Electronic Data Destruction 101: Shredding
Posted in Blog
Shredding electronics is the most secure and cost-effective way to dispose of all types of end-of-life computer hard drives, solid state drives, media tapes, printed circuit boards, tablets, smartphones, CDs and DVDs, film and video tape, motherboards, silicon chips and credit card swiping devices. Shredding services are best for businesses with large data centers (enterprise sites) or a stockpile of old hard drives and media tapes because it is a fast, efficient and cost-effective process.
What is electronic shredding or e-shredding?
Electronic data destruction by shredding destroys the drive platters, mechanisms, and electronic components rendering the data virtually unrecoverable. Complete physical destruction and smaller shred sizes ensure that your digital data is permanently destroyed. Using hard drives as an example, the typical shredding process consists of the following steps:
- Remove hard drive from the host unit.
- Capture the serial #. (Option: marry serial # to host unit for improved chain of custody documentation.)
- Issue chain of custody documents to transfer possession/ownership of the equipment and move to mobile data destruction truck.
- Feed hard drives into shredder.
- Shredder slices and dices into small pieces.
- Shredded byproduct recycled by R2 or e-steward recycler.
- Certificate of data destruction listing serial # and location and date.
Thirty percent of data leakages occur because someone finds valuable data on discarded equipment. The bigger the data, the larger the risk for a big data breach.
- To protect your company data from cyber-attacks, information theft, credit card fraud and other costly data breaches. NAID AAA certified data destruction vendors ensure the highest level of security when disposing of old IT equipment.
- To avoid penalties, lawsuits, and criminal proceedings resulting from non-compliance with industry standards and federal and state laws and including Gramm-Leach-Bliley (GLB) Act; Fair and Accurate Credit Transactions Act (FACTA); Health Information Portability and Accountability Act (HIPAA); National Institute of Standards and Technology (NIST); Payment Card Industry (PCI DSS); Health Information Technology for Economic and Clinical Health Act (HITECH Act); and NSA and DoD standards.
Which shredding service should you choose?
Depending on the amount and type of material that requires shredding, many companies choose onsite hard drive shredding providers. Your personnel can witness the end-to-end process to maintain the highest level of security and eliminate security and chain of custody concerns. Guardian recommends that you ensure that your provider will scan and shred all hard drives and media tapes etc. and provide a certificate of destruction that confirms all data is appropriately destroyed. And, choose an electronic data destruction company that will also ensure the proper recycling and disposal of shredded materials in accordance with environmental protocols.
To check if shredding is the right form of electronic data destruction for you we recommend that you consult with your IT equipment VAR or contact Guardian directly. They can review the volume, and type of equipment, frequency of disposition, and factors such as industry regulations, customer requirements and your company IT management, security and privacy policies.
We also recommned
15 essential factors for IT asset management and data destruction
If your goal is to ensure that data doesn’t show up where it shouldn’t, these 15 essential factors for IT asset management and data destruction will help you develop a defensible data destruction policy and secure IT asset management process.
Overflow warehousing for IT asset disposition, security and transitions
Secure, overflow warehousing designed for IT asset storage and processing is the solution for ITAD, VAR and reseller when space, receiving and client services are a problem
8 Post-pandemic Predictions for the Planning of Data Security and IT Asset Management and Disposition
We’ve pinpointed eight post-pandemic workplace trends that will affect the planning of data security and IT asset management and disposition from budgeting, purchasing through end of life disposition. Here’s what you need to know.
Stay in the know
Get relevant information right in your inbox
We do not sell or share your information with anyone