Balancing Data Security, Sustainability, and Disposal Costs for IT Asset Disposition (ITAD)

Finding Balance

Electronic waste disposal (e-waste) has become a pressing issue in today’s technology-driven world. E-waste, which includes discarded electronic devices like computers, smartphones, and other data-bearing equipment, presents significant sustainability, budgetary, and data security challenges.  According to the EPA, only 12.5 percent of U.S. E-waste is properly recycled. E-waste represents just 2 percent of America’s waste in landfills but makes up 70 percent of overall toxic waste.

Companies and government entities must balance the need to comply with data security regulations and dispose of e-waste in the least ecologically damaging way possible while managing their budgets by avoiding exorbitant disposal costs. Organizations that focus too much on information security will likely blow out their budgets and won’t meet their sustainability goals.   Organizations that focus too much on sustainability or cost could create a situation where they have a significant data breach.

An Information Technology Asset Disposition (ITAD) company that employs Certified Secure Data Destruction Specialists (CSDS) can ask you questions about your requirements and help you determine the most effective method of computer recycling.

Data Security

Data security is a paramount concern when disposing of e-waste. Electronic devices often contain sensitive personal and corporate information that, if improperly handled, can lead to data breaches and identity theft.   Technology is constantly changing, and our teams regularly find data on company devices that their IT teams miss.  Working with an expert service provider meets the best practice of separation of duty and provides a double check to your IT teams.

Data security is a paramount concern when disposing of e-waste

Ensuring that data is irretrievably destroyed before reuse or recycling is crucial. For example, Morgan Stanley was fined 100 Million dollars after hiring a company with no experience or expertise in data destruction to decommission thousands of hard drives and servers.   In addition a Healthcare Provider in Maine exposed the medical record of 100,000 citizens because of improper data sanitization practices. ITAD vendors that employ CSDS and are NAID AAA Certified can help your organization comply with security best practices.

Environmental Concerns

Improper disposal of e-waste can have severe environmental consequences. Electronic devices contain hazardous materials like lead, mercury, and cadmium, which can leach into soil and water, causing pollution and health risks and even fines.   If your ITAD vendor or their downstream recycling vendors don’t follow the law and go out of business your company could be at risk.

E-waste damages the environment

Strategies for Minimizing Environmental Impact:

1. Reuse: An ITAD service provider may be able to resell late-model computers, which is the best way to lower your carbon footprint. Before selling, your ITAD provider must follow NIST 800-88 or IEEE best practices to remove all data from storage devices.

2. Recycling: Older electronics and computers that must be shredded because they have classified information on them may have limited value. In these cases, recycling individual components ensures that valuable materials are recovered and reused, reducing the need for raw material extraction and minimizing environmental damage. Partnering with an IT disposal vendor with a robust recycling and reuse plan simplifies this process.

3. Responsible Disposal: Work with R2v3 certified e-waste recyclers who follow environmentally sound practices, including the safe handling and disposal of hazardous substances. Sending e-waste overseas could violate laws and create security risks.   A NAID AAA and R2v3 certification means your ITAD vendor is required to follow strict standards. R2v3 certification involves rigorous audits by an independent third party to evaluate recycling practices in over 50 areas of operational and environmental performance. R2v3 is the leading standard for the electronics recycling industry, ensuring practices that protect the environment, human health, safety, and the security of the recycling process.

Disposal Costs

The cost of e-waste disposal can be a significant barrier for many organizations. Balancing the financial aspect of e-waste management with the need for data security and environmental protection is a top priority for many organizations.   Organizations who evaluate price alone could risk fines, their reputation, and future stock valuation.

Cost-Effective Disposal Solutions:

1. Bulk Disposal Discounts: Organizations can negotiate bulk disposal agreements and long-term contracts with certified recyclers to reduce per-unit costs.

2. Resale: Thoroughly sanitized servers and drives can be resold, reducing the volume of e-waste and offsetting disposal costs through a value recovery program

Disposal costs

Conclusion:

In summary, balancing data security, environmental concerns, and disposal costs requires partnering with an industry leader that ensures secure and environmentally sound computer recycling processes while offering cost-effective solutions. Vendors with industry certifications in data destruction and environmentally friendly recycling and a robust value recovery program, are best positioned to help advise your organization on asset management best practices and effectively dispose of IT Assets.

Federal Tech Podcast with Securis’ Sal Salvetti

Moderator John Gilroy interviews Securis Director of Operations Sal Salvetti for the Federal Tech Podcast

Podcast link: https://podcasts.apple.com/us/podcast/ep-166-the-most-important-tech-question-that-nobody-asks/id1612819978?i=1000663400507

This conversation between host John Gilroy, moderator of the Federal Tech Podcast, and guest Sal Salvetti, of Securis, concerns the secure data destruction of electronic devices, specifically hard drives and solid state drives, used by federal agencies and organizations.

Key Points

  • Many organizations don’t properly dispose of old hard drives, which can lead to data breaches and hefty fines.
  • Securis offers various data sanitization methods depending on the information’s classification: degaussing, shredding, disintegration, and incineration.
  • Securis is certified by several organizations and follows strict guidelines to ensure secure data destruction.
  • They offer on-site and off-site data destruction services to meet the needs of different clients.
  • Securis also resells refurbished equipment and recycles materials from old electronics.

Here are some conversation highlights:

  • The importance of secure data destruction for federal agencies handling sensitive information.
  • Different data sanitization methods and when to use each one.
  • Options for secure disposal of various electronic devices, including cell phones and tablets.
  • How to avoid mistakes like throwing away hard drives without proper data erasure.
  • The environmental benefits of responsible IT asset disposition.

Sal in Fed Tech podcastTRANSCRIPT

John Gilroy: Hey, John Gilroy here.  Everybody knows there are an estimated 300 data centers in Northern Virginia. Very few people know what happens when they upgrade those servers in the data center. Today, we found out.

John Gilroy:    Hit the music, Manny.

<VOICE>  Welcome to the Federal Tech Podcast, where industry leaders share insights on innovation with a focus on reducing cost and improving security for federal technology. If you like the Federal Tech Podcast, please support us by giving us a rating and review on Apple Podcast.

John Gilroy:  Welcome to the Federal Tech Podcast, a podcast that connects you to federal technology leaders.  My name is John Gilroy, and I will be your moderator. Our guest today is John Salvetti.    He’s the executive vice president of a company called Securis, S-E-C-U-R-I-S.   I would be remiss if I didn’t tell our audience that we are recording this from Monk’s Barbecue in lovely downtown Percival, Virginia.  This is a high-class joint, Sal.

John Gilroy:    And so I’ve seen this thing from iSigma, and it says, here’s the headline.  Personally identifiable information was found on 40% of used devices in the largest study to date.  So my personal stuff on those servers in Ashburn can be recovered.   What happens in this whole transition and upgrading?

Sal Salvetti:  So one of the options you gave me, I could tell you if you’re out of your mind, right?  But yeah, you’re out of your mind, but nothing to do with that, okay?  No, it’s great to meet you, John. Great to be here as part of your Federal Tech Podcast.  And so yeah, that’s true.

Sal Salvetti:  There are organizations out there when they want to, they’re under the life cycle for their hard drives, or their solid-state drives, laptops, desktops, anything that’s data-bearing, you want to make sure you dispose of it properly.  And that’s what we do.  We are an ITAD company, IT Asset Disposition.

Sal in Fed Tech podcast

 

Sal Salvetti:  Some people use the D as in disposal, but we will bring that from, we’ll pick it up from you and bring it to our location and shred it as one of the ways of dealing with it.  Or we could actually take care of it at your location and we could either shred it or disintegrate it, depending on what type of equipment it is.

John Gilroy: Now, Sal, I’ve driven through Ashburn a million times.  In fact, I recorded a podcast a couple of times at Monks, at the Ford’s Fish Shack, right there.

Sal Salvetti:  I know what you’re talking about.

John Gilroy:    And I’ve never thought about what happens to those servers, but obviously, they’ve got servers in there. There’s new hard drives, new Nvidia drives and graphics chips, and so they take them out. So what kind of choices does a federal agency have when they’re upgrading some of their data centers?

Sal Salvetti:  So one of the things you want to look at is it an end of life piece of equipment.  As you look at it, if it’s end of life and there’s no reuse or recycling, no reuse that you can do to it. We will help you look at that. So here is a server.  We look at the server. If we think it can be resold, which should be good out there because that’s great of not having something end up in a landfill, we will take it off your hands.

We will bring it to our location.  We will refurbish and resell, for example, on either a wholesale or a eBay or Shopify type website.

Sal Salvetti:  So that’s if it can be resold.  If it’s end of life, we want to make sure that it does not end up in a landfill. In fact, only about 18% of e-waste, electronic waste out there gets properly disposed of. We are one of the ones who can dispose of it properly. We have so many certifications that are along with that.

Sal Salvetti:  So let’s talk about if we want to dispose of it.  We’ll bring it to our location. We will actually disassemble it.  We’ll take it down to its component parts because of the focus materials that are in there.  Gold, silver, platinum, palladium and copper.  And then we will go ahead and resell that for reuse out there on the open market. Some of them might have some plastic. We also take apart the plastic and we build a plastic and we resell that also for reuse.

John Gilroy:    So Sal, in doing my research for this interview, I came across an acronym that I’ve never heard before and maybe other listeners have, but it’s a Certified Data Destruction Specialist, a CSDS.  So that’s the certification we’re talking about here, huh?

Sal Salvetti:  Yes, we have them in our organization and really it’s just like any certifications out there, you don’t want to just operate off of what you think is right. There’s formal organizations that show you the proper processes to follow and also keep you updated on the rules, regulations and policies that are out there.

John Gilroy:    Let’s talk about commercial company in Chicago, say. If they do not dispose of hard drives properly, can they get fined?

Sal Salvetti:  They sure can. There’s been, in the news, there’s been people who have been fined.  Let me see, there was Morgan Stanley. That was the breach that I was trying to think of.  Morgan Stanley data breach, $35 million fine. Health Reach in Maine, 100,000 citizens had their information exposed just due to bad data sanitization. State of New Jersey, 79% of their laptops that they auctioned to the public had data on them. So besides thinking about getting fined with improper disposal of it, you’ll also get fined for actually not taking care of personally identified information on those hard drives.

John Gilroy:    Okay, fines are one thing.  Let’s go back and talk about the military and maybe some three-letter agencies and other organizations. And I’m gonna quote a movie, the movie is Forrest Gump.

Sal Salvetti:  Okay.

John Gilroy:    And Lieutenant Dan famously said, don’t do anything stupid. And I think when you have upgrading equipment, you have hard drives you’re replacing, you don’t wanna do anything stupid. So what kind of guidelines can you give our federal listeners for not doing anything stupid, replacing their existing hard drives?

Sal Salvetti:  What we found, it’s actually funny, but not in a laughing manner so much, is that, like I mentioned earlier, really about the 18% only disposing of properly, there’s no reason to just, once you upgrade, everybody goes through their life cycle replacement. Once they get the new stuff, they actually kind of forget about the old stuff.

John Gilroy:    Right, a typical human.

Sal Salvetti:  Yeah, and they’ll put it in, they’ll just stash it away, until somebody comes into the organization, opens up a closet and things are, old stuff is falling on top of them, and that’s when they call us.  So if you want to go ahead and dispose of that equipment properly, and we’re the ones, we can actually do it, we can shred your hard drives.

Sal Salvetti:  So once again, think of data bearing devices, and I’ll just talk about hard disk drives and solid state drives for right now, in addition to that, we can also shred laptops and desktops. But a hard disk drive, there’s different regulations out there.  It all falls under the umbrella of sanitizing the information. Depends on the classification of that information, of how far you want to go with sanitizing it.

Sal Salvetti:  And underneath that sanitize umbrella, there’s different classifications depending on the document that you’re looking at. So for example, the NSA uses degauss, disintegrate and incinerate, burning it, smelting it, all right.

Sal Salvetti:  Another degaussing, that renders the equipment, what it does, think about what degaussing does.  It destroys the magnets in there. So now you can ever use that again. Disintegration, that’s for a solid state drive. And there are machines out there and we have one of them that are certified to disintegrate down to the two-millimeter-size particle.

Sal in Fed Tech podcast

Sal Salvetti:  So when you think of two millimeter, just think of walking on the beach. That’s what it’s looking like, all right.  And then for incineration, that’s just thrown in a big furnace and nothing’s on that.

Sal Salvetti:  If you talk about the NIST special publication 800-88, revision one, because that’s important, you can clear, purge or destroy. And then, of course, and then you have the subcategories underneath that.  And I’ll just throw a little vignette out there. So I was on Wheel of Fortune.  When I was spinning the wheel on Wheel of Fortune, they have this thing called a mystery round. And it’s two wedges that are on the wheel.  Underneath one of the wedge, we’ve got to land on it. If you call the letter, it’s in the puzzle, you get to pick up the wedge.  One of them is going to have $10,000 underneath it.

One’s going to be bankrupt.  It’s a guess. You don’t want to turn your data sanitizing process into a guess. Calling us, we’re the experts, we can remove all the mystery from any mystery wedge that you have out there.

00:08:42.460 –> 00:08:51.320

John Gilroy:    The mystery for many of our listeners is the budget mystery of when do you use software to clear your old hard drives?  When do you have it shredded?  When’s it disintegrated? I guess smelt it or something. So what kind of guidelines do we have here? Is it just the type of information or there’s budget considerations here too, aren’t there Sal?

00:09:02.500 –> 00:09:02.960

Sal Salvetti:  There are.  So think of cost versus security versus sustainability.

Yeah, I always like to explain it as a thing of going into the car wash. You could do the basic level of service and that gets you a certain level.  Or you could say, okay, I want to wash it, but I want to dry it.  I want to wax it. I want to clear coat it. I want to get the tires worked on.

Sal Salvetti:  So we can work with you on what you actually need and what you want. And we’re going to make it so you don’t overpay for what you need based on the level of what the information is. Now, for example, there may be some information you don’t have a choice.  It’s because it was this.  You remember the classifications level out there are confidential, secret, and top secret. So if something falls in there, there is no choice.  You must either disintegrate or you must work this for your destruction.

Sal Salvetti:  But if there’s not, if it’s a lesser classification of information and you just want to make sure it’s not available to the public, we will take you through the various options.  Like I said earlier, the degauze, the shredding, disintegration and incineration.

John Gilroy:    Now, Sal, you company is very successful, very well known all over the world.  There’s questions I think people would ask of how.  Okay, so do I get in my little truck and drive my hard drives over to your office?  Do you come to me? Do I FedEx them to you?  I guess there’s gotta be, depending on the agency, a certain chain of command here, there’s certain security here.

Sal Salvetti:  So the answer to that is yes, yes and yes.  All right, that’s one thing that we differ from a lot of other organizations out there.  We run the whole gamut under the ITAD, once again, the IT asset disposition process.  All right, so let’s just go back to step one of what you asked about, John.

How can I, I’m an organization, I have my hard disk drive, I have it in my possession, what do I do? So it all depends on the classification of the information for one thing.  So we can go to your location, our trucks, our capability is mobile. We have a mobile capability that has the shredder, disintegrator, and the degausser inside of the truck.

Sal Salvetti:  What’s important about that when we go to your location to do it, is that we are self-sufficient.  The truck has its own power. So it’s not like we’re gonna be bothering you. Once we pick up whatever equipment we have to pick up, we’re not, hey, I need to plug in, where’s your plug here?  No, we can pull off of the, wherever we’re at by the office, by the, you know, the dock and move away and do whatever equipment we want.

Sal Salvetti:  Some people want to do it onsite because they want to just keep an eye on it. Now, if it’s a lesser level of classification, we’ll bring it back to our facility and we have all the same capabilities inside of our warehouse. And then, but if it’s incineration, that’s where we actually have to go third party.

John Gilroy:    And when you say shredding, I think paper. So nothing to do with paper, shredding hard drives.

Sal Salvetti:  There’s different capabilities out there. We have two different ones that meet industry standards. We will put a hard drive into a shredder and one of them gets it down to inch and a half strips. One of it gets it down to one inch strips. What I talked about for the solid state drives previously, we get it down to two millimeter, which is the one that is NSA certified.

John Gilroy:    Your company is Securis, S-E-C-U-R-I-S.  And what I’m going to do is in the show notes for this, I’m going to include a video testimonial from your customers.  Can explain a lot of these concepts you’re talking about because some are kind of interesting.

John Gilroy:    So look for that video and I’ll put it in the show notes.

John Gilroy:    When I lived in old town Alexandria, my next door neighbors worked for a three letter organization and they always had good stories and we were good friends.    And it would seem to me that an organization like that might have very, very sense of information in the hard drive and then what they might want to do is have armed guards physically take it to your location and observe it being shredded.

John Gilroy:    I mean, this happens in Washington DC, I’m sure.  I mean, yeah, I think that’s what happens, isn’t it?

Sal Salvetti:  So we have had, we’ve picked up equipment from a place that’s been escorted back to our facility.  And because of the capacity of it, they wanted to use the bigger shredder to, you know, it’s throughput. And they have sat there and watched us shred. They’ve, I’ll just say observed, observed us, take apart cell phones, remove the battery and put it through the shredder.  Yeah, they watched us take apart laptops, remove the battery, take out the, whatever the hard drive is, the regular SSD or not, and shred those too.

John Gilroy:    You know, I talked about Forrest Gump and don’t do anything stupid.  I never even thought of cell phones.   I mean, cell phones could have compromising information on them.  I mean, who thinks about that?

Sal in Fed Tech podcast
Sal Salvetti:  And we do.

John Gilroy:    Yeah, and tablets. Wait a minute, I’m thinking about tablets now, and of course laptops and desktops and servers, but it’s not just servers in Ashburn, huh?

Sal Salvetti:  Think about anything that has data on it and you don’t want it to end up in the wrong hands, right?  And I’ll go back.  There may be something on there where I want to give you this hard drive.  I want you to just, I’ll use the vernacular, wipe it, erase the data that’s on there, but if you resell it, I’d like to get a little kickback on what you resell.

Sal Salvetti:  So when you talk about the budget numbers, if there’s the ability to say at the level of classification, it doesn’t have to be shredded so it’s not used, doesn’t have to be degaussed so it can’t be used, we will sell it and we will give you a rebate according to the proceeds from that sale.

John Gilroy:    I was listening to a podcast with a person at NIH, joking all kinds of information.  It would seem to me that there would be medical studies that have personally identified information but have much more sensitive information.

John Gilroy:    So someone at HHS or NIH, they may say, no, no, no, we want a NSA certified shredder and that’s what you provide.  I mean, I never thought a NSA, of all the things NSA does, really they worry about hard drive shredding machines?

Sal Salvetti:  Yeah, the big one that they do this certification on are the SSDs because that’s where everybody’s going now, even though we still have quite a few hard drives out there, the solid state drive, more information, smaller, that type of thing and you want to get it down so any adversary out there, it could be because of where we are in DC, any adversary, you do not want them getting any information off of that.

Sal Salvetti:  And the NSA will say, if you use this piece of equipment, now they’ll certify different companies that are out there and we have then purchased that equipment from that company who makes those machines. We don’t make the machines, we use the machines, just like anything else.

So they will say, I want this done to that level of destruction so there’s nothing I have to worry about.

John Gilroy:    So as an individual, let’s say I buy a new iPhone.

Sal Salvetti:  Yep.

John Gilroy:    My old iPhone and I trade it in, is that doing something stupid or is that a reasonable thing for normal human beings or not worry about that?

Sal Salvetti:  You better take out the SIM card and anything else that can hold that on there.

John Gilroy:    Yeah.

Sal Salvetti:  So it’s, and to be on the safe side, give it to us and we’ll make sure there’s no data on it.  Maybe we resell it.  And now this is for big organizations. We don’t want you driving up to our door and say, here’s my cell phone.  No, we want a thousand of them at a time.

John Gilroy:    It makes sense.

Sal Salvetti:  And we can make sure that the information’s off and we can either resell, like I said, or we shred it.

John Gilroy:    I, maybe I’ve read, I have watched too many Jason Bourne movies, but I have this image. I’m looking at you taking notes going, okay, so let’s say an operative named Kurt.  So he goes out and he does some dumpster diving behind a company and pulls out some hard drives. I mean, has that even happened?

Sal Salvetti:  There’s no doubt in my mind that that has happened.  People, whether it’s incompetence or laziness or a combination of the two, right? Or just not knowing. Ignorance is one of them also. It’s like, hey, I can just toss this stuff. So, like I said, no mystery wedges, no gambling. Let us get the equipment and clear the information that needs to be cleared off of it.

John Gilroy:    Most of my interviews have been about newer systems, designing systems.  It seems like this is a checkbox that’s not checked on the life cycle of hardware.  It’s not on the list or maybe very few companies think.

I’m sure that the three other agents think about it, but look at NIH or HHS. They have information that’s just as sensitive and maybe there are people working there that don’t know about Securis.

Sal Salvetti:  That’s a great observation.  There’s been an evolution in people thinking about how easy it was or is for information to be pulled off of this stuff and those hard drives or SSDs that end up in the wrong hands.  It’s great to see the level of information and education that’s out there so then they know, hey, look us up.:  We already know. Hey, if you don’t remember anything about today’s podcast, remember four things, all right?

Sal Salvetti:  Remember our name, Securis, so our website’s securis.com, and remember if you want industry standard making it happen the right way, we are secure, we have great accountability and sustainability.

John Gilroy:    Okay, you were on Wheel of Fortune, is that right?

Sal Salvetti:  I was, yes.  Twice actually, John, twice.

John Gilroy:    So Wheel of Fortune, let’s say a topic comes up and it’s ESG.

Sal Salvetti:  So the topic would be Jeopardy, or yeah, Jeopardy, not Wheel of Fortune.

John Gilroy:    So what is ESG, and what’s it got to do with hard drives?

Sal Salvetti:  Yeah, the big thing we like to hone in on that one besides the E and the G is just the sustainability aspect.  And that goes back to, years and years, people just, remember, the landfills.You would just take it to the landfill, no matter what it was. Think about big TVs, the cathode ray tube TVs. Think about flat screen TVs, which we treat as somewhat disposable right now.

Sal Salvetti:  A lot of people will just chuck them into the landfill. Well, we’re getting better about that. We want to sustain the environment. It’s bad for the environment to have the plastics that don’t decay for hundreds of years, or the toxic metals that are in there. So bring it to us.  We’ll take it through its end of life, so that’s what we want to say.

Sal Salvetti:  We are the pros in making sure that you, as an organization, can say, I have done my part for the environment, and I am disposing of this equipment properly.  In fact, we will produce a sustainability report for you based off of, right now we’re looking at about 23 different factors as part of that report

John Gilroy:    Sal, several years ago, I had a podcast called Inside Data Centers, and I would literally go inside a data center and record it and talk about heating and cooling.  I mean, all kinds of issues that no one ever thinks about. You wouldn’t even want to guess that large organizations like, I’m gonna name names here, like Jerry Seinfeld, so I’m gonna name names like Google, Microsoft.  I imagine they have life cycle policies for this or are you part and parcel?  Do you contract with them or do you normally contract with federal agencies?  So what’s the typical relationship you have with one of these bigger companies?

Sal Salvetti:  So those hyperscalers out there, they’re doing their own stuff now because they like to keep it in house.  So the Amazon Web Services out there, they’re not gonna call us up.  Now they did about five years ago and we got until they figured out what they needed to do, and we actually got them through the process to clear and dispose of their equipment properly.

Sal Salvetti:  But the other ones out there, there may be an owner of a data center and they have tenants inside of that.:  So they want us to take care of their tenants because the tenants are going through life cycle replacement.

Okay, I got this stuff, who do you want me to call?  Hey, I know Securis.

Sal Salvetti:  Or it could be just the tenant itself says, hey, Securis is gonna be coming in here to take care of our life cycle replacement. We’ll go in there, we’ll take the server cabinets out, we’ll decommission to a level.  There’s a certain level that we want them to get to a point on the decommissioning.

Sal Salvetti:  And we’ll be, in one of our jobs, we actually rolled the stuff out a half a mile, because you’ve seen some of the size of those data centers. So from the cage in the data center to the truck, half a mile, and we did it about 25 trips that way.

John Gilroy:    Wow, that’s a trouble.  I know one thing about the data center people is that they don’t talk about who their customers are.  It’s like, who’s in here?  Well, we can’t say.  There could be sensitive organizations, not sensitive organizations. When you look at the future of this whole idea of making sure the swoles of your equipment, where do you see it had anything?  More and more people could be coming.  Or do you think there’s gonna be an incident where a dumpster diver grabs something and it compromises some organizations?  Some organizations, let’s say.

Sal Salvetti:  Yeah, so we like to use just to gauge trends right now.  We’re tracking the numbers that are coming in for hard drives and SSDs and see if, what I call it, the lines are crossing. Are we finally seeing the downhill spiral in hard drives and the uphill starting to go up in the quantity of SSDs? It hasn’t happened yet. There’s a lot of hard drives out there.  Another funny, flat screen TVs still going up.

Sal Salvetti:  You know, we’re not talking about the data and stuff like that, but think about other things that we do for the environment. We’re gonna have a flat screen TV and we’ll once again disassemble it and get it to the right location so it doesn’t end up in a landfill.

John Gilroy:    I’m asking a question about data centers. I was at Monks Barbecue two weeks ago. I was with my neighbors, walked down here, we had some lunch and he works for a large organization and he said, you know, John, all those data centers in Ashburn, they may have to get like a nuclear reactor to power them.

John Gilroy:    They don’t have power.  This is a problem that’s not going away.  I mean, artificial intelligence, it’s such a strain on so many data centers and they’re constantly buying new equipment and guess what that means is this existing equipment has to be replaced. So this isn’t a problem that’s going away.

John Gilroy:    It’s kind of like car repair.  That problem isn’t going away.  The whole idea of replenishing equipment and new technology and new servers, it’s just something we can’t get away from.

Sal Salvetti:  That’s exactly right and that’s one of the things that we’ve noticed now is we’re starting to get more servers. Obviously we’re in a great location.Northern Virginia, like you said, I think you said the number really got 358 or something like that of the data centers and yeah, they’re going through their life cycle replacement and by the way, it’s not a normal life cycle replacement anymore.

Sal Salvetti:  As technology advances to AI, that’s going to require more powerful servers.  So the old stuff, all right, now by the way, the old stuff to them, there are still some, we can still get that reused at the clients in other locations who may say, this is still good for me.  I’m going through my life cycle replacement, but I’m not up to AI yet.  So it is a constant revolving door right now of all the equipment that we’re getting, especially what you see in the data centers.

John Gilroy:    Yeah, what equipment brokers say is used is not a four letter word for certain businesses.

Sal Salvetti:  Exactly, and especially going overseas. We have clients that are overseas.

John Gilroy:    So I didn’t realize that. I mean, not just the United States, you go overseas as well.

Sal Salvetti:  So on our equipment, we have some buyers who then will move the equipment, whether it’s wholesale laptops, wholesale desktops, servers, switches, you know, think of anything you think can be reused.  Our country is so advanced compared to a lot of countries out there. They would love our older stuff and they are buying it.

John Gilroy:    It’s astounding to me.  I interviewed someone from the Navy and they were talking about a ship and they said, you know what, it’s kind of like a floating data center. The ships now are like floating data centers.  And so they have to worry about energy and guess what they have to worry about?   Upgrades.

John Gilroy:    And I’m sure there are ships coming in to Norfolk or somewhere where they’re going to have to replace the servers and then what do you do with that information? There’s a shredding application right there, isn’t it?

Sal Salvetti:  Exactly.  So as it is, we stand ready to support everybody and anyone out there who needs any kind of secure data destruction and or at least decommissioning of their equipment. And that’s what I say, if you don’t remember too much from this and me talking, securis.com, we are ready to support.

Sal Salvetti:  And by the way, and what you’re seeing, there’s always something in the news of somebody who has a data breach about something. I mentioned a few earlier, but it always seems to be happening and it doesn’t need to, just call us.

John Gilroy:    This has been a wonderful interview.  You have been listening to the Federal Tech Podcast with John Gilroy.  I’d like to thank my guest, John Salvetti, Executive Vice President at Securis, S-E-C-U-R-I-S.

<v SPEAKER_2>Thanks for listening to the Federal Tech Podcast.

<v SPEAKER_2>If you like the Federal Tech Podcast, please support us by giving us a rating and review on Apple Podcast.

NIST 800-88: Secure Data Destruction Standards for Media Sanitization

NIST 800-88 Guidelines for Secure Data Destruction

In today’s data-driven world, where information is both currency and vulnerability, ensuring secure data destruction is paramount. A company will inevitably have computers and data drives that have reached the end of their useful life, but adopting robust standards for data destruction is essential if your company handles sensitive data that you would not want to fall into the wrong hands. Enter NIST 800-88, a set of guidelines for media sanitization based on determining the best methods for data sanitization or destruction after classifying the data into clear, purge, or destroy categories. Established by the National Institute of Standards and Technology (NIST) the NIST 800-88 guidelines provide standards to guide companies in choosing the best method of destruction for each classification. 

NIST 800-88 Guidelines
NIST

Understanding NIST 800-88

NIST Special Publication 800-88, formally titled “Guidelines for Media Sanitization,” is a comprehensive resource for organizations and individuals seeking to dispose of data-bearing media securely. Initially published in 2006 and subsequently revised, this document provides guidelines for effectively sanitizing various media types, including hard drives, solid-state drives, optical media, etc. The U.S. Federal government requires this standard and many private businesses and organizations have also adopted it.

The Importance of Secure Data Destruction

Why is secure data destruction so crucial? The answer lies in mitigating the risk of data breaches and unauthorized access. When data is no longer needed, simply deleting files or formatting drives is insufficient. Sophisticated data recovery techniques can retrieve sensitive information, posing significant security threats. Secure data destruction ensures that information is irretrievably erased, safeguarding against data leaks and identity theft.

Classified data destruction

Critical Principles of NIST 800-88

NIST 800-88 outlines several key principles for secure data destruction:

Media Sanitization Categories 

The guidelines categorize data based on sensitivity, which helps determine the appropriate sanitization method. Highly sensitive information, such as classified or confidential data, requires more stringent sanitization than less sensitive data. The guidelines categorize media sanitization into three levels: Clear, Purge, and Destroy. Each level corresponds to different methods and levels of assurance in data sanitization.

  1. Clear: Clearing involves removing data from storage media through methods that render the data unreadable but may still be recoverable through advanced techniques. It’s suitable for media that will be reused within an organization.
  2. Purge: Purging ensures that data is irreversibly removed and cannot be reconstructed or retrieved. This level of sanitization is recommended when media will be released from organizational control or repurposed within the organization.
  3. Destroy: Destruction methods physically render the media unusable and unreadable. This level is appropriate when the media will not be reused or if there is any risk of sensitive data being recovered.

Federal Data Classification and Media Sanitization Best Practices

Federal Data Classification and Media Sanitization Best Practices

Commercial Data Classification and Media Sanitization Best Practices

Commercial Data Classification and Data Sanitization Best Practices*These are common customer examples based on our experience. Your CISO (Chief Information Security Officer) should approve the data sanitization or destruction method.

What to Look for in an IT Asset Disposal Partner

Adhering to NIST 800-88 standards requires careful planning and execution. Companies must balance concerns about the risks of harming the environment with e-waste, ensuring they comply with data security standards such as NIST 800-88 and the costs of disposing of end-of-life equipment. Look for companies that can assure you are compliant with NIST 800-88 standards by: 

ITAD Balance Cost Security Sustainability for e-Waste
  • Working with You to Develop a Sanitization Policy: Your data destruction provider should establish clear policies and procedures for data destruction based on NIST guidelines.
  • Selecting Appropriate Methods: Based on the sensitivity of the data, type of media, and intended reuse or disposal, choose a provider who will work with you to determine if your electronics need to be wiped, degaussed, shredded or disintegrated, or some combination of those data destruction methods.   A Certified Secure Data Destruction Specialist (CSDS) at Securis can help you balance security, disposal costs, and environmental concerns.
  • Employ Certified Tools and Services: Your IT Asset Disposition Provider should be able to purge data to NIST 800-88 standards and shred confidential or classified media down to NSA-approved standards of 2mm. Securis can offer these services on-site at your offices or off-site at our secure facilities. 
  • Verification and Documentation:  Regardless of the sanitization methodology, it’s crucial to verify the effectiveness of the process and maintain proper documentation to demonstrate compliance with security policies and regulations. Ensure you are provided with detailed inventory lists that can be easily accessed. These lists should be detailed, accurate, and provided promptly after completing your asset destruction project. At the end of the asset destruction process, you should be provided with an official certificate of destruction that you can use in any future audit.

NIST 800-88 Secure Data Destruction with Securis

In an age where data privacy and security are paramount, adhering to established standards for data destruction is non-negotiable. NIST 800-88 is the most widely adopted standard and provides a comprehensive framework for effectively sanitizing any and all data-bearing media, helping organizations and individuals mitigate the risk of data breaches and protect sensitive information.

By understanding the principles outlined in NIST 800-88 and working with a data destruction provider, like Securis, who can implement robust data destruction and media sanitization practices, you can ensure that data is securely managed throughout its lifecycle, safeguarding privacy and trust for your company.  

Other Data Sanitization and Destruction Standards include IEEE 2883-2022, NSA/CSS Policy Manual 9-12, and DoD 5220.22-M.  For most government contractors, military branches, and data protection experts, the 2006 DoD 5220.22-M standard has been replaced with the NIST 800-88 (1 Pass) standard.  The 2022 IEEE standard focuses on technology created after the latest revision to NIST 800-88 (2014) and clarifies much of the confusion that often exists in data erasure guidance.

HITECH Compliance: Secure Medical Equipment Recycling & Data Destruction

In this article, learn:

  • What is the HITECH Act?
  • How do medical equipment recycling and data destruction support HITECH compliance?
  • How does Securis assist with the proper disposal of electronic medical equipment?

HITECH complianceIn the digital age, where data reigns supreme and information proliferates across numerous platforms and devices, safeguarding sensitive medical data is paramount. The Health Information Technology for Economic and Clinical Health Act (HITECH) is a crucial piece of legislation in the United States that aims to enhance the protection of electronic health information. Among its provisions lies a critical aspect often overlooked: the secure and proper disposal of electronic medical equipment, including secure data destruction.

Mishandling sensitive patient information can lead to severe repercussions, including privacy breaches and financial penalties. Securely destroying medical records involves the systematic and irreversible deletion of data from electronic devices, such as computer hard drives or data storage devices in medical equipment, to prevent unauthorized access or retrieval. This process is essential for protecting patient confidentiality and HITECH compliance. 

What Is the HITECH Act?

HIPPA requirementsEnacted in 2009, the HITECH Act was introduced as part of the American Recovery and Reinvestment Act (ARRA). Its primary objective was to promote the adoption and meaningful use of health information technology, thereby improving healthcare quality, safety, and efficiency. 

Among its various provisions, the HITECH Act strengthened the privacy and security protections outlined in the Health Insurance Portability and Accountability Act (HIPAA). It extended the scope of HIPAA by encompassing business associates of covered entities, mandating stricter enforcement, and imposing substantial penalties for non-compliance.

Key Provisions of the HITECH Act Include:

  • Expansion of HIPAA Regulations:

proper disposal of electronic medical equipmentThe HITECH Act extends the scope of HIPAA by imposing stricter requirements on covered entities and their business associates regarding the security and privacy of electronic health information.

  • Breach Notification Requirements:

Covered entities must notify individuals and relevant authorities in case of a breach involving their protected health information (PHI), promoting transparency and accountability.

  • Enforcement and Penalties:

The HITECH Act introduced enhanced enforcement mechanisms and increased penalties for HIPAA violations, including fines for non-compliance with data security standards.

HITECH Compliance and Secure Data Destruction

What is the HITECH ActAmong the HITECH Act’s requirements lies a critical aspect often overlooked: the secure destruction of data on medical equipment and any computers or electronic devices used in a medical setting.  

Mishandling sensitive patient health information can lead to severe repercussions, including privacy breaches and financial penalties. 

Secure data destruction involves the systematic and irreversible deletion of data from electronic devices, such as computer hard drives or data storage devices in medical equipment, to prevent unauthorized access or retrieval. This process is essential for protecting patient confidentiality and maintaining HITECH compliance. 

Here’s how the HITECH Act is relevant to secure medical equipment recycling and data destruction:

  • Protection of Patient Privacy:

The HITECH Act emphasizes the importance of protecting the privacy and confidentiality of patient health information. Securely destroying data ensures that sensitive information stored on computers and medical equipment is inaccessible to unauthorized individuals.

  • Compliance With Regulatory Requirements:

Healthcare organizations must comply with the security and privacy standards outlined in the HITECH Act to avoid penalties and maintain regulatory compliance. Secure data destruction is crucial to these requirements, demonstrating adherence to best practices in safeguarding electronic health information.

  • The HITECH Act: The HITECH Act: medical equipment disposalRisk Management and Data Breach Prevention:

Healthcare providers can mitigate the risk of data breaches and unauthorized access to patient information by implementing proper data destruction protocols. This proactive approach aligns with the HITECH Act’s objectives of enhancing data security and protecting individuals’ rights to privacy.

  • Lifecycle Management of Medical Equipment:

Medical devices and equipment often contain sensitive patient data, such as electronic health records (EHRs) or diagnostic images. When decommissioning or disposing of such equipment, healthcare facilities must ensure that all data stored on these devices is securely erased to prevent potential data breaches.

Securis Ensures HIPAA & HITECH Act Compliance With Reliable Medical Equipment Recycling Services

how to recycle medical equipmentAs healthcare organizations continue to embrace innovative digital technologies to enhance patient care and administrative efficiency, protecting electronic health information will remain a top priority. 

The HITECH Act serves as a cornerstone in safeguarding patients’ medical records and privacy, with provisions that extend to secure data destructionon computers and hard drives. This includes the encryption and transmission of data and its disposal at the end of its lifecycle. 

Secure medical equipment recycling and data destruction are essential to mitigate the risk of data breaches and safeguard patient privacy. When these electronic devices reach the end of their usefulness or are decommissioned, it is imperative to ensure that any stored electronic information is irreversibly erased to mitigate the risk of unauthorized access or data breaches.

By working with a fully compliant and experienced company like Securis, healthcare entities can uphold their obligations under the HITECH Act while fostering trust among patients and stakeholders in the digital healthcare landscape. Our transparent and trusted process from project analysis to project completion guarantees the proper disposal of electronic medical equipment and the secure destruction of its data.i. 

We invite you to learn more about the data destruction process at Securis and how we can fulfill your medical asset disposal project.

How to Send ESG Ratings Up and Data Security Risk Down

Environmental, Social, and Governance (ESG) ratings are increasingly scrutinized in today’s corporate landscape, leaving many companies searching for ways to improve their eco-friendly practices.  ITAD (IT Asset Disposition) is one area where a company can make decisions that significantly impact its ESG score. However, companies need to consider data security in addition to ESG-boosting practices when disposing of end-of-life electronics. 

ESG scoreEvery year, companies dispose of countless tons of electronic waste (also known as e-waste) often with little consideration for environmental consequences. In fact, according to the World Economic Forum, “The United States generates about 46 pounds of e-waste per capita annually, according to the United Nations 2020 e-waste monitoring report. Globally, 53.6 million metric tons of e-waste are produced every year worlwide, the analysis estimates. Maybe unsurprisingly, but still alarmingly, only about 17% of this waste is properly collected, documented, and recycled across the globe each year. Much of the remaining 83% of e-waste sits idle in homes and businesses or is disposed of improperly, according to the analysis.*1 

E-waste often contains hazardous substances like cadmium, lead, arsenic, and polyvinyl chlorides (PVC), which can lead to soil, water, and air contamination with far-reaching ecological consequences. 

The Importance of R2v3 Certification 

R2v3 certified The best way to increase your ESG score when you are ready to dispose of end-of-life equipment is to make sure that you are working with an R2v3-certified company that understands the circular economy of technology. This type of company can make sure that every component of an electronic device is reused or recycled to maximize the value of the waste or to make sure that it is disposed of in a way that causes minimal harm to the environment. 

Support a Circular Economy 

support a circular economy

Working with a company committed to re-using all possible components of your retired electronics allows companies to develop a more sustainable and efficient economic model regarding the lifecycle of their electronic devices, resulting in improved ESG ratings. 

Once decommissioned, Securis processes each component using a procedure that determines if a component has any residual value. If so, that value is shared with our clients in our Value Recovery Program; if not, each component is recycled in the most environmentally friendly way possible. We even require our downstream vendors to sign an Agreement for the Responsible Disposal of Sensitive Materials. 

Prioritize Data Security While Improving ESG Ratings

While increasing ESG ratings is an admirable goal for any company, prioritizing data security is paramount when disposing of electronic equipment. This is because devices such as servers, laptops, and hard drives often contain sensitive information. 

shredding electronic wastePartnering with a certified IT asset disposition (ITAD) specialist like Securis can ensure that data is securely destroyed to NSA standards before equipment is decommissioned. 

In addition to knowing that you are working with a responsible partner in decommissioning and recycling your assets, you need proof that shows exactly what your company decommissioned and recycled. 

Working with a company that provides detailed inventory lists and a certified Certificate of Destruction can provide physical proof that your company is a responsible steward of the environment, making the right choices to protect the planet. 

The inventory lists do not yet have ESG ratings, but they will detail all re-used or responsibly recycled assets. By keeping those end-of-life electronics out of landfills, you contribute to a circular economy of technology and increase that all-important ESG score.

certified data destructionSecuris Makes the Following Environmental Commitments: 

  • Securis will not export electronics to developing countries and continents like China, India, and Africa to comply with the Basel Action Network (BAN). 
  • Securis will commit to doing all it can to recycle 100% of everything it receives. 
  • Securis will continually look for ways to improve e-waste recycling efficiency. 
  • Securis will exceed U.S. federal recycling mandates to comply with the widely adopted international standard. 
  • All downstream processors receiving shredded material from Securis must complete an Agreement for Responsible Disposal of Sensitive Materials. 
  • Currently, all magnetic media is incinerated using the cleanest methods available. Smelting documentation can be provided upon request. 
  • All metal-based material is sent to a domestic-based refinery for refinement based on its content.

boost your ESG ratingBuild a Sustainable Future & Boost Your ESG Score

By embracing compliant, certified, and responsible IT Asset decommissioning and recycling vendors like Securis and adopting responsible e-waste management practices, companies can assure their data security and improve their ESG ratings while contributing to a sustainable future for generations. 

Contact Securis today for more information.

1) https://www.weforum.org/agenda/2023/03/the-enormous-opportunity-of-e-waste-recycling/#:~:text= Globally%2C%2053.6%20million%20metric%20tons,across%20the%20globe%20each%20year

 

Fairfax County launches solar panel recycling program with Securis

The county’s Department of Public Works and Environmental Services launched a solar panel recycling program last week, expanding upon its November 2022 pilot program.

Daniel Brooks, an environmental services specialist at the county’s Solid Waste Management Program, said this new program falls under their electronic recycling program, which focuses on prevention.

“Many of these devices contain toxic heavy metals,” Brooks said. “We want to keep that out of the waste stream … and going directly to the landfill to prevent groundwater contamination, amongst other things.”

Brooks said in addition to protecting the environment, this program enables people to repurpose and reuse the materials from solar panels. He also said this program is first of its kind in the region.

“[Recycling programs] started with the West Coast and they were years ahead of us, sometimes up to as much as 20 to 30 years in various areas,” Brooks said. “It’s a very growing service as a renewable energy source.”

Since solar panels are relatively new to the area, responsible disposal is too. Brooks said Fairfax County wanted to get ahead of environmental contamination and started the pilot program in November 2022.

According to a 2022 study by the Pew Research Center, 8% of American homeowners said they already installed solar panels within the past year, the majority of which were in the western part of the nation.

The county partnered with PC Recycler, Inc. dba Securis to to refine the recycling process; at the start of the program, 50 solar panels were taken in to figure out the exact process for responsible and reasonable recycling.

“Wanted to figure out the cost metrics, if it was viable to do in-house [recycling], or if we needed to outsource that, and if we outsource that, what measures did we have with those materials?” Brooks said.

Brooks also said this was one step further toward Fairfax County’s sustainability goals, specifically zero waste. He said he’s hoping the county’s work inspires neighboring counties and towns to do the same.

The program is now available to Fairfax County residents only and two drop-off sites are available: the Interstate 66 Transfer Station and the Interstate 95 Landfill.

This story appears in FFX Now 

Come Visit Securis at Data Center World

Join us at booth #748 at the upcoming Data Center World Event which is being held April 15-18 at the Walter E. Washington Convention Center in Washington D.C.

Data Center World is the only global industry event that combines real-world, practitioner, and thought leader expertise with in-depth research and data, and access to a full spectrum of solution providers driving the data center and digital infrastructure industry forward.

Considering attending? You can save $325 with Promo Code Securis325

Hope to see you there!

How Are Magnetic Hard Drives Shredded?

Quite a few customers have asked us exactly how we shred a hard drive. To help explain this, below are the steps that a magnetic hard drive goes through.

Introduction to the Shredder:

The hard drive is placed into the shredder. Industrial shredders for electronic equipment like hard drives typically have solid and metal-cutting blades. 

Cutting Mechanism:

The blades in the shredder are made of heavy-duty metals, such as hardened steel or tungsten carbide. Depending on the shredder’s design, they are arranged in a crisscross pattern or a spiral or helical arrangement.

Initial Contact and Cutting:

When the magnetic hard drive passes through these blades, the outer casing, usually aluminum or hard plastic for external drives, is first cut. The strength and sharpness of the blades allow them to slice through this material.

hard drive destructionDestruction of the Magnetic Hard Drive’s Internal Components:

As the shredding continues, the blades come into contact with the hard drive’s internal components. This includes the platters (which store the data), the spindle, the read/write arms, and the circuit board. The blades are designed to cut through these materials, breaking them into smaller pieces.

Fragmentation of Platters:

The platters, typically made of aluminum, glass, or ceramic coated with a thin layer of magnetic material, are the most crucial part of data storage. The shredder blades must be strong enough to deform and fragment these platters, making them unreadable.

Discharge of Shredded Material:

The resulting debris, consisting of small metal, plastic, and other materials, is expelled from the shredder. This material is usually collected for disposal or recycling.

magnetic hard drive recyclingEnsuring Data Destruction for Magnetic Hard Drives:

The effectiveness of the shredding process in destroying data is due to the physical deformation and fragmentation of the platters. Since data is stored magnetically on the surface of the platters, their physical destruction renders the data unrecoverable.

The entire process is quite forceful and noisy, requiring robust machinery. The shredders must exert significant force to break down the hard drive’s materials, especially the metal components. The shredder’s design, including the blades’ pattern and strength, is crucial for thoroughly destroying magnetic hard drives. 

Read more about how Securis destroys hard drives here.

 

 

 

What Is R2 Certification in E-Waste Recycling?

R2 certification, established by Sustainable Electronics Recycling International (SERI), is a global standard for any R2-certified recycler. This certification encompasses environmental, health, safety, quality, and data security standards. It is a hallmark of responsible operation for R2-certified recyclers, ensuring they minimize environmental and health risks.

Why Is Choosing an R2 Certified Recycler Important for E-Waste Recycling?

Opting for an R2-certified recycler is critical in e-waste management. These recyclers are held to stringent standards, ensuring the protection of the environment, human health, and safety. Furthermore, an R2-certified recycler assures data protection, ensuring that any data from end-of-life technology is destroyed correctly.

circular economyHow Does R2 Certification Promote a Circular Economy in Electronics?

R2 certification is essential for recyclers in promoting a circular economy. An R2-certified recycler plays a pivotal role in extending each device’s life through reuse and recycling. This process, endorsed by R2 standards, helps conserve natural resources and ensures responsible electronic waste handling and disposal.

What Risks Are Associated With Non-R2 Certified E-Waste Recyclers?

Recyclers without R2 certification often lack accountability, leading to irresponsible recycling practices. Unlike an R2-certified recycler, they may inadequately protect sensitive data and cause harmful environmental impacts due to the improper disposal of toxic materials.

R2 recyclerHow Can I Verify if a Company Is Truly an R2 Certified Recycler?

To verify a company’s R2 certification, it’s recommended to consult the SERI website. They provide a searchable database to identify R2-certified recyclers based on region or name. This verification is crucial to ensure you are dealing with a genuinely R2-certified recycler and not a company falsely claiming such certification.

What Role Does R2 Certification Play in Data Protection?

For an R2-certified recycler, data protection is a significant aspect of their service. R2 standards ensure that these recyclers effectively destroy any data contained in end-of-life technology. This is a critical consideration in e-waste recycling, particularly for businesses and individuals concerned about data security.

Read more about the certifications and compliance standards that Securis has attained. 

Why Inventory Matters in Electronics Recycling and Data Destruction Policy

In electronics recycling and data destruction, inventory reports plays a pivotal role in ensuring transparency, compliance, and peace of mind for both service providers and their clients. This article delves into the nuances of inventory management, exploring why meticulous record-keeping is indispensable for e-waste and data destruction policy

Filling the Void Left by Electronics Recycling and Data Destruction Services

When companies and government entities engage in electronics recycling and data destruction services, they are often left with a void. This void isn’t physical; rather, it’s the absence of the electronics and data that were once present. Post-service, a critical question often arises: What proof exists of how data was destroyed or where a recycled component ended up?  In scenarios like audits or unforeseen incidents the ability to peer into that void and get solid information can be crucial.

The Significance of  Audit and Inventory Reports Post-Service

The answer lies in the quality of the audit or inventory reports generated after the physical work of decommissioning is completed. This documentation becomes vital, serving as a record of exactly what was done, much like an insurance policy when you need it most, often under less-than-ideal circumstances, which is why we include it as an invaluable part of our e-waste and data destruction policy

What Constitutes Quality Inventory Management in Electronics Recycling?

Quality inventory reports in electronics recycling and data destruction must detail what was collected and what happened to each item. The most valuable data for tracking electronics are serial numbers or asset tags. These unique identifiers make it easy to account for individual items among thousands. Once an item can be identified details about what happened to that item and any associated data can be easily tracked. 

Tracking the Fate of Each Item: From Recycling to Destruction

Secure and comprehensive inventory management should clearly document the disposal process of each item. It’s crucial to record the method of data destruction for data-containing devices, whether it’s shredding, disintegration, or wiping. This information not only ensures compliance but also provides peace of mind to the client.

The Role of Recycled Weight in ESG Reporting

Environmental metrics, particularly recycled weight, are integral to inventory reports. They contribute to a company or agency’s Environmental, Social, and Governance (ESG) reporting. A good inventory report provides raw data that can be used to support environmental reporting without substituting it.

The Need for Speed: 3 Business Day Policy at Securis

At Securis, we understand the importance of timely inventory reports. Our e-waste and data destruction policy ensures that all inventory reports are completed within 48 hours. Lengthy delays, which are common in the industry, are inefficient and often lead to frustration.

Advantages of Using a Raw CSV File Format

We believe that a raw CSV file is the most effective format for inventory reports. This format allows clients to import the data into any system they choose, offering flexibility and ease of use. Fancy PDFs, while visually appealing, often prove impractical due to their non-manipulable nature.

Lessons Learned: What Works and What Doesn’t

Our two decades of experience in the field have taught us valuable lessons about what is helpful and what is not in the context of electronics recycling and data destruction. These insights, drawn from interactions with both large and small companies and agencies, have shaped our approach to inventory management.

The Unwavering Importance of Inventory Reporting in Electronics Recycling and Data Destruction

Our experience has shown that the importance of inventory reports in electronics recycling and data destruction policy cannot be overstated. It’s the backbone of accountability, transparency, and compliance in this industry. As we move forward, we expect to see continued evolution and innovation in inventory practices, ensuring that they remain robust and reliable.