Secure Data Destruction

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secure Data Destruction"

Transcription

1 Secure Data Destruction Secure Data Elimination (Degauss) Onsite Magnetic Degaussing service eliminates data from Tape and Magnetic Hard Disk media Portable machines allow for degaussing to be competed inside Data Center After degaussing, magnetic tape and HDD media is neutralized and rendered permanently unusable Asset numbers and stickers assigned to ensure all magnetic storage media is accounted for in a fully-auditable process Certificate of degauss issued for all media processed High-efficiency equipment allows for 200+ units of media to be processed per hour Hole drilled into degaussed media after process is completed for visual verification onsite 1

2 Onsite & Offsite Physical Media Destruction Onsite physical shredding available for HDD s of 3.5 form-factor and smaller and all tape media Onsite physical impairment (hole-drilling) and full shredding service, to permanently destroy tape, HDD and SSD media Offsite certified green disposal with certificate of destruction/disposal Chain of custody procedure tracks and accounts for all assets sent for disposal Media is permanently destroyed and unrecoverable Multiple layers of destruction available magnetic degauss and physical destruction processes for individual units 2

3 Data Center / IT Asset Decommission Fully customizable solution designed to meet the specific needs for the de-install and removal of IT assets in a fully documented process End-of-life equipment scheduled for decommission, lease expiration equipment, and legacy equipment in storage awaiting final disposition Brokerage of equipment with 3 rd Party Resellers to find value on the secondary market for IT assets Full logistics service for any IT asset, secured shipments, specialized packing for sensitive electronics, ground/air transport, climate controlled and rigging when required. GPS tracking and security escort available Wall-to-wall inventory and asset tag process and inventory reconciliation services available for any item in a Data Center 3

4 Data Center / IT Asset Decommission (cont.) Cable recovery (harvesting) and structure cable removal Data Center and Office environments: Infrastructure removal and reinstatement, including old racks, raised floors, fire suppression systems and gas, cable trays and conduits, cages, patch panels, and any other infrastructure Relocation, removal and/or disposal of furniture and end-user equipment, PC s, printers, monitors, peripherals, mobile phones / tablets Removal and disposal of UPS batteries and systems, air-handlers, chillers, PDU s E-waste recyclers and disposals at environmentally responsible recycle centers Full re-instatement to return facility into original condition Track record of successful Data Center and Office decommissions, lease returns, secure data disposals, secure equipment disposals for facilities large and small 4

5 Data Center Decommission: Success Story Industry: Multinational Mass Media and Information Company Business Requirements: Full decommission of a data center environment of approximately 35,000 sqftin size and all IT assets inside Solution: McCollister saccommodated customer limited site access and availability, completing project over a six(6) month period. McCollister s provided the following services: Equipment sale(brokered), data elimination, secure media destruction and disposal, equipment decommission, disposal and recycling, facility re-instatement, infrastructure decommission (climate / UPS / raised floor / etc.) 5

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services Destruction and Recycling Services An ISO 9002-compliant company Audited 100% data destruction and green recycling 2014 Commercial Catalog Edition 2014 www.cdrominc.com CD Rom, Inc. Table of Contents About

More information

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

SJSU Electronic Data Disposition Standard

SJSU Electronic Data Disposition Standard SJSU Electronic Data Disposition Standard Page 1 Executive Summary University data is at risk as long as it is persistently stored on electronic media. This means that data must be properly cared for during

More information

Safe, Secure and Certified Data Destruction Solutions to meet your individual needs

Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened

More information

Bedford County Tennessee

Bedford County Tennessee Bedford County Tennessee Digital Media and Hardware Disposal Policy Date: 08.31.11 Approved By: Chris White Policy Number: 1 P age 1.0 INTRODUCTION 3 1.1 Authority. 3 1.2 Purpose.. 3 1.3 Scope 3 1.4 Background.

More information

Responsibly Retiring IT Assets, Medical or Laboratory Equipment

Responsibly Retiring IT Assets, Medical or Laboratory Equipment Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security

More information

Digital Data Destruction D3 Services, Inc.

Digital Data Destruction D3 Services, Inc. Audited 100% Data Destruction and Green Recycling An ISO 9002 Compliant Company GSA Catalog Nov 2009 Edition 9-03 General Service Administration Federal Supply Catalog Digital Data Destruction Services,

More information

We are the solution. erecycling. We have the solution. made easy.

We are the solution. erecycling. We have the solution. made easy. We have the solution. erecycling made easy. Nowadays, business and technology go hand in hand. But what happens to those old or unwanted electronics? The answer, more often than not, is: nothing. We stack

More information

The Problem U.S. Treasury Department Needed to Recover Some Space to Consolidate Datacenters

The Problem U.S. Treasury Department Needed to Recover Some Space to Consolidate Datacenters The Problem U.S. Treasury Department Needed to Recover Some Space to Consolidate Datacenters The US Treasury Department had twelve (12) decommissioned STK Silo Tape Library Units (Silos) requiring removal

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number: State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2

More information

Other terms are defined in the Providence Privacy and Security Glossary

Other terms are defined in the Providence Privacy and Security Glossary Subject: Device and Media Controls Department: Enterprise Security Executive Sponsor: EVP/COO Approved by: Rod Hochman, MD - President/CEO Policy Number: New Date: Revised 10/11/2013 Reviewed Policy Owner:

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

Building an ITAD Program:

Building an ITAD Program: Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 I. POLICY STATEMENT Increasing amounts of electronic data are being transmitted and stored on computer systems and electronic media by virtually

More information

Title: Electronic Media Destruction Policy Effective Date: 28 April 2015. Electronic Media Disposal Policy Policy Number 091

Title: Electronic Media Destruction Policy Effective Date: 28 April 2015. Electronic Media Disposal Policy Policy Number 091 Document Control Title Electronic Media Disposal Number 091 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date of Production

More information

The nation s largest privately held records and information management company

The nation s largest privately held records and information management company The nation s largest privately held records and information management company Our mission is clear: to lead the records and information management industry by providing our clients the very best service.

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 6 I. Policy UW-Madison strives to ensure the privacy and security of all patient/clients protected health information in the maintenance, retention, and eventual destruction/disposal of such

More information

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:

More information

E. Custodian - the Vice President for Administrative Services and Finance or designee.

E. Custodian - the Vice President for Administrative Services and Finance or designee. Florida Gulf Coast University Policy Manual TITLE: Tangible Personal Property Policy Policy: 3.033 Approved: 1/13/12 Responsible Executive: Vice President for Administrative Services and Finance Responsible

More information

HARD DRIVE REMARKETING

HARD DRIVE REMARKETING A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS

More information

Fixed Asset Policy & Procedures. Content

Fixed Asset Policy & Procedures. Content Content 1. Purpose... 3 2. Definitions... 3 3. Responsibility... 3 4. Tagging and Identifying Inventoriable Assets... 4 5. Additions to Fixed Assets... 4 6. Transfer of Assets... 5 7. Disposition of Assets...

More information

Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper

Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD intimus consulting is a division of the MARTIN YALE GROUP Bergheimer Strasse 6-12 88677 Markdorf / Germany www.intimusconsulting.com

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

Data Centers and Mission Critical Facilities Operations Procedures

Data Centers and Mission Critical Facilities Operations Procedures Planning & Facilities Data Centers and Mission Critical Facilities Operations Procedures Attachment A (Referenced in UW Information Technology Data Centers and Mission Critical Facilities Operations Policy)

More information

DISASTER RECOVERY PLAN

DISASTER RECOVERY PLAN DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and

More information

Policy Number. Administrative Signature:

Policy Number. Administrative Signature: COMMUNITY MENTAL HEALTH PARTNERSHIP OF SOUTHEASTERN MICHIGAN Category Regulatory Compliance Policy and Procedure Policy Number Policy Name Type of Policy: RECORD RETENTION AND DESTRUCTION OF RECORDS POLICY

More information

GREEN ICT DELL, OUR SUPPLIERS AND CUSTOMERS

GREEN ICT DELL, OUR SUPPLIERS AND CUSTOMERS GREEN ICT DELL, OUR SUPPLIERS AND CUSTOMERS Victor C. Smith Senior Strategic Technologist Dell Corporation Ltd. GROWTH EVERY SECOND IN THE CONNECTED AGE 2 new blogs created 4 cell phones purchased 7 personal

More information

SMTD Computer Hardware and. Software Asset Inventory Policy

SMTD Computer Hardware and. Software Asset Inventory Policy SMTD Computer Hardware and Software Asset Inventory Policy Effective Date: May 18, 2015 Purpose: With a considerable amount of computer hardware and peripherals both on and off-campus, maintaining an accurate

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

Understanding Data Destruction and How to Properly Protect Your Business

Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business I. Abstract This document is designed to provide a practical

More information

Developing a Records Retention Program

Developing a Records Retention Program Developing a Records Retention Program This site is intended to help you design and implement a records retention program for your organization. Here you will find a basic explanation of a records retention

More information

LONDON PUBLIC LIBRARY POLICY

LONDON PUBLIC LIBRARY POLICY PURPOSE The purpose of this policy is to: Ensure accessibility to accurate, authentic and reliable London Public Library Records in all formats, including electronic, to meet legislated requirements, support

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

Moving Information: Privacy & Security Guidelines

Moving Information: Privacy & Security Guidelines Information and Privacy Commissioner/ Ontario Moving Information: Privacy & Security Guidelines Ann Cavoukian, Ph.D. Commissioner July 1997 Information and Privacy Commissioner/Ontario 2 Bloor Street East

More information

FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA

FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage

More information

Managing Records: Retention, Destruction and Disposal

Managing Records: Retention, Destruction and Disposal Managing Records: Retention, Destruction and Disposal Presentation by Jennifer L. Cox, J.D. Cox & Osowiecki, LLC Hartford, CT April 10, 2014 Today s Program Identify the universe of records involved Distinguish

More information

BUSINESS CONTINUITY PLANNING THE 10-MINUTE ASSESSMENT

BUSINESS CONTINUITY PLANNING THE 10-MINUTE ASSESSMENT BUSINESS CONTINUITY PLANNING THE 10-MINUTE ASSESSMENT BUSINESS CONTINUITY PLANNING - THE 10 MINUTE ASSESSMENT This is a quick assessment for you to see how far you have got with business continuity planning.

More information

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6 GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE 899-ENVIRONMENTAL SERVICES AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms and conditions, up-to-date

More information

Value Recovery Enterprise IT Asset Disposition

Value Recovery Enterprise IT Asset Disposition Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.

More information

Determine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections.

Determine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections. IT Office Move - Tips and Check List: Office IT Move Plan Introduction: If you are moving to a New Office and/or Data Center (Cloud), or if this is also a Colocation exercise please note this is a basic

More information

Keep Your Business Moving with Custom Technology Leasing

Keep Your Business Moving with Custom Technology Leasing Keep Your Business Moving with Custom Technology Leasing A custom Technology Lease from Data Sales Co. gives you the technology your business needs to succeed, with innovative financing, flexible terms,

More information

Obsolete Computer Equipment Disposal Procedure

Obsolete Computer Equipment Disposal Procedure No. IT 041 Effective Date: 11-2-2015 Last Revised Date: 11-2-2015 Approved By: IT Director Policy Name: Obsolete Computer Equipment Disposal Procedure Citywide Policy _ IT Policy _ IT Procedure X Obsolete

More information

COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125

COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 Minnesota State Colleges & Universities and Asset Recovery Corporation COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 CONTRACT EFFECTIVE UNTIL: SEPTEMBER 15, 2014 http://www.finance.mnscu.edu/contracts-purchasing/collaborative/index.html

More information

HOW TO DEVELOP A RECORDS PROCEDURES MANUAL. New York State Unified Court System Division of Court Operations Office of Records Management

HOW TO DEVELOP A RECORDS PROCEDURES MANUAL. New York State Unified Court System Division of Court Operations Office of Records Management HOW TO DEVELOP A RECORDS PROCEDURES MANUAL New York State Unified Court System Division of Court Operations Office of Records Management June 2003 HOW TO DEVELOP A RECORDS PROCEDURES MANUAL PURPOSE OF

More information

The IT Management Guide to Business Relocation

The IT Management Guide to Business Relocation The IT Management Guide to Business Relocation Relocating your business is a major project that entails careful planning. You want to minimize the disruption to your business, provide a new space that

More information

Products and Services

Products and Services Products and Services Canvas Systems is the largest global independent reseller of refurbished server hardware, with over 13 years of experience within the industry. With over 50 million worth of new and

More information

Facilities Planning and Management Services

Facilities Planning and Management Services Page 1 of 5 Services Page 2 of 5 TABLE OF CONTENTS Revision History... 2 Abbreviations and Acronyms... 2 Terminology... 2 1.0 Service Description and Services... 3 Baseline Services... 3 1.2 Additional

More information

Guidelines for Off-Site Storage of Inactive Local Government Records

Guidelines for Off-Site Storage of Inactive Local Government Records Guidelines for Off-Site Storage of Inactive Local Government Records Archives Technical Information Series #42 1993, rev., 1996, 2006 This publication provides advice to local governments on establishing

More information

Best Practices for Responsible Disposal of Tape Media

Best Practices for Responsible Disposal of Tape Media Best Practices for Responsible Disposal of Tape Media The Environmental and Economic Benefits of Recycling vs. Destruction White Paper The Data Media Source San Jose, CA Data Media Source 2006 For use

More information

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS) Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization

More information

HP Hardware Support Onsite 6-Hour Call-to-Repair Service - U.S.

HP Hardware Support Onsite 6-Hour Call-to-Repair Service - U.S. HP Hardware Support Onsite 6-Hour Call-to-Repair Service - U.S. HP Care Pack Services Technical data HP Hardware Support Onsite 6-Hour Call-to-Repair Service provides an IT manager with a team of support

More information

RETENTION OF UNIVERSITY RECORDS

RETENTION OF UNIVERSITY RECORDS RETENTION OF UNIVERSITY RECORDS Policy Statement Northwestern University and various federal and state laws require that different types of records be retained for specific periods of time. The University

More information

Data Destruction Demystified:

Data Destruction Demystified: 010101001011100100110011000101011 001010010010101000101101011010101 010011011010001101101101100101010 010010110101001001101101101110110 001101011001000101100110110110101 010010110110110100010110100101001

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

NewYork-Presbyterian Hospital Sites: All Centers Hospital Policies and Procedures Manual Policy Number: I240 Page 1 of 9

NewYork-Presbyterian Hospital Sites: All Centers Hospital Policies and Procedures Manual Policy Number: I240 Page 1 of 9 Page 1 of 9 TITLE: INFORMATION SECURITY: DEVICE AND MEDIA CONTROLS POLICY: Reasonable steps are taken to protect, account for, properly store, back up, encrypt and dispose of hardware, paper and electronic

More information

1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role

1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role 1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role Definition of Responsibilities 1. Department Manager-Responsible official appointed by the Dean or Department

More information

Sean O Leary Communications Director DestructData, Inc. February 1, 2011

Sean O Leary Communications Director DestructData, Inc. February 1, 2011 Working Summary NIST Special Publication 800-88 Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology Sean O Leary Communications Director DestructData,

More information

Chapter 434-662 WAC PRESERVATION OF ELECTRONIC PUBLIC RECORDS

Chapter 434-662 WAC PRESERVATION OF ELECTRONIC PUBLIC RECORDS Chapter 434-662 WAC PRESERVATION OF ELECTRONIC PUBLIC RECORDS WAC 434-662-010 Purpose. Pursuant to the provisions of chapters 40.14 and 42.56 RCW, and RCW 43.105.250, the rules contained in this chapter

More information

Disposal & Destruction of Sensitive Data

Disposal & Destruction of Sensitive Data Disposal & Destruction of Sensitive Data Contents 1 Overview of Data Media Types 1.1 Non-Volatile Magnetic: Hard Disk Drives 1.2 Write Once Optical: CDROM and DVD- 1.3 Write Many Optical: CD-RW and DVD-RW

More information

Data Security for ITAD, Corporate & Consumer Electronics

Data Security for ITAD, Corporate & Consumer Electronics Up cy cle \ ŭp-sỳ-kil\ v (ca. 2011) 1. the action of giving devices a second life 2. the mission to keep electronics out of landfills 3. to fund important causes without writing a check 4. to nearly double

More information

Samsung WEEE Management Policy (US and Canada)

Samsung WEEE Management Policy (US and Canada) Samsung WEEE Management Policy (US and Canada) 1. Purpose These requirements aim to minimize environmental impacts caused by all Electronic Waste generated by Samsung's US and Canadian operations and programs,

More information

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization TECHNICAL REFERENCE DOCUMENT Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization Recommendations Key Points: of the National Real world compliance

More information

Overview. Responsibility

Overview. Responsibility Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed

More information

SRO Guideline SANITIZING DIGITAL MEDIA AND DEVICES

SRO Guideline SANITIZING DIGITAL MEDIA AND DEVICES Department of Culture and the Arts Government of Western Australia State Records Office of Western Australia SRO Guideline SANITIZING DIGITAL MEDIA AND DEVICES An Information Management Guideline for State

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Vernon Turner Senior Vice President, Research

Vernon Turner Senior Vice President, Research Sustainability, Green IT and Climate Change Management. Bringing Together Opportunities Within ICT Vernon Turner Senior Vice President, Research Copyright 2009 IDC Reproduction is forbidden unless authorized.

More information

http://www.guardianedge.com/

http://www.guardianedge.com/ Full Disk Encryption & IT Asset Disposition: Protecting Data During the PC Disposal Process A GuardianEdge White Paper 4/7/2006 The information contained in this document represents the current view of

More information

IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012

IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012 IT Asset Management Procedure (QM)DT/001 Support Procedure Written by Martin Crane Version 1.3 11/08/2012 Revision Version Summary of Changes Contributor date 22/08/2008 1 Initial Draft Martin Crane 22/07/2010

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

POLICY ON COMPUTER PROVISIONING

POLICY ON COMPUTER PROVISIONING Effective Date: July 1, 2013 Supersedes /Amends: November 16, 2010 Originating Office: Office of the Vice-President, Services Policy Number: VPS-32 PURPOSE Client Computers (as defined below) are intended

More information

C24 - Inside the Data Center Andrew J. Luca

C24 - Inside the Data Center Andrew J. Luca C24 - Inside the Data Center Andrew J. Luca Inside the Data Center What an auditor needs to know Course Objectives Understand the looks and feel of a data center Know what to look for and what questions

More information

IT Operations Disposal of Media

IT Operations Disposal of Media 1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-

More information

Policy Title-Aquia Data Center Operational Policy & Procedure. Policy ID - TSD-ADC001. Version - Version: 1.0. Supersedes Version 1.

Policy Title-Aquia Data Center Operational Policy & Procedure. Policy ID - TSD-ADC001. Version - Version: 1.0. Supersedes Version 1. Policy Title-Aquia Data Center Operational Policy & Procedure Policy ID - TSD-ADC001 Version - Version: 1.0 Supersedes Version 1.0 Review Date One (1) year from effective date. Policy & Procedure - Provides

More information

DISPOSAL OF SURPLUS PERSONAL PROPERTY

DISPOSAL OF SURPLUS PERSONAL PROPERTY Shelby County Board of Education 3013 Issued Date: 08/25/15 DISPOSAL OF SURPLUS PERSONAL PROPERTY I. PURPOSE To establish procedures for the disposal of surplus personal property owned by Shelby County

More information

MFX RELOCATIONS. Data Centre & Computer Room Relocations

MFX RELOCATIONS. Data Centre & Computer Room Relocations MFX RELOCATIONS MFX Relocations is our specialist relocation division and can undertake any type of commercial move but also undertakes specialist moves which includes:- Specialist IT relocations (Data

More information

Data Center Relocation Take One! Joseph E. Ford, RCDD Craig A. Lowe, RCDD/OSP,LEED AP Robert G. Hall, MCSD Bala Consulting Engineers, Inc.

Data Center Relocation Take One! Joseph E. Ford, RCDD Craig A. Lowe, RCDD/OSP,LEED AP Robert G. Hall, MCSD Bala Consulting Engineers, Inc. Data Center Relocation Take One! Joseph E. Ford, RCDD Craig A. Lowe, RCDD/OSP,LEED AP Robert G. Hall, MCSD Bala Consulting Engineers, Inc. Target Enterprise One or more of the following: Data center over

More information

IT Asset disposition services

IT Asset disposition services IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by

More information

Identify and Protect Your Vital Records

Identify and Protect Your Vital Records Identify and Protect Your Vital Records INTRODUCTION The Federal Emergency Management Agency s Federal Preparedness Circular 65 states The protection and ready availability of electronic and hardcopy documents,

More information

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those

More information

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 sales@i2cinc.com www.i2cinc.com Table of

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

ARKANSAS TECH UNIVERSITY

ARKANSAS TECH UNIVERSITY ARKANSAS TECH UNIVERSITY INVENTORY CONTROL MANUAL SEPTEMBER 2005 PROPERTY MANAGEMENT OFFICE 204 BRYAN EXT. 6087 FAX 968-0227 INTRODUCTION The purpose of this Inventory Manual is to present a uniform method

More information

Media Disposition and Sanitation Procedure

Media Disposition and Sanitation Procedure Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...

More information

Viad Corp Records Management Policy

Viad Corp Records Management Policy Viad Corp Records Management Policy TABLE OF CONTENTS 1. PURPOSE... 2 Definitions... 3 2. PROCEDURES... 3 Management of Records.... 3 Retention in the Event of Dispute, Litigation, Subpoena, or Inquiry...

More information

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble

More information

Tenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08

Tenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08 - Basic Rancho Cordova Data Center Tenant Guide 2014-08 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 PURPOSE... 3 2 COMPUTER ROOM GUIDELINES... 4 2.1 GENERAL SITE GUIDELINES... 4 2.2 CABINET GUIDELINES...

More information

Solid-State Drives with Self-Encryption: Solidly Secure

Solid-State Drives with Self-Encryption: Solidly Secure Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on

More information

Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy

Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy Page 1 of 8 Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy EXECUTIVE SUMMARY Key Messages

More information

Waste, Not! Recovering Value from Unused and Surplus IT Assets

Waste, Not! Recovering Value from Unused and Surplus IT Assets Waste, Not! Recovering Value from Unused and Surplus IT Assets A CNE Direct Whitepaper Contents 2 Introduction 3 The Asset-Value Recovery Landscape 4 Five Steps to Maximizing Asset-Value Recovery 6 Conclusion

More information

Data Protection History, Evolution, Best Practices By Global Data Vault

Data Protection History, Evolution, Best Practices By Global Data Vault Data Protection History, Evolution, Best Practices By Global Data Vault Introduction As business data processing has evolved, so have the methods and best practices for data protection. This white paper

More information

ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS

ECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS TecLeo DATARECOVERYLAB H ELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 DATA RECOVERY Data Recovery & Data Destruction Price

More information

Polk County Wisconsin DESTRUCTION/DISPOSAL OF CLIENT HEALTH INFORMATION

Polk County Wisconsin DESTRUCTION/DISPOSAL OF CLIENT HEALTH INFORMATION Polk County Wisconsin DESTRUCTION/DISPOSAL OF CLIENT HEALTH INFORMATION Policy 601.I Effective Date: April 15, 2003 Current Revision Date: Policy It is the policy of Polk County to ensure the privacy and

More information

STANDARD 3-8 WORKING DAYS

STANDARD 3-8 WORKING DAYS TecLeo DATARECOVERYLAB HELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 Price List DATA RECOVERY Deloud (Pty) Ltd Data Recovery

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information