IT Asset Disposition for Copiers and Printers (and their hard drives)
Posted in Blog
Here’s a data destruction hot tip pulled right from our recent 30 common places where data is stored blog: most all-in-one printers and networked copiers have internal hard drives. Yep, these everyday business workhorses are an overlooked data security gap. And, they’re completely ignored in IT asset disposition planning.
Sensitive documents are everywhere.
Unless you’re actively monitoring what your printers and copiers are spitting out with Data Loss Prevention software that flags what document is printed where, your trusty office equipment is quite likely saving last-printed private and confidential documents like these inside:
- Human Resources Personnel Files
- Client Records
- Patient Medical Records and Data (HIPAA)
- Financial Statements
- Legal Documents
- Security and Internal Processes
- Product Development Plans
What is the data access risk for printing, scanning and copying?
When these smart business devices reach end of life or lease return, there’s often a stockpile of scanned, printed, copied or spooled confidential company documents that leaves the building with them.
Just like any IT device, the data on a copier or printer that leaves your building is more valuable than the device itself. Risk, IT and security managers,should include copiers and printers as part of corporate asset disposition and data destruction programs.
Add data destruction for all your copiers and printers to your enterprise IT asset disposition program
Start by gathering a list of manufacturers, model numbers and locations. With that in hand, ask your reseller or asset disposition contractor if the devices have a hard drive and if data destruction is included in your contract. You’ll want to ask for
- A confirmation process that determines if the equipment has a hard drive or memory
- A full data destruction process (erasure, degaussing, shredding, mutilation).
- Chain of custody documentation including a Certificate of Data Destruction (and R2 recycling if that’s where your equipment is going), the scanned serial numbers from each hard drive and an Asset Transfer Form (ATF).
And, as always, we recommend insisting on a NAID AAA Certified data destruction provider to ensure that you have the security, compliance and peace of mind you require.
Talk to us if you have any questions about your copiers ad printers — we’re happy to advise. Copy that!
We also recommned
15 essential factors for IT asset management and data destruction
If your goal is to ensure that data doesn’t show up where it shouldn’t, these 15 essential factors for IT asset management and data destruction will help you develop a defensible data destruction policy and secure IT asset management process.
Overflow warehousing for IT asset disposition, security and transitions
Secure, overflow warehousing designed for IT asset storage and processing is the solution for ITAD, VAR and reseller when space, receiving and client services are a problem
8 Post-pandemic Predictions for the Planning of Data Security and IT Asset Management and Disposition
We’ve pinpointed eight post-pandemic workplace trends that will affect the planning of data security and IT asset management and disposition from budgeting, purchasing through end of life disposition. Here’s what you need to know.
Stay in the know
Get relevant information right in your inbox
We do not sell or share your information with anyone