Secure Data Destruction
EDM Recycling is committed to establishing long-term partnerships with our clients. We work side by side with you to design, implement, operate, and monitor your IT Asset Disposition programs. We offer a full chain-of-custody solution that tracks each asset from arrival to destruction. We utilize the following operating standards when destroying data:
Conformance with U.S. Department of Defense (DoD) data destruction standards
Support of all types of hard drive subsystems: IDE, SCSI, ATA, Fibre Channel, SATA, and SAS
Detailed reporting and chain of custody options
The Importance of Data Destruction
Your company’s old technology can be a significant security risk and a hazard to the environment. When technology ends up in the wrong hands or is disposed of in the wrong way, it can cost companies millions. Electronically stored data is subject to complicated HIPAA/HITECH, FACTA, SOX, GLB, and FERPA regulations that can make responsible disposal difficult. EDM uses DoD standards to destroy data after which the customer receives a Certificate of Destruction and a detailed Disposition Report after the asset disposal process is completed.
In the event that your enterprise has higher security needs, physical destruction ensures that your data devices and the information stored on them cannot be accessed. We can process hundreds of drives per hour, all within our access-controlled hard drive destruction department. EDM Recycling then places the crushed drives into a secure container for delivery to an EDM processing facility and the final recovery of non-ferrous metals.
Whether a system is being given to a charity or sold to an employee, third party, or at an auction, data security should be a strong concern. An unauthorized data leak may be the result of these systems leaving the company, which creates a serious liability if the drives have been merely reformatted. Reformatting or re-partitioning a hard drive will not erase the data; it can all be recovered with special software since it is the information table or directory that is altered, not the data file.
The information retrieved by an unauthorized party could contain sensitive private company and customer information, along with personal information about the computer users themselves. This unintended information exposure could lead to undesirable publicity and even legal prosecution. Data security has gained legal safeguards with recent legislation being passed to protect against the sharing of nonpublic personal information. Requirements are placed on the companies themselves to make certain that appropriate safeguards are in place to protect collected information from inappropriate eyes (i.e. Gramm-Leach-Bliley Act of 1999 and Health Insurance Portability and Accountability Act of 1996). Portions of new legislation continue to safeguard private information a company may have gathered concerning its customers, with serious penalties for violation.