them.

electronics recycling event

During the month leading up to Securis’ IT recycling event, Eric continued to collect old computers, phones, wires, and other electronic products from his neighbors. At first, he tried to keep an inventory of everything that he collected. After receiving 184 cords, he lost track of what was being dropped off and focused on the fact that people were participating in his e-waste recycling initiative.

When the time came, Eric and his family packed the bed of his dad’s truck with the e-waste he’d collected. They brought all of it to Securis to properly recycle. His recycling project included a wide variety of items like computers, phones, wires and cables, speakers, DVD players, and other electronic equipment. Holiday lights were even included in Securis’ list of acceptable items for the community electronics recycling event.

eric with his community electronics for recycling

Securis is thrilled to see initiatives like Eric’s recycling project, a mission we’re passionate about. Our younger generations are sure to continue with a commitment to environmentally-friendly recycling. These events help to protect our natural resources.

Many electronics recycling companies don’t guarantee the safety of the data remaining on old devices. Secuirs’ mission is to protect data. In addition to aiding in environmental protection, Eric’s project helped keep his neighbor’s personal information safe!

Securis offers monthly events for communities to properly dispose of their old and unused electronics. If you’d like to set up a pick-up for your community, please fill out our form to get more information.

Best eWaste Recycling Specialist Award Given to Securis

United Kingdom, 2022 – Acquisition International Magazine has announced the 2021 Global Green Business Awards winners. Securis is honored to be named the Best eWaste Recycling Specialist – USA.

The Global Green Awards recognize businesses that strive for environmentally-friendly ideologies at the core of their business practices. This award covers more than just the corporate landscape. Winners have been announced within technology, packaging, food and drink, exercise, and more.

Integrating green initiatives within a business can not only add to the CSR (Corporate Social Responsibility) and benefit the company but also set an example for many others. Securis is proud to be among such an elite group of organizations dedicated to the environment.

To view, click the magazine image and scroll to page 4 for Securis.

Global Green Business Awards with Securis Recognized as Best e-Waste Recycler

In a global market, it’s affirming to have Securis’ 20+ years of experience recognized as the Best eWaste Recycling Specialist in the United States. Securis understands the importance of proper e-waste disposal. If old computers, monitors, and other electronics are not properly recycled, harmful chemicals seep into the Earth. That our dedication is seen and rewarded with the Global Green Business Award Best eWaste Recycling Specialists is appreciated.

Securis Named Best eWaste Recycling Specialist

Securis is passionate about minimizing the impact created by irresponsible disposal of old electronics and computers. The company is dedicated to continually providing solutions to safely dispose of obsolete electronics.

For the future of our business and the global environment, it is the responsibility of all companies, organizations, and individuals to reduce the scope of both their professional and personal carbon footprints.

Securis will continue to responsibly recycle retired computers, laptops, keyboards, servers, phones, monitors, and other electronics. It is our duty to ensure that nothing ends up in a landfill, in compliance with our zero-export policy.

Trust Securis for your e-waste recycling needs. Contact us today.

Related

E-Waste Recycling FAQs

IT Recycling