What Is a Degausser and How Does It Work?

Degaussing Basics: What Is a Degausser?

A degausser (also known as a demagnetizer) is a machine that disrupts and eliminates magnetic fields stored on tapes, disks, and hard drives. The process of degaussing changes the magnetic domain where data is stored, making it unreadable and unable to be recovered. Degaussing neutralizes the magnetic field on the media, permanently erasing all data and formatting by randomizing magnetic domains. 

In other words, when you degauss a hard drive, you’re not just deleting files—you’re erasing the magnetic blueprint that makes data retrievable in the first place.

Degaussing services are a vital step in secure IT asset disposition, especially in industries where data privacy is non-negotiable.

How a Degaussing Machine Works 

A degaussing machine—sometimes called a demagnetizer, generates a strong, controlled magnetic field that overwhelms the existing magnetization of your storage media. Whether it’s an LTO backup tape or a spinning HDD, the degausser magnet inside the machine alters the alignment of magnetic particles, making previously stored data unreadable and impossible to recover.

The strength of the magnetic field is measured in Oersteds (Oe), which helps determine which type of degausser is needed. For example, most modern hard drives require 5,000 Oe or more for successful hard disk degaussing.

Degaussing is effective only on magnetic media such as hard disk drives (HDDs), VHS tapes, audio cassettes, and magnetic backup tapes like LTO and DLT. They are ineffective on non-magnetic media such as solid-state drives (SSDs), optical discs (CD/DVD/Blu-ray), or USB flash drives. Degaussing is one of the best steps to take before destroying or shredding hard drives. It gives you extra protection against someone gaining unauthorized access to your data.  

Degaussing Terms to Know

When exploring degaussing services, it helps to understand a few key terms:

  • Oersted (Oe): A unit of magnetic field strength. You’ll find Oe ratings of about 1800 or higher for current tapes, while hard drives can easily reach 5,000 Oe. These energy level ratings tell you how strong of a degausser you’ll need to destroy the data stored on the device.  Higher values mean you’ll need a stronger degausser magnet to degauss a hard drive successfully.
  • Coercivity: You’ll see coercivity used interchangeably with Oersted in many instances because Coercivity is the amount of magnetic field strength required to reduce a material’s magnetization to zero after it has been magnetized. Essentially, this is a rating of how easy or difficult it will be to demagnetize your magnetic media. Like Oersteds, higher coercivity means you need a more powerful hard drive degausser.

In short: the denser or more resistant your magnetic media, the more robust your degaussing hard drive process must be.

Why Degaussing Efficiency Depends on Design

The design of a degausser plays a crucial role in determining how effectively it can erase data from magnetic media. At the core of its functionality is the ability to generate a substantial magnetic field, which is vital for erasing data.

Magnetic Field Dynamics

A powerful magnetic field is essential for altering the polarity of the particles in magnetic media, thereby erasing the data. The effectiveness of this magnetic field is primarily influenced by the design of the degausser. Specifically, the coils within the device are fundamental—they generate the magnetic field required for data erasure.

  • Strength of Coils: To ensure complete data removal, the strength of these coils must be two to three times that of the media’s magnetic properties. Even stronger fields are necessary for highly sensitive data, such as those classified as Restricted or Top Secret.
  • Measurement: This magnetic strength is often measured in Oersteds, honoring Hans Christian Oersted’s contribution to understanding electromagnetic interactions.

Efficiency Enhancements in Design

To further enhance efficiency, degaussers are designed with various features:

  • Multi-Axial Coil Orientation: Utilizing multiple coils in different orientations creates a more comprehensive magnetic field, ensuring thorough data erasure.
  • Rotation Mechanism: Some designs incorporate the coils’ rotation or the media itself. This movement allows the magnetic field to interact with all media parts, enhancing the degaussing process.

Media Transport Mechanism

How media is transported through the magnetic field also impacts efficiency. Degausser designs may include:

  • Belt Conveyors: Automatically transport media at a consistent speed, ensuring uniform exposure to the magnetic field.
  • Motorized Spindles: Rotate the media, optimizing the field’s interaction with its entire surface.

In summary, the degausser’s efficiency hinges on its ability to produce a dynamic and powerful magnetic field and its media handling mechanisms. These devices maximize data erasure through thoughtful design, catering to varying security requirements and media types. At Securis, our NSA-approved LM4 degausser includes all these design efficiencies and more, making our hard drive degaussing service one of the most effective available. 

How Magnetic Media Density Influences the Degaussing Process

The density of magnetic media plays a crucial role in determining the effectiveness of the degaussing process. In high-density media, data is stored in closer proximity, making it more challenging to erase thoroughly. Consequently, a more powerful degausser is essential to ensure complete data removal.

Key Considerations:

  • Density Levels: Denser media, like modern hard drives, require a degausser capable of generating a stronger magnetic field. This ensures every bit is reset, wiping all traces of information.
  • Degaussing Power: Selecting a degausser with adequate power is critical. Not all degaussers are created equal; some might fall short when dealing with high-density media. Using equipment on the approved list for the NSA can ensure you have sufficient power.  Using an underpowered degausser on dense media can lead to incomplete data erasure, posing a security risk.

Understanding and considering the density of your magnetic media is key to selecting the right degaussing tool. Working with a vendor like Securis, which uses NSA-approved Degaussing equipment, can ensure the tools used are the right match and ensure data is irretrievably erased, maintaining your security and allowing for peace of mind.

Can a Degaussed Hard Drive be Reused?

This is a common question: can a degaussed hard drive be reused?

In most cases, the answer is no. While some older magnetic media like VHS tapes or reel-to-reel audio tapes might still function post-degaussing, modern hard drives become unusable. Once the magnetic domains are randomized, the drive’s firmware and calibration are wiped out. For secure hard drive data destruction, that’s exactly what you want.

Why Degaussing Is Still Relevant

You might be wondering: what does a degausser do that other data destruction methods don’t?

Unlike software overwrites or formatting, degaussing offers:

  • Complete Data Erasure: Nothing can be recovered, even with advanced forensic tools.
  • Hardware-Neutral Destruction: Works on failed or non-functioning drives.
  • Fast & Scalable: Ideal for large volumes of retired IT assets.

Secure data erasure is also often required by regulations in healthcare, government, and finance. It’s not optional—it’s part of compliance.

Can a Degausser Destroy an SSD?  (Solid State Drive)

Solid-state drives are not magnetic media, so they can’t be erased using a degausser. Because SSDs store data electronically on NAND flash chips (not magnetically), degaussing is ineffective. SSDs should be shredded to particles no larger than 2mm for secure disposal, following NSA/CSS SSD destruction standards. 

It’s important to know that solid-state drives (SSDs), optical discs (CD/DVD/Blu-ray), or USB flash drives cannot be degaussed. Why? These types of data storage devices do not store data magnetically, so degaussing magnets are useless here. Instead, these devices must be physically shredded to particles no larger than 2mm for secure disposal, following NSA/CSS SSD destruction standards. This is why Securis includes hard drive shredding as a redundancy step, especially for environments that mix drive types.

Do You Need Degaussing Services?

If your old equipment contains personally identifiable information (PII), financial records, or health data, the answer is clear: yes. Degaussing hard drives is one of the most secure ways to ensure your data won’t fall into the wrong hands.

Whether you’re handling classified data, managing a healthcare network, or decommissioning hundreds of legacy devices, degaussing should be a part of your IT asset disposition services.

Securis offers both on-site data destruction (from our 26’ box truck) and off-site degaussing at our NAID-certified facility. Our team verifies and recertifies every degausser machine annually, and we track each device processed with an audit-ready inventory report and certificate of destruction.

degaussing machineSecuris Degaussing Services for the Ultimate in Secure Data Destruction

Degaussing provides the most reliable, efficient, and hardware-independent solution for complete data erasure, ensuring that sensitive information is fully protected from unauthorized recovery. If you are looking for hard drive degaussing services, look no further. 

  • Securis provides compliant on-site and off-site degaussing services for hard drives, backup LTO and DLT tapes.
  • The degausser is internally mounted and powered by our 26’ box truck so that mobile hard drive degaussing services can be completed at your site, allowing you to witness the process. However, we can also complete the degaussing services off-site at our secure, NAID-certified facility.
  • Our NSA-approved LM4 degausser is used for optimum data destruction.
  • Our hard drive and tape degaussing service options are fully compliant with all National Institute of Standards and Technology (NIST) Special Publication Series 800-88 and National Industrial Security Program (NISP) Operating Manual 32 CRF Part 117 (which replaced DOD 5220.22-M).
  • Monitoring of the magnetic fields is done via a program called FieldCheckR. Our degausser is verified before every degaussing process to ensure it properly functions. Our degausser is recertified annually by the manufacturer.
  • Securis offers hard drive shredding as an added redundancy to ensure absolute data destruction. Because a degaussed drive and a non-degaussed drive physically do not look different, it is a best practice to shred drives after they are degaussed.

Ready to Protect Your Data?

Don’t leave secure data disposal to chance. Trust Securis for NSA degaussing compliance, magnetic media destruction, and full-spectrum IT asset disposition services.

👉 Request a Quote for Degaussing Services Today

Smart Data Center Decommissioning Strategies for a Secure, Accurate, and Sustainable Transition

Why Secure Data Center Decommissioning Matters More Than Ever

Decommissioning a data center isn’t just about shutting off servers. It’s a high-risk, high-impact process that requires a secure, accurate, and sustainable approach. Whether moving to the cloud, consolidating infrastructure, or upgrading facilities, your organization must protect data, stay compliant, minimize environmental impact, and recover as much value as possible.

Here’s how IT leaders and asset managers can get it right—without compromising security, compliance, or ROI.

PHI must be secured when decommissioning a data center1. Secure Data Destruction Is Non-Negotiable when Decommissioning a Data Center

Data centers house terabytes of sensitive information stored on hard drives and other data-bearing devices. Ensuring complete data destruction is critical when these devices reach end-of-life (EOL).

Secure data destruction, however, isn’t just about wiping drives. In today’s regulatory environment, it’s about verifiable, auditable data destruction aligned with NIST 800-88 Guidelines for media sanitization and industry-specific requirements like HIPAA, HITECH, GLBA, or SOX.

Best Practices for Secure Data Destruction:

Build destruction protocols into the decommissioning plan upfront. Consider Physical data destruction methods that guarantee total data elimination. There are several effective methods for secure data destruction:

  • Data wiping: Also called data erasure, this refers to software-based erasure that is compliant with standards like NIST 800-88. 
  • Degaussing: This technique uses magnetic fields to render data unreadable on traditional hard drives. However, it can be used on conventional hard drives only, as SSDs do not contain magnetic data. 
  • Shredding: Physically destroys the storage medium, rendering recovery impossible.
  • Disintegration: Disintegration (also known as micro shredding)  is prescribed for devices such as SSDs, smartphones, thumb drives, and SD cards, which turns these smaller devices into digital dust.
  • Consider on-site media destruction options to eliminate chain-of-custody vulnerabilities.
  • Ensure your vendor uses advanced and accurate inventory tracking to account for every asset at every stage of the decommissioning process. 
  • For organizations that require documentation for internal audits or compliance purposes, it’s essential to obtain a Certificate of Destruction (CoD) for each data-storing device that is processed. 
  • Without bulletproof documentation, proving compliance during an audit or investigation can be a headache at best. 
  • Work with experienced vendors who know where all data storage might be hiding

2. Regulatory Compliance and Proper ITAD Certifications Are Essential

Compliance isn’t just a box to check when decommissioning a data center—it’s a legal and ethical imperative. Decommissioning teams must be fluent in regulations like the Gramm-Leach-Bliley Act (GLBA), HIPAA, HITECH, and The Sarbanes-Oxley Act (SOX), each of which outlines strict guidelines for protecting and disposing of sensitive information. Failure to adhere to these laws during the IT asset disposition (ITAD) process can lead to severe consequences:

  • certified ITAD vendors understand compliance needsSignificant fines
  • Legal action
  • Damage to brand reputation
  • Loss of customer trust

While offloading end-of-life (EOL) assets on a public marketplace like eBay might seem like a quick cost-saving tactic, doing so without proper sanitization and compliance checks can expose your organization to serious risk.

Certifications are vital indicators that a data destruction provider understands and complies with the regulatory landscape. They also mean that certificates of destruction are valid proof that your data destruction process met compliance standards. Key certifications and standards include: 

  • NAID AAA: This compliance certification sets the benchmark for secure data destruction. NAID audits service providers unannounced to validate ongoing compliance.
  • R2v3: Recognized as the leading standard for responsible electronics recycling and refurbishment. It ensures environmental controls, worker safety, and secure downstream tracking.
  • ISO 9001: Framework for consistent quality management processes across all operations.
  • ISO 14001: Focuses on minimizing environmental impact and ensuring sustainable business practices.
  • ISO 45001: Addresses occupational health and safety.

Choosing a vendor with these certifications isn’t just about checking compliance boxes—it’s about mitigating risk. A certified partner will follow strict protocols for asset tracking, secure data destruction, documentation, and environmental protection, helping ensure that your organization remains compliant and audit-ready at all times.

Compliance may seem complicated, but it can be as simple as understanding what’s at stake and selecting a vendor with the proper credentials.

Learn more about how Securis can help you avoid costly Data Center Decommissioning mistakes – Contact Us today!

3. Maximize Reuse to Support Sustainability

retired data center assets can be reused

As the tech industry evolves, the circular economy has become a guiding principle for managing and disposing of IT equipment. Instead of defaulting to recycling or destruction, organizations are increasingly exploring opportunities to reuse and repurpose data center IT assets—reducing waste and maximizing return on investment. 

What can be reused?

  • Server hardware like CPUs, RAM, NICs (no sensitive data stored)
  • Networking gear such as switches, routers, and firewalls
  • Power distribution units (PDUs) and uninterruptible power supplies (UPS)
  • Cooling systems, including air conditioners and chillers
  • Racks, cabinets, and cable management infrastructure
  • Cabling (copper and fiber optic) for reuse in other networks or resale
  • Security systems transferable to new facilities or for resale 
  • All functional IT Assets can be reused or resold after they have been purged of data to NIST 800 – 88 standards.

Reusing, reselling, or donating these components reduces the environmental impact and can recover residual value, turning a sunk cost into a revenue opportunity. Proper asset liquidation planning can offset a significant portion of the decommissioning cost, especially for large data center environments. Look for a vendor willing to give you a fair market evaluation of functional equipment with revenue-sharing models for refurbished resale. 

Sustainability and environmental responsibility must also be considered for all waste that can no longer be reused or resold.  Improper disposal of data center hardware can contribute to hazardous waste due to toxic components like mercury, lead, and cadmium. For IT Assets that are no longer viable, IT recycling means ensuring that not only your ITAD vendor but all of their downstream vendors adhere to strict standards when disposing of assets that need to be recycled.  Work only with vendors that have earned an R2v3 certification, which gives you the peace of mind that the vendor has strict standards for responsible IT Asset recycling.

Incorporating sustainability into your data center decommissioning project can protect the environment, increase ROI, and support corporate ESG (Environmental, Social, and Governance) initiatives. 

4. Don’t Forget Documentation and Logistics

Certificate of Data DestructionEven the most technically sound projects can falter without realistic timelines. Data center decommissioning is resource-intensive, often requiring:

  • Physical removal planning based on rack density and cabling complexity
  • Coordination with facilities teams for power, cooling, and security access

Accordingly, flexible scheduling should be planned to accommodate unanticipated issues. Experienced project managers know how to build in buffer time to avoid rushed, mistake-prone data center shutdowns.

A comprehensive data center decommissioning plan should also include:

  • Detailed inventory tracking for all assets. Choose a vendor that can implement advanced inventory management systems with 99% accuracy.
  • Audit-ready reports and certificates of destruction to satisfy internal and external requirements that will be made available whenever you need them and will also be easy to access.
  • A secure chain of custody throughout the entire removal, destruction, and recycling process
  • Logistics planning for equipment transport, on-site services, and timing

Even well-intentioned efforts can lead to compliance gaps or operational delays without clear documentation and controls.

5. Expert Support From an Experienced ITAD Company Makes the Difference

Data center decommissioning involves far more than hardware removal—it’s a complex, high-stakes project that requires security, compliance, environmental responsibility, and financial stewardship. 

With 25 years of experience in secure data center decommissioning and IT asset disposition, Securis recognizes the inherent risks of retiring end-of-life equipment.  Our approach prioritizes secure data destruction methods that guarantee total data elimination.  Our team provides comprehensive services, from on-site data destruction to audit-ready reporting, secure logistics, environmental compliance, and value recovery programs that help you get the most out of your retired equipment. With 25 years of proven experience, Securis delivers full-service decommissioning that’s:

  • Secure: On-site and off-site NIST 800-88-compliant data destruction
  • Accurate: Advanced asset tracking and documentation with 99%+ precision
  • Sustainable: R2v3-certified recycling and value-driven reuse programs
  • Compliant: Certified to meet HIPAA, GLBA, SOX, and more
  • Value-Driven: Transparent resale programs to help offset your project costs

Let us handle the heavy lifting so your internal teams can focus on strategic growth—not regulatory risks or operational headaches. Partner with Securis for secure, accurate, and sustainable data center decommissioning services that protect your organization every step of the way.

 📞Talk to a Decommissioning Expert  866-509-2731 | 🌐 www.securis.com

Frequently Asked Questions About Data Center Decommissioning

Start with a detailed asset inventory and a timeline. From there, work with a vendor like Securis to build a customized plan that ensures secure data destruction, environmental compliance, and maximum value recovery.

It depends on the size and complexity of your environment. A smaller decommissioning project might take a few days, while larger data centers can take weeks. We always build in flexibility to accommodate unexpected delays.

Any data stored on hard drives, SSDs, backup tapes, smartphones, and flash media must be securely destroyed. Even devices that appear “wiped” can still contain recoverable data without proper sanitization.

Securis uses NIST 800-88-compliant methods, including physical destruction (shredding, disintegration), degaussing, and secure wiping. We also provide Certificates of Destruction for every data-bearing asset, so you’re always audit-ready.

Yes. We offer on-site data destruction services so your team can watch the process in real-time. This is especially important for organizations with strict internal controls or regulatory requirements.

Look for these key certifications:

  • NAID AAA for data destruction
  • R2v3 for responsible recycling
  • DLIS for federal and military asset handling
  • ISO 9001, 14001, and 45001 for quality, environmental, and safety management

Securis holds all of these certifications and more.

We securely transport and process all equipment. Through our value recovery program, functional assets may be wiped, refurbished, and resold. Non-functional equipment is responsibly recycled in accordance with R2v3 standards.

Yes. Many components—like CPUs, memory, switches, and power supplies—still hold value. Securis provides transparent resale options with revenue-sharing models to help offset your decommissioning costs.

Absolutely. You’ll receive detailed reports, audit-ready certificates of destruction, and full chain-of-custody tracking for every asset processed. These items will be available on our client portal 24/7 within 72 hours of project completion.

Our experienced project managers coordinate site visits, equipment removal, on-site services, and transport based on your schedule and facility needs. We handle the heavy lifting, so your team doesn’t have to.

Building a Circular Economy: How OEMs Are Leading the Way – An Interview with Dan Mattock, Securis

Transcript from Video :

Kurt: Good afternoon, Dan Mattock How are you? 

Dan: Hey good afternoon Kurt. I am doing awesome. How are you doing? 

Kurt: I’m doing great. Yeah, it’s wonderful to talk to you, Dan. Today. today, I’d love to, talk to all our YouTube fans about, electronics OEMs or original equipment manufacturers and how they are investing in the circular economy. So thanks for joining me today. 

Dan: Thanks so much for having me. This is this is great. I’m excited here. 

Kurt: Awesome, So for those of you who may not know, Dan Maddock, Dan Maddock is Vice President with Securis He’s actually been with the company for, more than 15 years. he holds a number of certifications. one is a CSDS, which stands for certified secure data destruction specialist. Dan also holds a certification, in LEED, which is the Leadership in Energy and Environmental design certification. many people know Dan from his role as the president of the Northern Virginia chapter of the National Property Managers Association. which is pretty cool. But, today, really I’m interested in talking to Dan because of his experience consulting with some of Securis’ largest customers on the topic of data security, the circular economy, as well as IT asset disposition, best practices. So Dan, I’m super excited to learn from you today. 

Yeah, this is great. Thanks, Kurt 

Kurt: All right. Dan. So not everybody listening to this podcast is going to understand the term, circular economy. So can you help just and maybe in layman’s terms, give me an idea of what that means. And especially as, as it, you know, with respect to, electronics manufacturers. 

Yeah, sure. Absolutely. So, yeah, the term circular economy came on the scene. let’s say I’ve heard it used more and more often from maybe about 5 to 10 years ago, is when it really started. But the gist of it is that it’s basically an economic system. It refers to an economic system designed to minimize waste, make the most efficient use of resources by really keeping products, materials, resources, as long as possible. And maybe that’s through the design of the product initially, or it’s during its full lifecycle towards the end of the lifecycle, trying to find ways to reuse the product, even repairing or refurbishing, and then even towards the end, recycling the product in a way where all those raw materials can go back into new products. 

And so, yeah, in regards to electronics, what’s interesting, one example where we see of this is so the EPA, they’ve published some calculators that just show how much better it is for the environment. first of all,  first of all, if you can recycle the electronics, but even more dramatically is if you can reuse the products and extend their life, it’s actually dramatically better for the environment in terms of not having to tap into some of the virgin materials that are so costly, to, to mine and so forth. 

Kurt: Yeah. that’s an incredibly, big deal. Thanks for, helping us understand the circular economy. You know, electronics obviously is your expertise, but I saw a segment on PBS news where, clothes were ending up on a beach, in Africa. super, super disappointing. but we also heard the stories, you know, electronics or electronics components, going overseas where they were supposed to be recycled and, ended up in landfill. So I think, I really applaud the efforts, many of the vendors that we work with, you know, people like HP and Dell all have initiatives around, circular economy. And then, of course, we’ll talk later about, contract manufacturers, meaning that people that manufacture everything from iPhones to, to, to servers, but, you know, sometimes people, people buy things and for whatever reason, whether there’s an issue with it or maybe it was the wrong item. sometimes we have to return those items. So, I’ve, I’ve recently learned more about a feature called reverse, logistics So can you help me understand that a little bit more Dan? 

Dan: Yeah, absolutely. So yeah, reverse logistics really refers to the process of of managing the flow of products and materials that go from the customer back to the seller or manufacturer, or we’re used to the logistics right, of products going from the manufacturer to the consumer. But just play that in rewind. And that’s really what reverse logistics is all about. So it’s with, you know, some of the activities that would be involved in reverse logistics would be transportation, it’s returns of of products. You know, repairs and refurbishment could be included. It’s same with recycling and disposition. And so what’s interesting is that I think most people aren’t aware of how enormous this industry is. If you look globally, I think the reverse logistics industry for all products is approaching close to $1 trillion dollars 

Kurt: Oh, wow. 

Dan: And yeah, it’s it’s enormous. And in the US the US is maybe it’s closer to about 20% of that. It’s I mean maybe a little less. I’ve seen statistics where it’s maybe $150 billion to $180 billion a year. The components that I focus on are on the electronics side. That’s a that’s a subsection of the total reverse logistics market that’s closer to, you know, anywhere from 20 to 30 billion a year. But you can just see the magnitude of that when these manufacturers are tasked with getting returns and equipment back to them after they’ve already sold them to, to customers. 

Kurt: Okay, great. another term that I think it’s important for our listeners to understand is RMA I think I first learned about this term, all the way back when I worked at, NetApp in the early 2000’s I know that, eBay, excuse me, that, Securus has a, thriving eBay, store where we actually remarket, equipment on behalf of our customers. So I know that this is occasionally, but not often. based on what I’m looking in terms of our satisfaction rating, part of our process. But what is the term RMA mean 

Dan: Yeah, sure, and it’s funny you mentioned this, Kurt, because I was just meeting with one of our clients a couple days ago, a municipality, and he was talking about, the RMA policy of one of his vendors. So what RMA stands for is return material authorization. And the way to think about this, it’s basically the process of where a manufacturer or a supplier, grants the customer the right to return a product for a refund or maybe a replacement or even a repair. You know, you typically see this when there’s a defect with the product, whether it’s, you know, and a lot of times these are covered by the warranty, of the vendor. So it’s basically another way to think of it. It’s basically a permission slip for a customer to return, return their product. 

Kurt: Perfect. That’s that’s helpful. So now I know what, reverse logistics is. I understand the circular economy and RMA, Dan, help me understand. you know, we’re going to talk about contract manufacturers, but why might one of these OEMs outsource this process of reverse logistics? 

Dan: Yeah. So so we see a lot of this in our industry where OEMs are experts, a lot of times at designing their products, whether that’s that’s computers or other electronic devices. They’re experts at the design. A lot of times they’re experts at the the supply chain management of it, but where they’re not as, as well versed is just the idiosyncrasies of the reverse logistics game. And, on the surface, it may look simple. you just need to get the equipment back to the manufacturer. But a lot of times there’s a lot of, operational complexities involved here. You’re not sure how the equipment, what what state it’s going to be when it’s returned. if you’re looking to do repairs, it’s a whole. It’s really a different business. And so with a lot of these OEMs elect to do is they’re they want to be the best at the design and the supply chain management. but they want to outsource the core competencies of the reverse logistics game, because that’s just really not who they are, and that’s not what they do. And there’s going to be others who are more efficient and and more cost effective at doing it. 

Kurt: So, okay, so, give me an idea. And who are some of those companies? I know that Securis has worked with a number of them. You worked with, some of them personally, what are some examples of companies, you know, if I want to start, you know, Kurt’s Computer tomorrow, right? Maybe, maybe I would hire you. And we’re probably not going to do our own delivery. So we just assume, can we, if we talk to, if we want to hire somebody to help us out. 

Dan: Yeah. So so probably some of the most prominent names in the reverse logistics space are companies that a lot of us have heard of. Right. The Fedex’s, the UPS’s, you know, DHL is a pretty popular one, but those that may not be quite as as popular, that you have companies like Flex, they do a lot in this space. There’s GXO that’s a reputable reverse logistics company. And then there’s  Reconnect. Which is also one where, again, a lot of them are involved in helping these OEMs get equipment back. And then sometimes they’ll even add more value by doing some of the work. when it comes to refurbishing or repurposing some of the equipment and returns as well. 

Kurt: Okay. great. That’s that’s super helpful. So here’s something that might just surprise some of our listeners. I come to find out that sometimes inspection, sorting, repackaging, you know, testing and then trying to resell that equipment that came back in the RMA process, it’s actually way more expensive than, re remanufacturing. So, why is that Dan? Do you have any any guesses based on your expertise in the industry? 

Dan: Yeah. You know, it’s interesting, I, I like to think of it this way. So if you’re if you’re talking about remanufacturing, I mean picture a warehouse where, you know, you have equipment being assembled and it’s usually it’s very easy to manage because it’s it’s streamlined. It’s standardized. They, you know, engineers get paid to just make that process so much more efficient, whether there’s all types of techniques. Right. There’s Six Sigma and and all those ways of making that manufacturing really efficient. And so when it comes to remanufacturing, you’re able to benefit from some of those streamlined processes. And that standardization. But but when it comes to inspections and repackaging and really kind of more and the reverse logistics side of it, it’s not as streamlined. It’s a lot of times the returns, they may be in extremely different condition than when you first sent them. Sent them out. And and some of them may need a unique type of repair that’s, that’s different from from the others being returned. So you really need that individualized attention. And so that that makes for higher costs and, and more difficulties. 

And the other thing is, you know, there’s there’s an infrastructure component to this as well, because as you’re getting all these returns, you have to store these returns somewhere. You need warehouse space. You need workstations to to work and operate on the equipment. And so that makes it challenging to in addition, you know, it gets very hard because a lot of times you’ll have these unpredictable volumes. You’re you’ll be getting returns. But it’s very hard to predict at which rate. And that makes it hard for managers to manage through that, that, that process. So that’s why a lot of these OEMs, it’s in their best interest to outsource some of this work because, it’s just easier for them. It’s more cost effective. And then in addition, they don’t have to train the staff. There’s a lot of training that goes in to out to to the companies that are repurposing and sorting and repackaging. So so those are costs that they can shed when they when they outsource it. 

Kurt: Yeah. I mean, I think the other thing we should probably talk about is most of these OEMs actually outsource their manufacturing and they outsource it to companies that are incredibly good at manufacturing. They are highly automated. there may be a scenario where they manufacture equipment for multiple different product lines, multiple different companies, and they may have a factory that, you know, two weeks out of the month is manufacturing in one line and then switches to, to another line. But I think because of that high degree of automation, they’re able to manufacture things really cheaply. And then when you compare that to things that come back from RMA and are typically one offs, there’s a lot of human element with the inspection, the testing, kind of one off manual repairs and it becomes difficult to to match that. And so, you know, what I found is that for lower value items, maybe like computer peripherals, it may make more sense to completely break down and recycle that and then manufacture. That is new, from a cost perspective versus trying to, you know, repair individual items. or maybe you’re talking about something that’s super expensive, like a storage array or maybe a high end server. that might be a little different. but, you know, some of these, you know, some of these lower end things, I think it’s it’s cheaper to manufacturers. So, talk to me, Dan, about this whole outsourcing industry known as, contract electronics manufacturers. Can you give me some examples of what you’re seeing in the electronics industry of that? 

Dan: Yeah, absolutely. So you’re dead on Kurt in that a lot of companies are starting to outsource their manufacturing. I can think of a couple of examples. the big one is Apple. you know, they design their equipment typically in California, but a lot of it is, manufactured, over in China. I know that’s switching, you know, to India and I know Trump has, you know, I think reprimanded Apple for that but but yeah, you see this with some of the, the OEMs and on the networking side and server side as well. They’re using companies like, you know, Jabil and Flextronics and interesting, you know, Foxconn, which originally was working with Apple quite a bit on their phones and still are, but they are doing a lot of server manufacturing now for some of the hyperscalers out there. we’re also seeing companies like Nutanix now. They’re using Supermicro to manufacture and support some of the branded servers and so, yeah, I mean, an interesting case study too, is just to look at, Taiwan’s the Taiwan Semiconductor Company. I mean, that’s how they started. And just really ate the lunch of Intel because all of these designers for the chips was completely outsourced to Taiwan Semiconductor. And now Taiwan Semiconductor is, you know, it’s it’s I think it’s over $1 trillion business now. So, yeah, a lot of times it makes sense to to outsource this because the manufacturers just can benefit from economies of scale and expertise and, and different, different process improvements that, you know, sometimes it’s harder to be able to do the design all the way through the whole product lifecycle and stack, as well as if that piece of it is outsourced. 

Kurt: So, yeah, no, thank you for that, Dan. So let’s maybe change gears a little bit. obviously OEMs are trying to, you know, be innovative. They’re trying to sell more of their products to consumers. Obviously AI with everything is super hot. Right? So these OEMs are trying to balance their need, you know, for innovation with the circular economy. goals. I mean, you know, I’m working with many customers today that are in the process of replacing all of their laptops and desktops because the older ones don’t support, Windows 11 and some of the new AI stacks are out there. So talk to me, Dan. What’s what’s the balancing act between innovation and the circular economy? Because sometimes they can be a little bit at odds with each other, right? 

Dan: yeah. I agree with that. I mean, there is a real tension there, you know, between the product companies, you know, they’re incentivized to churn out new products and innovate. And, you know, just just look at Apple, right? It’s I mean, the wave of revenue that’s driven each time a new phone comes out, you know, and that and that does that conflicts with some of the sustainability expectations that clients may have, because, you know, what is going to happen to those old phones? Are they going to end up, you know, a lot of times there may be, whether it’s phones or in other electronics, there could be hazardous materials. And, so what is that going to do for the environment? So it’s interesting, you know, the best companies, I think they’re taking that to heart. And they realize that the consumer these days, they do care about, the environment and, and sustainability. 

And so, the best companies that I’m seeing, I don’t think that they’re necessarily forced between choosing innovation or circularity. They’re they’re doing what, you know, Jim Collins talks So he talks about in his books, you know, Built to Last and Good to Great. He talks about the tyranny of the or and and the great companies are taken of you to the. And they want to be both innovative and focused on the sustainability. And so a lot of times when these OEMs, if they are designing the product with the end in mind, I think of, as Steve Covey said, begin with the end of mind. If they’re thinking about what will happen at the end of the lifecycle, are the materials made from more recyclable materials? Is it easier to recycle at the end? Is it easier to repair at the end? I’m seeing a trend towards that, and I think ultimately that can be a great thing. But you’re right there. In the past, there’s been that natural tension between spitting out new products and the sustainability. But we’re starting to see some some more awareness on the OEM side with that. But we’re starting to see some some more awareness on the OEM side with that. 

Kurt: Yeah. I mean, I know HP’s got some investment there. I think there are some models with less plastic with easier to recycle plastic, maybe a little bit more aluminum and metals versus, plastics. So I’m definitely seeing, something there. So when we were talking about iPhones, I mean, I personally was part of a class action lawsuit where, this goes back a few years where, Apple was accused of, purposely making, iPhones obsolete and the very short lifespan. So I think that’s gotten consumers interested. You know, you talked about the environmental, impact, but there’s also potentially a cybersecurity impact. of these upgrades and end of life, equipment, you know, on our, you know, on our website, you know, Securis.com, we do have a, article that talks, you know, answers the question whether or not doing a factory reset on your phone, protects your data, but what types of products, then do you require data sanitization? before recycling? 

Dan: Sure. Yeah. So, yeah, I would say in terms of what products required to do sanitization, I really lump that into two categories. There’s there’s your traditional IT assets that we’re all familiar with right. There’s your your desktop computers and your laptop computers and your phones and your servers. and those types of devices. And what’s interesting about that, that segment is that, you know, that that has evolved in terms of the difficulty with which, you know, the resources and difficulty in terms of data destruction and sanitization. I think back, I think it was basically, you know, back in the mainframe era where, you know, you had these huge, huge rooms just and that was basically the mainframe. And while maybe physically, it was a lot harder to destroy it because it’s so big, you knew where it was, you knew how to secure it. 

But now with, you know, the form factor getting so small where terabytes of data can be on basically a chip the size of your thumb, you can just imagine for IT directors and CIOs and security officers, just that challenge of now managing all that data that could be all over the place. And so, you know, that’s the again, one segment is the traditional it’s that’s that’s again becoming harder to manage given, you know, the different form factors. But then the second set of items that really require data santization is, has really exploded ever since the Internet of Things took off. And so there’s a lot more consumer devices that you see that require disposition securely. You know, a couple that come to mind would be, you know, the health monitoring wearables or smart home devices, even think of automobiles. Now, you know, 40 years ago, I don’t know if there were any computer. I don’t think there were any computers in cars, now, I mean, it’s basically a car is, a rolling computer. So you’re seeing that even with, you know, consumer appliances, even some children’s toys there, there’s data being collected and about usage and streaming back to the internet. And so those are some of the things. Now, you know, the smartwatches and smart rings even can contain financial data. All those types of devices, are in that second segment that, you know, consumers really need to pay attention to in terms of proper sanitization. 

Kurt: So, yeah, I mean, I think I saw a product announcement recently and that might not be wrong. Exactly right. But I think it was, Pure Storage has over a 41 terabyte individual drive now. Wow. Yeah. Which is pretty crazy. yeah. You know, you you also, brought up, wearables. That’s not something that I consider that a security concern until recently. I know at Securis one of the pieces of software that we used to make sure that all data is removed from things like, computers and servers and phones. is a company called, Blancco which, is software that we have found to be, really great and do a good job. It helps us with our workflows and gets all the data off. But there’s a gentleman that left Blancco recently, and maybe I’ll provide a link to this, in, in the show notes or the transcript, but he actually, now has a company that removes data from smartwatches. So we haven’t got a ton of them. yet at Securis. but I expect that we will. And if we get a scenario where customers are asking us to give them value or re-market those or reuse those, I think that’s something that’s going to eventually come up for us. 

Dan: Yeah. No, that’s that’s interesting. you bring that up and I’m probably the most dramatic case I recall of the importance of securing the data on the smartwatches. This happened a couple of years ago. There were Marines who were stationed at a basically an undersea closed military base overseas in Syria, and they would do their their morning jogs and running around. They’d run around the perimeter of the base and things, and that data was getting streamed onto an app. And then it was just being published on the internet. And so it just tells you you’ve you’ve really got to think through these devices, not only the data that’s stored on them, but the risk it can put, various organizations if they’re not controlling it carefully. 

Kurt: Awesome. All right, now switch gears again one more time. so we talked about data sanitization and why that’s important for both consumers and companies and even the US military. But some products really don’t contain their data bearing devices. And so they’re not going to require sanitation. But, I’ve learned that the OEMs might, want those, destroyed even I think Securis has experience with, a brand that manufactures speakers and headsets that I really like to use. Why would a company like that say, hey, I want these devices destroyed? 

Dan: Yeah. So again, if you take away the data piece of it, I can think of a couple other reasons that manufacturers and OEMs would still want their their products destroyed. So the the first reason is brand protection. So if you have, if an OEM has a product that’s either defective or outdated, they want to make sure that those quality standards are kept extremely high. So they’re going to want to make sure that that product doesn’t get re-released out onto the market. So I can see them really as a way of brand protection. We see that often where, OEMs need destruction provided. The other other idea is limited liability. So if, if a product is defective or it’s if it’s recalled and maybe it has, you know, there’s potential for it to be, do harm, you know, it’s important that that gets taken off the market and destroyed. 

I can think of a lot of times you may see, a battery that has either, you know, we call them bulging batteries. If there’s, you know, hazardous materials. The OEM doesn’t want their name associated with any risk to the consumer. If there’s there’s been some issue with with the product. The other the other reason that OEMs, you know, would want to products destroyed again, if you take out the data piece of it is just from, regulatory compliance perspective. Again, if if there are if the goods have expired a lot of times failure to sometimes manage and and and remove those items properly can can result in regulatory penalties. 

And then lastly, just from, you know, if, if a product becomes obsolete or outdated, a lot of times, you know, the the OEM wants to make sure that they’re managing demand for their most recent product. And so if you have some of these older generation products, if they can remove those from the marketplace, that’s going to ideally drive more demand for their latest generation products. And so those are just some of some of the reasons that we see OEMs who, you know, want to make sure that their legacy products are destroyed properly in a in an environmental way, as well. 

Kurt: Awesome, great. So we’re going to continue in the trend we’ve talked about OEM’s and you know what they outsource. And you know, specialization of different different vendors. And so we talked about OEM’s outsourcing manufacturing. We talked about them outsourcing reverse logistics. So either of those reverse logistics companies or their OEMs, many times they outsource, you know, this recycling or end of life destruction process to somebody called an IT asset disposition. company people like Securis. We do that for a number of OEMs. what kind of services are they looking for and why were they outsourced versus just trying to do that themselves? 

Dan: You know, so a lot of times you’ll see OEMs or reverse logistics companies even, they’ll outsource the very end piece of the the product lifecycle, to a company like an IT asset disposition company, a company like Securis because there’s, there’s, you know, a couple couple components to it. First is just from the data security perspective. We talked about that. There’s depending on the type of device or the way the media is stored, you really do have to be an expert in it to make sure that the data is destroyed properly. And so you know what’s interesting. And, you know, especially like I’m thinking some of these laptops these days and, you know, these, these small solid state drives that are included in them, you know, there are there are it’s almost like, you have to be a forensic, expert to be able to look through all these. 

There’s almost like there’s little hidden component or compartments in the laptops that if you’re not just very, very careful and an expert in it, we’ve seen many cases where a small, small, solid state drive can slip through the cracks. So it’s that’s one reason OEMs know that they’re not necessarily the experts in reverse logistics companies know  they’re not experts. But there are companies out there that are experts like the ITAD providers. And so that’s that’s that’s a reason that they want to tap into that expertise. that’s more on the data security side. on the environmental side too, a lot of the the best ITAD companies, have to have certain environmental certifications. The most prominent, is one called R2, r2, and it’s R2v3 is where it’s the third version out right now. 

And they are doing, The organization that runs that is called SERI, and they are auditing ITAD companies to make sure that they’re complying with all the different regular environmental regulations. they’re making sure that the equipment is handled properly, that things aren’t ending up in landfills. They’re also making sure they’re auditing all the downstream potential vendors of the ITAD companies, too. So it’s a it’s a big deal. And that gives the OEMs a lot of comfort. And it goes again, it goes back to brand protection that the marketplace will see that they’re handling things appropriately. and then lastly, just there’s there’s a value recovery component to this. So a lot of times the ITAD companies, they’re they’re experts at maximizing the value of whether it’s, if they have permission to resell the equipment as is and refurbish it, or whether it’s just the broken down raw materials. 

They they specialize in this. And a lot of times that they’re driving that value and then they’re giving some of that sometimes back to to the companies that they service. And so those are just a couple of the reasons that you’d see these OEMs and reverse logistics companies want to engage in ITAD And, you know, again, it comes down to that expertise protecting from the data security side and then also the environmental side and and the value recovery of it. So yeah. 

Kurt: So Dan, you mostly have answered my my next and close to last question. Appreciate you bearing with me, through this learning session here. so obviously, you know, you mentioned R2, you mentioned, NAID AAA, which is a security, designation I had previously mentioned, you know, your individual certification and what, you have –  a certified secure data destruction, specialist. but, I guess, you know, I’ve been told that one another reason that, these various logistics companies, other than the ones you’ve stated so far, looking to, to outsource, the the recycling or the data destruction to an ITAD company is because the, the, the OEM that they’re contracted with is looking for a legal document known as a certificate of destruction. so that’s an example of one type of reporting or auditing. But what other types of reporting or auditing might the OEM require? from both the ITAD and, you know, if it’s, you know, subcontracting relationship, but with the reverse logistics company, what are they looking for typically? 

Dan: yeah, so it’s it’s interesting because it’s one thing to actually recycle the equipment or destroy the equipment that the OEM or reverse logistics company provides, but it’s another to prove that it was destroyed or recycled. And so a lot of these companies do get audited. And so it’s important that they have that evidence. So some of the, the, the methods that we’ve seen or some of the deliverables are anything from serial number capture. So a lot of times a company, may want to just see basically a list of all the serial numbers or even an asset tag of all the devices that have been recycled, and that can come in the form of a, an Excel file or a CSV file, something like that. We’ve also seen just weight reporting. 

There’s some cases where they want to see the actual weight, because a lot of times they’re tracking for their sustainability goals, the the pounds of equipment that they have recycled. We’ve also seen cases where they’ll want to see photo evidence. So whether it’s we’re capturing with a photo the device right before it was destroyed or a picture of it afterwards. And then this comes also in the forms of, of inventory reports. And as you mentioned, that certificate of destruction and recycling. And so one thing that we found also really helpful is if a client is getting audited and they need to refer back, say, to a specific individual item that we’ve developed. And other companies in our industry have developed portals where they can go online, log into their the portal, and basically search for an individual asset by serial number or, or asset tag. And it saves them a ton of time. 

I’ve, I’ve seen companies, God bless them where, you know, they were recording all of these items on a, on an Excel spreadsheet. And, you know, it was basically a 50,000 line spreadsheet. And so you can imagine the time it takes. Whereas now with, portals that we have, you can just type into the search bar and quickly pull up an asset and prove that it’s been dispositioned properly

Kurt: Microsoft Excel Dan, the most used database in the world. 1000  items starts to be a lot. last question. Thank you so much. So, there may be some OEMs or, reverse logistics companies listening to this and, wanting to reach out to Securis, but curious about our experience and our, our past performance. can you, can you share a couple that that might be relevant without, you know, providing any information that would be subject to non-disclosure? 

Dan: Yeah. Yeah, absolutely. So yeah, outside, you know, traditional electronics companies that we work with, we work with companies that produce audio peripherals. So speakers and headsets and those types of products, we also work with companies that produces produce alarms. So they’re they’re producing the alarm systems at buildings and homes. And they need that those eventually to be dispositioned and destroyed and recycled properly. And then also, you know, here’s a neat one. Drone manufacturers. So they’re producing drones. And once they’ve reached their end of life, those need to be destroyed properly. So those are just some of the the OEM types of OEMs we work with, among others as well. 

Kurt: Yeah, I mean, I know, Securis does a lot of work with the, the US, DoD and defense, industrial base and, and I, I think the term Dan is called de-militarization, at the, at the end of life, what I’ve learned is in some cases, you know, there’s these items, they might be concerned that there’s classified data on them. in other cases, they’re more concerned about, enemies of the United States trying to copy, whether it’s a radar system or a weapons system or the drone, technology. So many of those companies have reached out to us for kind of a use case. We haven’t talked about it yet, but really just that, demilitarization. use case. But, yeah.I really appreciate you joining. tons of insights, about electronics OEMs and and how they’re investing in the circular economy.

Dan:  thank you so much. And have a wonderful day. All right. Thanks so much for having me. I appreciate it.

BIOS:

Dan Mattock is a VP with Securis and has been with the company for 15 years.   He is a CSDS (Certified Secure Data Destruction Specialist) and LEED (Leadership in Energy and Environmental Design) Certified.   He has served as the president of the Northern Virginia Chapter of the National Property Managers Association.  He has consulted with some of our largest customers on the topics of data security, the circular economy, and IT Asset Disposition best practices.

Learn more about how Securis ITAD Services – Contact Us today!

IT Asset Disposal Gone Wrong: Compliance Nightmares for Financial Institutions

Financial companies have sensitive data in their IT Assets

No Room for Error in IT Asset Disposal for Financial Institutions

When it comes to IT asset disposal (ITAD), financial institutions have zero margin for error. Mistakes don’t just cost money—they destroy reputations, trigger audits, and invite lawsuits. One wrong move with a decommissioned hard drive, copier, or server can expose sensitive customer data, making them prime targets for cybercriminals.

One ITAD Mistake = Catastrophic Fallout

In finance, every device holds highly sensitive data: account numbers, tax IDs, investment profiles, and personally identifiable information (PII). That makes ITAD in this industry both high-stakes and highly regulated.  

If you’re not following GLBA, SOX, and FFIEC guidance to the letter, you’re inviting fines, breaches, and reputational collapse.

 

Real-World Example: Morgan Stanley’s $163M Mistake morgan stanley had an expensive ITAD breach

In 2016, Morgan Stanley made a costly IT asset disposal strategy error. The firm hired a moving company—not a certified ITAD provider—to decommission two data centers. The result? Devices containing sensitive client information were resold online without being properly wiped.

The cost?

  • 15 million customers impacted
  • $163 million in fines and legal costs
  • Public and regulatory trust severely damaged

This case proves that even one poor ITAD decision can upend years of compliance work.

Learn more about how Securis can help you avoid costly ITAD mistakes – Contact Us today!

Hidden ITAD Risks For Financial Institutions

Even the most diligent teams miss things. Securis recently partnered with a financial services firm that had excellent internal controls: inventory management, internal shredding, and routine audits.

Still, we uncovered three unlisted data-bearing devices, including a hard drive in a copier—none had been wiped.

Hidden data devices are a common weak point in internal ITAD efforts. Printers, copiers, servers, and smart displays often contain internal memory or embedded hard drives that quietly store sensitive data. Without expert teardown and inspection, these hidden components can easily be missed.

And the risks don’t stop there.

Unsecured IT equipment awaiting transport or storage—especially if not pre-wiped—poses a huge vulnerability. Devices can be stolen, accessed, or tampered with before proper sanitization occurs. One moment of carelessness can lead to years of litigation and public fallout.

Where ITAD often goes wrong:

  • Copiers, printers, and smart devices with hidden memory
  • Unsecured storage areas for decommissioned devices
  • No final audit before disposal

One overlooked device can trigger a breach report and invite regulators.

Hidden data may be lurking in your end of life IT Assets

What a Fully Compliant ITAD Program Looks Like

To avoid fines and protect client data, financial institutions must:

  • Track every asset: Even embedded drives in printers and networking gear.
  • Destroy all data: Use NIST 800-88 or DoD 5220.22-M methods—wiping, degaussing, or physical shredding.
  • Lock down chain of custody: From device removal to final destruction.
  • Provide Certificates of Destruction (CoDs): Serialized and audit-ready.
  • Recycle responsibly: Through certified e-waste channels (e.g., R2v3).

Key IT Asset Disposal Regulations for Financial Institutions

To stay compliant and avoid similar catastrophes, financial firms must understand and adhere to these critical regulations:

GLBA Act

Gramm-Leach-Bliley Act (GLBA)

  • The GLBA, enacted in 1999, mandates that financial institutions protect consumers’ private financial information.
  • Its Safeguards Rule requires firms to implement security measures to prevent unauthorized access to customer data—including during disposal. 
  • Improper handling of obsolete IT assets can lead to data exposure, potentially resulting in non-compliance fines and loss of customer trust. 
  • Learn more about the details of the GLBA in this blog. 

Sarbanes-oxley actSarbanes-Oxley Act (SOX)

  • Following major corporate scandals, SOX was established in 2002 to enforce financial accountability. 
  • Sections 302 and 404 require strict internal controls over financial reporting, while Section 802 criminalizes improper destruction of business records. 
  • SOX requires financial institutions to have clear policies ensuring IT assets and records are securely destroyed when no longer needed, preventing regulatory violations and legal consequences. 
  • Learn more about the details of the Sarbanes Oxley Act in this blog. 

FFIEC standardsFederal Financial Institutions Examination Council (FFIEC) Guidelines

  • The FFIEC sets standards for financial institution oversight, including IT asset security. These guidelines emphasize the need for a comprehensive data destruction strategy aligned with an institution’s information security program. 
  • Failure to properly destroy sensitive data can result in breaches, compliance violations, and federal scrutiny. Learn more about the FFIEC guidelines in this blog.

 

Securis: Your Partner in Secure and Compliant Financial ITAD

Compliant IT Asset Disposal (ITAD) isn’t a checkbox. It’s a business imperative. Ignoring GLBA, SOX, and FFIEC guidelines can lead to financial losses, legal consequences, and irreversible damage to customer trust. As Morgan Stanley’s case demonstrates, oversights in IT Asset disposal can be catastrophic. Working with a certified, experienced partner like Securis ensures every step is accounted in your IT asset disposal.

Securis Offers:

  • Thorough data sanitization that exceeds industry standards and meets all compliance standards
  • Secure chain of custody to prevent tampering or loss
  • On-site shredding and destruction options for maximum security
  • Audit-ready documentation, including Certificates of Destruction to prove compliance every time
  • Triple Check at every step to ensure nothing gets missed
  • Value recovery program to make sure you get a maximum ROI for retired assets with a residual value
  • R2v3 Certified IT Recycling to ensure minimal environmental harm from any asset that can not be re-used after sanitization.
  • NAID AAA: This compliance certification sets the benchmark for secure data destruction. NAID audits service providers unannounced to validate ongoing compliance.
  • Compliance with all Financial Industry data destruction standards such as GLBA, SOC, and FFIEC

Partner with Securis: Secure, Accurate, Sustainable

Secure IT asset disposal isn’t a checkbox—it’s a mission-critical function. One misstep can cost your business millions.

Whether you’re a credit union, investment firm, or national bank, our team understands how to meet financial industry regulations—and exceed them. Let Securis help you build a bulletproof ITAD strategy that meets financial compliance requirements and prevents catastrophic failure.

📞 Contact us today to schedule a no-risk consultation. Your reputation depends on it.

FAQ: ITAD for Financial Institutions

Financial firms handle high-value, highly regulated data. Improper disposal can lead to data breaches, lawsuits, and massive fines.

GLBA, SOX, and FFIEC guidelines all require secure handling and certified destruction of any data-bearing equipment.

Overlooking hidden drives, storing old equipment in unsecured spaces, and working with uncertified vendors.

With compliant shredding methods, sealed chain-of-custody transport, detailed reporting, and audit-proof documentation.

Avoid a Million-Dollar Mistake: How to Get IT Asset Disposal Right in Healthcare

Patient EPHI must be protectedWhy Proper IT Asset Disposal Matters in Healthcare

In 2023, the Kaiser Foundation Health Plan and Hospitals paid $49 million in penalties after protected health information (PHI) was found in unsecured trash bins. This major HIPAA violation reminds us that even trusted healthcare brands can mishandle IT asset disposal (ITAD)—with devastating results.

Whether you’re a hospital system, medical practice, or healthcare IT administrator, the message is clear:

 

Improper IT asset disposition poses compliance risks, financial risks, and reputational threats.

The stakes couldn’t be higher when it comes to retiring outdated tech. Patient data security, regulatory compliance, and environmental responsibility are non-negotiable. Missteps in healthcare are costly—legally, financially, and reputationally.

A well-structured IT Asset Disposition (ITAD) strategy is your best defense. Here’s how to get it right—and why your current process may put your organization at serious risk.

What Happens If Healthcare Organizations Mishandle IT Asset Disposal?

Disposing of outdated IT assets isn’t as simple as tossing them in a bin or selling them on eBay. Improper IT asset disposal in healthcare directly threatens your patients, your compliance standing, and your bottom line. The consequences of improper ITAD in healthcare include:

HIPPA rules demand secure IT Asset disposalHIPAA and HITECH Violations:

  • Every device storing electronic Protected Health Information (e-PHI) must be securely sanitized or destroyed. Otherwise, your organization could face severe penalties, lawsuits, reputation damage, and even the loss of its license.

Data Breaches

  • Old hard drives, medical equipment with embedded memory, and unsecured devices can contain e-PHI, which can then be exploited.
  • One breach can cost millions in legal fees and breach notification expenses.

Environmental Penalties

  • IT assets often contain hazardous materials, including mercury, lead, or cadmium.
  • Improper disposal can trigger EPA and state fines for violating e-waste laws, as well as create a PR backlash.

How to Stay HIPAA-Compliant and Secure When Disposing of IT Assets

1. Follow HIPAA and HITECH

To be fully compliant with regulations such as HIPAA and HITECH, your ITAD process must include methods aligned with NIST 800-88 standards, including:

2. Work With a Certified ITAD Vendor

Choose a provider that is:

  • NAID AAA Certified (for data destruction security)
  • R2v3 Certified (for responsible electronics recycling)
  • Experienced with healthcare- industry-specific compliance standards

Working with an experienced vendor also prevents critical oversights—like the discovery that 13 infusion pumps were resold with wireless authentication data intact. Secuirs would not have allowed that to happen. 

3. Secure the Chain of Custody

You can’t protect what you can’t track. Look for:

4. Train Your Team

Even the best ITAD plan can fail if employees mishandle devices. Offer regular training on:

  • Identifying ePHI risks.
  • Secure handling and disposal procedures.
  • Incident reporting for missing or misplaced assets.

5. Audit Your ITAD Program Regularly

Compliance isn’t a set-it-and-forget-it task. Regular internal audits ensure your ITAD workflows meet HIPAA, HITECH, and NIST 800-88 expectations and adapt to evolving threats.

  • Conduct internal audits of your ITAD processes
  • Confirm compliance with HIPAA, HITECH, and NIST standards
  • Patch workflow gaps fast

Ready to make sure your IT Asset Disposal meets all healthcare regulations? Contact Securis Now

sustainability in IT Asset DisposalSustainable ITAD: Good for Compliance, Great for the Planet

Working with a certified ITAD partner who is R2v3 certified also supports sustainability goals:

  • E-Waste Reduction – R2v3 certified ITAD vendors ensure that old medical and IT equipment is responsibly disposed of, keeping it out of landfills.
  • Reuse & Repurposing – Secure data sanitization allows IT equipment to be refurbished and resold, reducing the demand for new resources.
  • Financial Recovery – Decommissioned IT assets can be resold, helping your organization recover value and reinvest in newer, more energy-efficient technology.
  • Certified Green Practices – ITAD providers with R2v3 certification follow strict environmental standards to ensure ethical e-waste management.
  • Corporate Donation for unneeded Assets – Allows your company to make transformational changes in the lives of others.

Why Healthcare Leaders Trust Securis with IT Asset Disposition

There’s no room for shortcuts when retiring IT equipment in a healthcare setting. At Securis, we understand that protecting patient data, maintaining regulatory compliance, and safeguarding your organization’s reputation are mission-critical.

That’s why leading hospitals, health systems, and medical practices turn to Securis for healthcare-specific ITAD services that are:

  • 🔐 Secure – We follow NIST 800-88 data destruction protocols and offer HIPAA-compliant shredding, degaussing, and 2mm SSD disintegration, with locked-chain-of-custody protocols and Certificates of Destruction for every job.
  • 🎯Accurate – Audit-ready documentation available 24/7 on our client portal, including Certificates of Destruction to prove compliance every time plus Triple Checks at every step to ensure nothing gets missed.
  • ♻️ Sustainable – From responsible recycling and e-waste diversion to certified refurbishing and value recovery, our green ITAD solutions help you meet your ESG goals while doing right by the planet.
  • 📜 Compliant – Securis is NAID AAA and R2v3 Certified, ensuring your IT asset disposal meets the highest data security and environmental responsibility standards—every time, with no exceptions.

We don’t just check the boxes, we help you avoid the headlines.

Whether decommissioning dated IT assets or upgrading clinical devices, Securis gives you confidence that every asset is handled with the care, compliance, and accountability that healthcare demands.

📞 Schedule Your Free Healthcare ITAD Risk Assessment

Avoid fines, breaches, and compliance failures. Partner with Securis to develop a secure, accurate, and sustainable IT asset disposal strategy that meets HIPAA, HITECH, and NIST 800-88 standards.

👉 Contact Securis today to start your healthcare ITAD risk-free consultation.

___________________________________________________________________________

💬 Common Questions About Healthcare ITAD

What is HIPAA-compliant IT asset disposal?

HIPAA-compliant ITAD includes secure destruction methods (like shredding, degaussing, or disintegration) that prevent unauthorized access to ePHI and are documented via Certificates of Destruction.

What regulations apply to IT asset disposal in healthcare?

  • HIPAA: Requires secure disposal of devices storing ePHI
  • HITECH: Enhances enforcement and breach notification rules
  • EPA and state laws: Govern the disposal of e-waste and hazardous materials

Why do healthcare organizations choose Securis for ITAD?

Securis provides:

  • NIST 800-88-compliant data destruction
  • HIPAA and HITECH expertise
  • R2v3-certified recycling
  • Secure, verifiable chain of custody

For more HIPPA Frequently Asked Questions click here!

Why Choose Securis? IT Asset Disposition That IT Pros Count On

IT Asset Disposition Data Breach? Not on our watch.

Managing end-of-life IT assets without opening the door to security breaches, compliance violations, or logistical chaos? That’s your job. Making sure that never happens? That’s ours. With 25+ years of experience supporting IT professionals in highly regulated industries, Securis delivers audit-ready, end-to-end IT Asset Disposition (ITAD) that’s secure, accurate, and environmentally responsible—by design.

🔐 Security-First ITAD for Zero-Tolerance Environments

Improperly handled IT assets are a silent liability. One overlooked hard drive, one unsecured disposal, and you’re facing a compliance crisis.

Securis provides federal, state, and industry compliance for security-conscious organizations:

  • Compliant with NIST 800-88 and NISPOM 32 media sanitization guidelines
  • Fully NAID AAA and R2v3 certified to support mandates like HIPAA, GLBA, HITECH, SOX, FFIEC, and more
  • Trusted by federal and defense agencies as a GSA and DLA-certified vendor

We provide:

✅ On-site data destruction services: degaussing, HDD shredding, and 2mm disintegration for SSDs, mobile phones, thumb drives, and SD cards
✅ Fully secured mobile data destruction services
✅ Uniformed, background-checked staff trained in chain-of-custody protocol
✅ Detailed and accurate asset tracking from pickup through certified destruction

🧾 Inventory Accuracy That’s Audit-Ready—Every Time

Spreadsheets and guesswork don’t cut it when auditors come calling. That’s why Securis built a more intelligent system.

No gaps. No scrambling for proof. Just clean, compliant records—always ready.

🌍 Responsible Decommissioning with ROI in Mind

You’re not just disposing of IT gear but also accountable for sustainability, compliance, and savvy budgeting.

With Securis, you get:

🔧 Tailored to Your Workflow, Not the Other Way Around

Whether you’re decommissioning a central data center or sunsetting devices across dozens of remote sites, Securis scales with you.

  • Custom pickup scheduling
  •  On-site or off-site destruction options
  • Serialized, trackable reporting

Let’s Make ITAD the Easiest Part of Your Job

IT asset managers are under more pressure than ever. One mistake can cost your organization its data, dollars, and reputation.

Let Securis be the partner you can rely on. We take the risk off your plate and replace it with a trustworthy system.

📞 Call 866-609-2731 or visit securis.com to schedule your consultation today.

It’s Not Over ‘Til It’s Secure: The IT Asset Disposal Risk You Can’t Ignore

Upgrading your tech is exciting. The disposal of IT assets? Not so much. Most companies focus on identifying and procuring the latest and greatest in tech but often fail to realize that outdated computers, laptops, servers, mobile devices, and printers can become significant liabilities if not properly handled. From data breaches to regulatory fines, improper electronic waste disposal risks are bigger than you think—and they’re growing.

💣 Retired Devices Still Contain Dangerous and Sometimes Hidden Data

Just because a device is now offline doesn’t mean it’s no longer a data breach risk. Hard drives, SSDs, and storage media still house sensitive data, even after files are “deleted” or a device is restored with a factory reset.   Hackers know this. So do dark web resellers. And they’re betting your disposal process isn’t airtight. 29% of data breaches are tied to misconfigured or improperly decommissioned assets and sometimes even missed data storage devices.

Simply reformatting a drive isn’t enough. Without professional hard drive destruction services or data sanitization, residual information can be recovered and weaponized, even on factory reset devices. Selling your retired computers and devices on eBay may be a tempting way to deal with your IT assets that are no longer in use, but the dangers are very real, and your devices are not safe with just a factory reset

🧠 Fact: According to a Blancco Technology Group and Kroll Ontrack study, 57 percent of used mobile devices and 75 percent of used drives purchased from Amazon, eBay, and Gazelle contain residual data.

Hidden data may be lurking in your end of life IT Assets

 

Your Intellectual Property Could Be at Risk

intellecual property risks

Those “old” devices might still contain:

  • Trade secrets
  • Source code
  • Product plans
  • Internal emails and contracts

One improperly disposed hard drive can lead to corporate espionage, lawsuits, or a loss of competitive advantage, making hard drive shredding and secure destruction critical, not optional.

🧠 Fact: 47% of U.S. businesses have experienced data breaches, and improperly disposed devices are often the root cause.

ITAD Compliance

⚖️ Compliance Doesn’t End at Retirement

Regulations like HIPAA, The Gramm-Leach-Bliley Act, SOX, and HITECH require secure disposal of data and IT assets. A proper IT asset disposition (ITAD) program isn’t just best practice; it’s legally essential.

Fail to comply? You’re looking at:

Compliance doesn’t end when a device leaves the desk—it ends when a certificate of destruction verifies that it has been destroyed or sanitized to NIST 800-88 compliance standards.  

sustainable electronic waste

♻️ Electronic Waste is a Legal and Environmental Minefield

E-waste recycling isn’t just about being green (though that is important to many companies) it’s also about avoiding liability. Your end-of-life electronics likely contain hazardous materials like mercury, lead, and cadmium. Improper e-waste disposal can:

  • Pollute the environment
  • Harm public health
  • Violate local, state, and federal laws
  • Attract negative press

Certified R2v3 electronics recycling helps protect both your brand and the planet. When you partner with an R2v3 certified vendor, you can ensure that you are doing right by the planet and don’t leave your company open to legal issues

IT value recovery

💸 There’s Value in That “Junk”

In addition to the sustainability risks of improper IT Asset disposal, many retired devices can still be refurbished safely and then resold. When businesses skip proper IT asset recovery, they miss out on:

  • Recovering residual value
  • Reducing e-waste
  • Supporting sustainability goals

You’re losing money and momentum if your disposal strategy doesn’t include certified electronics recycling. Read how Securis has been able to transform lives through electronics recycling. 

📉 A Breach Can Destroy More Than Just Data

The consequences of poor IT asset disposal can include:

  • PR disasters
  • Loss of customers
  • Decreased investor confidence
  • Operational downtime

News spreads fast. A breach linked to poor e-waste disposal can undo years of brand-building overnight. When data breaches or e-waste disposal violations hit the headlines, the damage is swift and lasting. Customers leave. Partners question your security posture. Trust evaporates.

So What’s the Solution?

A strong IT asset disposition strategy starts with treating the disposal of IT assets as a security function—not a side task. Here’s how to get there:

✅ Build a Secure, Compliant ITAD Process:

  • Sanitize Devices Properly: Use professional-grade wiping, degaussing, or physical destruction based on data sensitivity.
  • Use Certified Vendors: Look for R2v3 or e-Stewards certifications.
  • Document Everything: Make sure your vendor creates a transparent chain of custody and disposal records.
  • Track Every Asset: Know what you’re retiring, where it is, and where it’s going.
  • Train Your Team: Everyone handling devices should understand the risks and protocols.
  • Audit Regularly: Check that policies are being followed—and updated with current laws.
  • Explore Value Recovery: Partner with vendors who offer secure remarketing of eligible devices.
  • Prioritize Secure Logistics: Ensure devices are protected in transit from start to finish.

 

🔐 Partner with Experienced ITAD Experts Who Do It Right

At Securis, we offer 25 years of experience in secure, accurate, and sustainable solutions for:

At Securis, we help organizations like yours protect data, stay compliant, and meet sustainability goals—without the stress of handling it alone.

Whether you’re in healthcare, finance, academia, government, a government consultant, or any regulated industry, we’ve seen what can go wrong and know how to prevent it. 

Our mission: Help you eliminate risk, ensure compliance, and support ESG goals without losing sleep over what’s inside that old server. Learn more about what to look for in an e-waste recycling partner.  

Don’t let yesterday’s tech become tomorrow’s headline.
Let’s make your IT asset disposal secure, accurate, and sustainable.

📞 Ready to talk? Visit securis.com to learn more.

Top Data Center Decommissioning Companies

Top Data Center Decommissioning Companies: Secure, Accurate, Sustainable and Compliant Decommissioning Services

As enterprises modernize their IT infrastructure, migrate to the cloud, or need to relocate, the demand for expert data center decommissioning continues to rise. Decommissioning a data center isn’t just about powering down servers. Decommissioning data center equipment involves secure data destruction, hardware removal, cable and rack de-installation, and environmentally responsible e-waste recycling. In some cases, an HVAC technician or electrician may also be required.

To protect sensitive data, ensure compliance with industry regulations, and support sustainability goals, organizations turn to top-tier data center decommissioning providers offering end-to-end IT asset disposition (ITAD), data center infrastructure, and data center decommissioning services.

The companies highlighted below specialize in secure data center shutdowns, including services such as on-site hard drive shredding, chain-of-custody tracking, IT Asset Auditing, data center asset recovery, and certified electronics recycling. With proven track records, industry certifications, and scalable solutions, these providers help ensure your data center decommissioning process is secure, compliant, and cost-effective.

Data Decommissioning Services Companies Featured:

Securis

1. Securis

Headquarters: Chantilly, Virginia, USA
Company Type: Private
Size: About 100 employees
Locations: Nationwide service with several U.S. recycling facilities.
Overview: With over 20 years of experience, Securis specializes in secure, accurate, and sustainable IT asset disposition (ITAD) and e-waste recycling. Securis offers comprehensive data center decommissioning services, including on-site and off-site data destruction, equipment removal, and R2v3-certified recycling. Certifications such as ISO 14001, ISO 9001, ISO 45001, and NAID AAA certification for mobile and plant-based operations ensure that partnering with Securis will allow you to meet strict Federal, State, and industry-specific compliance and environmental responsibility standards. Securis is also certified by the Defense Logistics Information Service to store and transport military data and holds a GSA contract. Securis uses cutting-edge AI technology to vastly exceed the average inventory accuracy by 14% with a stunning 99% accuracy rate. Securis provides detailed reporting, which is available on the client portal 24×7.
Strengths: Securis has great reviews and past performance in highly regulated industries such as the federal government, financial services, and healthcare.
Considerations: Securis partners with several companies for smart hands, HVAC, cabling, and electrical services.

b612

2. B-612

Headquarters: New York, New York, USA
Company Type: Private
Size: 50+
Locations: Their team provides remote support and will travel to data centers worldwide.
Overview: Specialising in managing network infrastructure in Data Centres on behalf of a wide range of colocation users, B-612 offers a comprehensive suite of tailored Remote Hands & Eyes solutions to help customers drive service availability up, and network management costs down.
Strengths: They can offer support services to maintain networking equipment and servers, including remote hands and data center decommissioning.
Considerations: They partner with a NAID AAA-certified company for data destruction and an R2-certified company for electronics recycling.

JCBE3. JCBE Business Solutions

Headquarters: Gaithersburg, Maryland
Company Type: Private
Size: Small boutique company
Locations: Single headquarters with a focus on regional services
Overview: JCBE Inc. is a Minority Woman-Owned Small Business headquartered in Gaithersburg, Maryland, specializing in comprehensive IT asset management and e-waste recycling services. Established in 2009, JCBE offers various services, including IT asset management, value recovery services, maintenance, and PC recycling. Their PC Recycling Services provide fast, efficient, and environmentally safe disposal processes for non-functional or outdated equipment. JCBE is certified as an SBA 8(a) WOSB, MDOT MBE, DBE, and SBE business.
Strengths: JCBE Inc. has past performance with federal, state, and local governments.
Considerations: JCBE partners with an R2-certified recycling facility.

CompuDynamics4. Compu Dynamics

Headquarters: Sterling, Virginia, USA
Company Type: Private
Size: 100+ employees
Locations: Nationwide service
Overview: For over 30 years, Compu Dynamics has provided data center infrastructure solutions, including equipment decommissioning, installation, and maintenance. Their expertise lies in the physical aspects of data center operations, making them a one-stop shop for infrastructure changes. Compu Dynamics emphasizes hands-on support, ensuring smooth transitions and minimizing downtime during decommissioning projects.
Strengths: Ideal for customers with electrical or HVAC needs as part of the decommissioning project.
Considerations: While not as focused as some, their broad data center infrastructure capabilities could be an asset to some customers.

Syntetic5. Synetic Technologies

Headquarters: Kansas City, Missouri, USA
Company Type: Private
Size: About 75 employees
Locations: Central U.S.
Overview: Synetic Technologies, with over 15 years of experience, focuses on data security and environmentally responsible ITAD solutions. Their services include on-site data destruction, logistics management, equipment removal, and asset remarketing. Holding R2, NAID, ISO 1400, ISO 9001, and ISO 45001 certifications, Synetic emphasizes workplace safety and eco-friendly practices. The company also offers detailed chain-of-custody tracking, ensuring clients maintain complete control and visibility during decommissioning.
Strengths: They have past performance servicing the needs of K-12 and Telecommunications companies.
Considerations: They partner to extend their reach outside their primary geographic area.

Park Place6. Park Place Technologies

Headquarters: Cleveland, Ohio
Company Type: Private
Size: 180 employees
Locations: Worldwide storage locations for supporting 3rd-party server/storage support contracts
Overview: As a global leader in data center and networking optimization, they work with over 21,000 companies worldwide, boosting infrastructure performance and Uptime, maximizing IT staff, and stretching budgets.
Strengths: They take a different approach than electronics recycling companies in that they provide third-party support contracts, data center decommissioning, and smart hands services.
Considerations: They may outsource some services, such as drive shredding

ERI7. ERI Direct

Headquarters: Fresno, California, USA
Company Type: Private
Size: Approximately 1,000 employees
Locations: Eight facilities
Overview: Founded in 2002, ERI Direct is one of the largest fully integrated ITAD and electronic waste recycling companies in North America. The company processes millions of pounds of electronics annually, offering services like secure data destruction, large-scale recycling, and IT asset remarketing. ERI ensures security and environmental compliance with R2, e-Stewards, and ISO 9001, ISO 45001, and ISO 14001 certifications. Their vertically integrated model allows them to handle projects of any size while maintaining efficiency and transparency.
Strengths: ERI’s nationwide presence and high-capacity facilities make it a good choice for nationwide enterprises that need to manage large volumes of equipment.
Considerations: Some users report delays in service during peak project periods.

EXIT8. exIT Technologies

Headquarters: Naples, Florida, USA
Company Type: Private
Size: Small boutique services firm
Locations: Nationwide services through partnerships
Overview: Established in 1989, Exit Technologies has decades of experience in IT asset recovery and data center decommissioning. Its services include hardware removal, secure data destruction, and equipment resale. The company is R2 and ISO 14001 certified and focuses on helping clients recover maximum value from retired IT assets. Exit Technologies prides itself on fast turnaround times and a consultative approach, ensuring projects align with clients’ timelines and goals.
Strengths: Exit Technologies may be a good choice for businesses that must decommission large-scale data centers quickly.
Considerations: Their reliance on partner networks for some services could be a drawback for clients preferring a full-service partner.

Compucycle9. CompuCycle

Headquarters: Houston, Texas, USA
Company Type: Private
Size: 50+
Locations: Headquarters in Houston with national service reach
Overview: CompuCycle has over 25 years of experience in ITAD, specializing in data destruction, electronics recycling, and equipment remarketing. They are R2 certified and focus on sustainable practices, offering innovative solutions like automated shredding processes. CompuCycle’s services include customized logistics, providing flexibility for businesses of all sizes. Their commitment to transparency and detailed reporting helps clients comply with regulatory standards.
Strengths: CompuCycle’s adaptability and customer service could be an asset.
Considerations: Some reviews indicate a lack of scalability for large or complex decommissioning projects.

 

 

Wesco10. Wesco

Headquarters: Pittsburgh, Pennsylvania, USA
Company Type: Public (NYSE: WCC)
Size: Global Fortune 500 company with over 20,000 employees
Locations: Extensive global network
Overview: Wesco is a Fortune 500 company with over 100 years of experience in electrical and IT solutions. Their data center decommissioning services include equipment removal, secure data sanitization, and asset recovery. With a global presence and vast resources, Wesco can manage large-scale, complex projects. Their integrated approach to IT and electrical systems ensures clients receive comprehensive solutions.
Strengths: In addition to data center decommissioning services, they offer security, electrical, networking, lighting, and power distribution solutions.
Considerations: Their broad focus on multiple solutions may not provide the specialization some organizations require.

Choosing the Right Data Center Decommissioning Partner

Selecting the right partner for your data center decommissioning project depends on your organization’s specific needs, whether maximizing data security, ensuring full regulatory compliance, supporting sustainability goals, or all of the above. The companies featured here bring a range of strengths, offering tailored solutions for data centers of all sizes and complexities.

For organizations that demand secure, accurate, and sustainable IT asset disposition (ITAD)—from on-site data destruction to e-waste recycling and chain-of-custody documentation—Securis delivers unmatched peace of mind. With deep expertise in data center decommissioning, Securis ensures your retired infrastructure is handled with precision, care, and compliance with your business demands.

🔒 Secure ✅ Accurate ♻️ Sustainable

Contact Securis today to plan a worry-free data center decommissioning strategy that protects your data, brand, and bottom line.

Hidden Data Risks: The ITAD Oversights That Put Your Business at Risk

Are You Really Destroying All Data? Most Companies Aren’t.

Every company handling end-of-life IT equipment has a top requirement—secure equipment disposal. Yet, even the most diligent organizations routinely miss hidden data-bearing devices, exposing themselves to serious security risks. Hard drives, SSDs, and even embedded storage in modern electronics are often missed, leaving sensitive information vulnerable to breaches. Gartner research indicates that a considerable percentage of IT assets, around 30%, can be lost or unaccounted for. This “loss” can manifest in various ways, including physical loss, misplacement, or “ghosting” (assets that are active but not tracked).

data storage can hide in copy machines

 

The Hidden Data Risks Lurking in Your IT Assets

Even security-conscious organizations fail to account for all data storage devices. Here are real-world examples of how missed hard drives and other storage media can lead to serious vulnerabilities:

  • Governmental Vulnerabilities: Securis found Top Secret diagrams for a key U.S. Government building mixed in with discarded items during a routine electronics recycling pickup. Without thorough IT asset disposition (ITAD) procedures, this could have led to a catastrophic security breach.
  • Financial Industry Oversights: A financial services company, confident in its IT asset management, had already shredded its own drives. Yet, Securis’ triple-check process found an unaccounted-for storage drive hidden in a copier—a device often overlooked as a data risk as well as three additional items that were not in the companies inventory list. These overlooked assets could have led to a major compliance failure.
  • Server Room Blunders: Another financial services client assured Securis that all hard drives had been removed from eight decommissioned server cabinets. Upon our close inspection, 86 drives (72 SSDs and 14 HDDs) were discovered—a staggering 15% of the total drives assumed to have been removed. 
  • Telecom Mishaps: A major telecom company decommissioned 300 servers, claiming all storage had been stripped. Securis uncovered 30 overlooked hard drives—each containing potentially sensitive data.

Hidden data may be lurking in your end of life IT Assets

 

Government Reports Confirm Data Disposal Failures

data is inside of medical devices also

Medical Devices: The Overlooked Data Risk

It’s not just traditional IT equipment—embedded storage in medical devices and equipment is often overlooked. A recent study found that 13 infusion pump devices still contained wireless authentication data when resold on secondary markets. 

Accordingly, the Federal Register recently proposed a new rule to strengthen the cybersecurity of electronic protected health information. This proposed rule strengthens overall cybersecurity measures and supports the ongoing requirement for robust data destruction practices to protect ePHI.

 

How Securis Prevents Costly Mistakes

Securis’ Secure, Accurate, and Sustainable IT asset disposition approach ensures no storage device is left behind:

  • Securis performs a triple check as part of their ITAD service Triple-Check Guarantee: Multi-step verification ensures hidden drives don’t slip through the cracks.
  • Separation of Duties: Independent verification eliminates single points of failure.
  • NAID-Certified Hard Drive Shredding & Data Wiping: Securis ensures 100% data destruction with documented proof, whether on-site or off-site.

 

Choosing the Right ITAD Partner: What to Look For

Who you choose as your IT asset disposal partner matters. Securis helps companies avoid costly data breaches by ensuring every data-bearing device is identified and destroyed. Some best practices you can use to choose a vendor include:

  • Certifications:  Does the vendor have NAID AAA Certification for on and off-site destruction?
  • Nationwide Coverage:   Can they collect and process IT assets from multiple locations?
  • Experience:  Nothing can replace experience.  Experienced vendors know where to look for hidden storage devices.
  • certificate of destructionCapabilities:  Can the vendor perform shredding to required destruction standards for various assets and storage media types? Do they provide a strong chain of custody and certificates of destruction?

 

Secure Your IT Assets Today

Don’t risk a data breach by overlooking hidden storage devices. Securis ensures 100% secure IT asset disposal with industry-leading ITAD services.

🔹 Contact Securis today for a customized IT asset recycling and secure data destruction plan.

What is a Certificate of Data Destruction?

What Is a Certificate of Data Destruction—and Why It Matters to Your Organization

A Certificate of Destruction is critical for your Compliance Documentation:

If your organization handles sensitive data, you know that deleting a file isn’t enough. When IT assets reach end-of-life, secure data destruction is critical for security, compliance, and legal protection. That’s where a Certificate of Data Destruction comes in.

Proof of Compliance for Secure IT Asset Disposal

A Certificate of Data Destruction from Securis is your documented proof that retired electronic equipment has been processed according to the highest security and compliance standards. This certificate verifies that your organization’s data has been destroyed in full compliance with NAID AAA Certification, NIST 800-88, Department of Defense, NSA guidelines, and key regulatory frameworks, including HIPAA, HITECH, FACTA, and GLBA.

Built-In Peace of Mind for IT and Compliance Leaders

Whether you’re a CIO, IT Manager, Compliance Officer, or Procurement Director, Securis helps you eliminate risk by providing a fully managed, auditable, and secure IT asset disposition (ITAD) solution.

From the moment your equipment is picked up, Securis secures the chain of custody with locked bins and trucks. Once it arrives at one of our secure facilities, each asset is scanned and cataloged using proprietary software, recording:

  • Make and model
  • Serial numbers (if available)
  • Asset tag IDs
  • Unique Securis key with job number and destruction status

These layers of documentation offer multiple ways to identify every asset, enabling airtight audit trails and easy reporting. In addition, our DriveSnap AI proprietary AI scanning technology assures photographic evidence of asset information for all destroyed assets that still exist even after the asset has been destroyed.  

certificate of data destruction

Why a Certificate of Data Destruction Protects Your Business

A properly issued Certificate of Destruction is more than a formality—it’s a critical compliance document that:

  • Protects against fines for improper data handling
  • Demonstrates due diligence during audits or investigations
  • Reduces legal liability in the event of a breach or data exposure

Whether decommissioning a single hard drive or an entire data center, having documented proof of secure data destruction is essential for regulatory compliance and brand protection.

See It with Your Own Eyes: Witnessed Destruction Available

Need to see the data destruction process firsthand? We offer two options:

  1. On-site services with our mobile shredding units. These units can degauss, shred, and even micro-shred end-of-life IT Assets on-site
  2. Witnessed destruction at a Securis facility

For high-security environments like healthcare, defense, or financial services, we offer micro-shredding to pulverize devices down to NSA-recommended 2mm particles—ideal for SSDs and other high-density data storage that can’t be degaussed or shredded by conventional means.

Real-Time Inventory and Certificates—Accessible Anytime

When your IT asset disposal project is complete, Securis provides:

  • A detailed inventory report of all devices, including make, model, and serial number
  • A Certificate of Destruction for each asset destroyed or wiped to NIST 800-88 standards
  • 24/7 access via our secure client portal, making audits, compliance checks, and reporting effortless

Secure, Accurate, and Sustainable

Securis is more than just a data destruction company—we’re your partner in secure IT asset disposal and sustainable e-waste recycling. Every step of our process ensures your assets are handled securely, accurately, and sustainably. 

Ready to Protect Your Organization from Data Liability?
Contact Securis today to learn how our certified, audited, and fully secure IT asset disposal services can help you stay compliant, protected, and ahead of risk.

 

FAQ's for Certificates of Destruction

A Certificate of Data Destruction is an official document that verifies your organization’s electronic data has been securely and permanently destroyed. It includes key details such as asset types, serial numbers, and destruction methods—ensuring compliance with industry standards like NIST 800-88, HIPAA, and NAID AAA.

This certificate protects your organization by proving due diligence in data handling. It can help you avoid regulatory fines, reduce legal liability, and demonstrate compliance during audits or investigations.

Any organization handling sensitive, regulated, or personally identifiable information—such as those in healthcare, finance, education, or government—should obtain a Certificate of Destruction when disposing of IT assets.

A Securis Certificate of Destruction includes:

  • Company Name
  • Date of Service

  • Destruction Type (e.g., degaussing, shredding, micro-shredding)

  • Job Number

While not always legally required, it is often strongly recommended for proving compliance with laws like HIPAA, FACTA, and GLBA. In some regulated industries, having verifiable proof of secure data destruction is essential for meeting audit requirements.

Securis follows a strict chain-of-custody protocol, uses certified destruction methods, and documents every step of the IT asset disposition process. Our proprietary DriveSnap AI captures photographic evidence of each asset, even after destruction, for complete traceability.

Yes. Securis offers both on-site mobile shredding and witnessed destruction at our secure facilities. This is especially valuable for high-security environments or organizations with strict compliance requirements.

You can access your certificates and destruction reports anytime through the secure Securis client portal. Reports are available in real time and can be used for audits, compliance reviews, and internal documentation.