For most companies, there comes the point where secure data destruction is necessary to protect your business’s confidential information as well as personal information of employees, members, or clients. You may assume that you can destroy data on your own by drilling holes into equipment. However, this is not a proven method to destroy data, and it can still leave your information vulnerable and easily obtained.
Secure data destruction can come in many forms, including data wiping, degaussing, shredding, and incineration. Businesses may also choose between on or off-site data destruction, or even in-person destruction. Whatever your needs may be, e-End offers a solution that you can trust. For data destruction, e-End follows the guidelines in NSA/CSS Policy Manual 9-12 and NIST 800-88R!
The Importance Of Secure Data Destruction
There is a significant amount of information stored on your company’s hardware. While you certainly don’t want to expose your company or its members to a data breach, there are federal regulations that require that you protect personally identifiable information (PII). Such regulations include:
- HIPAA-Health Insurance Portability and Accountability Act
- SOX-Sarbanes–Oxley Act
- GLB-Gramm-Leach-Bliley Act
- FACTA-Fair and Accurate Credit Transactions Act
- COPPA-Children’s Online Privacy Protection Act
- FISMA-Federal Information Security Management Act
- ITAR-International Traffic in Arms Regulations
e-End provides a Certificate of Certified Data Destruction to show that you are compliant with the above regulations.
The Onsite Data Destruction Process
Once the proposal has been submitted and accepted, it is time to move forward with the data destruction process. Each step is clearly outlined as the following:
Team Arrives & Destruction Sequence Is Outlined
The team leader meets with the client to introduce the team and outline the sequence of job execution and what to expect during each step.
Materials Are Staged To Be Processed
The following steps are conducted during the staging materials process:
- Stack: Hard disk drives and electronic media are laid out for scanning
- Scan: Serial number of each drive is scanned
- Spreadsheet: A printout is populated with the final count and serial number of drives
Data Sanitization & Destruction
During this step, degaussing and shredding are completed.
Remaining Materials Are Prepared For Final Recycling
Shredded or ashed materials are loaded into gaylords and then shipped to the recycling facility.
Certificate Is Provided
Certificate of Witnessed Data Sanitization and Destruction is provided for reporting and auditing purposes. The document includes serial numbers and descriptions of processed media.
End Of Life IT Asset Vulnerability
When you think of data breaches, you may assume that most of the hacks are performed during the prime of an IT asset when it is being used for a daily need or activity. However, you may be surprised to learn that a fair number of data breaches occur due to readily available end-of-life equipment that is not adequately secured.
Leaving equipment vulnerable means that you’re leaving the data easily accessible. Avoid leaving your equipment in storage or anywhere that someone else can access it. Instead, follow the proper procedures for data destruction so that the entire hardware is wiped clean.
Reach Out To An Experienced Data Destruction Company
Don’t leave your data easily accessible. Rely on the expertise of e-End to properly perform data destruction based on your company’s needs. Please contact us for an initial consultation so that we can move forward with your customized plan. Reach out to us today to learn more about our data destruction services by giving us a call at 240.713.5855 or get a quote online today.