MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER
|
|
|
- Linda Dawson
- 10 years ago
- Views:
Transcription
1 MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER
2 EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder than ever to keep their employees equipped with the newest hardware and devices. This situation leads to a nearconstant upgrade cycle and, perhaps even more troubling, forces companies to contend with a large surplus of old and outdated equipment. Commonly referred to as electronic waste (e-waste), these unneeded laptops, servers, smartphones, storage media and other items illustrate the importance of a comprehensive media and IT asset disposition programme. However, to be effective, these programmes must consider far more than the simple disposal of unwanted IT equipment. Rather, they should include two critical factors: data security and environmental sustainability. It is imperative to sanitise hard drives and other electronic media prior to disposal. Businesses must be completely certain this data is not susceptible to theft or accidental disclosure. And in order to comply with government regulations and corporate sustainability initiatives, final disposition must be performed with the environment in mind. A lapse in either area could lead to fines, penalties and damage to the organisation s reputation. It is for these reasons that companies turn to external providers to help them dispose of ageing, obsolete or decommissioned IT equipment in a secure, environmentally conscious way. Use this Buyer s Guide and accompanying checklist to assess your requirements and evaluate your current and potential new suppliers through a series of questions covering the three core aspects of a comprehensive media and IT asset disposition programme:» Media and hard drive destruction» E-waste recycling» IT asset remarketing ironmountain.co.uk 2
3 23 percent of electric and electronic waste collected from Council sites in the UK was still in good working order or required only a small amount of repair.. 3
4 E-WASTE RECYCLING The best media and IT asset disposition programmes should go beyond the simple destruction of anything that is no longer needed. Crucially, they must also address, and go to great lengths to mitigate, the impact of the destruction process on the environment. Driven by national government regulations and European initiatives, organisations are sharpening their focus around how they manage e-waste. They realise that truly sustainable disposal practises play an increasingly critical role in their ability to support environmental stewardship and uphold compliance obligations. Given the importance of handling e-waste in a responsible manner, it is imperative to work with media and IT asset disposition suppliers that make the environment a cornerstone of their offerings. To that end, be sure to ask potential providers the following about their environmental practises:» Will you destroy the data on my assets prior to recycling them?» Can you de-manufacture my e-waste into its component parts and recycle each piece in the proper manner?» Are you able to confirm for me that my e-waste will never be incenerated or sent to a landfill?» Do the same security and chain-of-custody measures you employ during the media and IT asset destruction process extend to e-waste recycling?» Does your recycling programme comply with WEEE standards? The volume of e-waste is expected to grow by 33% by At that point, it will weigh the equivalent of eight of the great Egyptian pyramids. 2 2 The Guardian. Toxic e-waste dumped in poor nations, says United Nations. December 14, ironmountain.co.uk 4
5 IT ASSET REMARKETING Retiring an IT asset does not necessarily mean it is worthless. In fact, what one organisation deems unneeded may be desirable to another. Given this fact, businesses should not be spending to have decommissioned equipment removed when they could be reclaiming its remaining value instead. However, simply selling an unwanted laptop or server to the highest bidder is a risky proposition. Since these assets likely include confidential data or other proprietary information, organisations must make sure they are wiped clean and restored to factory-default status before being resold. To ensure you receive the best value for your redundant IT equipment without risking an inadvertent disclosure of information ask potential suppliers the following:» Can you assign a fair market value to my unneeded IT assets?» Will you erase data-bearing devices, and remove any other identifying information, prior to remarketing?» Do your services cover shut down/power down, de-installation, removal and processing?» Will you destroy or recycle any hardware with no market value?» Do the same security and chain-of-custody measures utilised during destruction and e-waste recycling apply to the remarketing process? The UK is sixth worldwide in the total amount of e-waste the country generate, with some 1.5 megatons barely 100,000 tons less than India which has 20 times the population. 3, ironmountain.co.uk
6 » do you serve?»» How many lorries and processing centres do you currently have in operation in the UK?»» 6
7 WE RE HERE TO HELP With e-waste growing and data security concerns remaining top of mind, an approach to media and IT asset disposition that is simply good enough may leave gaps that create the potential for breaches and accidental disclosures. Iron Mountain is committed to helping you do better through an optimal, consistent and best-practise approach to destroying, recycling and remarketing end-of-life IT assets. Comprehensive Approach, Considerable Benefits When you choose Iron Mountain as your media and IT asset disposition supplier, you ll be able to:» Leverage proven methodologies that ensure reliability and consistency from collection through final destruction» Gain the peace of mind that your critical information won t be lost, stolen or jeopardised in any way backed by auditable processes and strict security practises» Dispose of potentially hazardous e-waste in a compliant, environmentally responsible manner» Reduce expenses by reclaiming the remaining value of your decommissioned assets ironmountain.co.uk
8 Solution Criteria by Category Current Solution Option 1 Option 2 Iron Mountain Media and Hard Drive Destruction destroyed by screened and fully wary of off-site assets at my facilitiy? assets were securely destroyed? E-waste Recycling e- Are you able to confirm my e-waste will never be incenerated or sent to a landfill? WEEE standards? 8
9 Solution Criteria by Category Current Solution Option 1 Option 2 Iron Mountain IT Asset Remarketing remarketing? D completely erase removal and processing? hardware with no market value? Do the same security and recycling apply to the remarketing process? Supplier Profile how many customers do you serve? logistics and processing centres? Do your services leverage proprietary and an ongoing commitment to enhancing your services to account changing regulations regarding how 9
10 ABOUT IRON MOUNTAIN Iron Mountain Incorporated (NYSE: IRM) provides information management services that help organisations lower the costs, risks and inefficiencies of managing their physical and digital data. Founded in 1951, Iron Mountain manages billions of information assets, including backup and archival data, electronic records, document imaging, business records, secure shredding and more, for organisations around the world. Visit the company website at for more information. October 2015 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the UK and other countries. All other trademarks and registered trademarks are property of their respective owners ironmountain.co.uk
A Guide to Minimizing the Risk of IT Asset Disposition
A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its
Secure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
Building an ITAD Program:
Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your
secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding
secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and
Value Recovery Enterprise IT Asset Disposition
Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.
IT asset disposal for organisations
ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk
Information retention and disposal guide. Date: 31 October 2014 Version: 2.0
Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case
SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk
SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING DATA SCANNING Data is the lifeblood of many businesses and organisations, access to which is imperative to its productivity and its success. Organising
Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia
Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:
Best Practices for Responsible Disposal of Tape Media
Best Practices for Responsible Disposal of Tape Media The Environmental and Economic Benefits of Recycling vs. Destruction White Paper The Data Media Source San Jose, CA Data Media Source 2006 For use
Frequently Asked Questions
FAQ INTELLECTUAL PROPERTY MANAGEMENT Escrow Verification Services Frequently Asked Questions overview The value of an escrow arrangement is heavily dependent on the quality of the deposit materials a fact
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: [email protected]
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our
CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE
IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals
That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.
Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20
Shredding. Security. Recycling
Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE
Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery
IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those
HARD DRIVE REMARKETING
A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
POLICY AND PROCEDURE FOR THE DISPOSAL OF AN ASSET
POLICY AND PROCEDURE FOR THE DISPOSAL OF AN ASSET POLICIES Scope Assets are the property of the University and it is therefore essential that the act of disposing of an asset is in accordance with University
Waste, Not! Recovering Value from Unused and Surplus IT Assets
Waste, Not! Recovering Value from Unused and Surplus IT Assets A CNE Direct Whitepaper Contents 2 Introduction 3 The Asset-Value Recovery Landscape 4 Five Steps to Maximizing Asset-Value Recovery 6 Conclusion
Grasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Value Recovery. arrow.com
Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,
Office Equipment Disposal Policy
Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post
document destruction Our passion.
document destruction Your office. Our passion. safeguard Our secure destruction service meets all the necessary compliances and helps to support ISO 9001, ISO 14001 and CSR objectives as well as improving
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate
COMPUTER SETUP GUIDE LAPTOP
COMPUTER SETUP GUIDE LAPTOP HARDWARE SET UP Please allow seven business days for all computer equipment to arrive. In some cases, components may be shipped in multiple boxes and may arrive on different
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
to EMR transition Contents
Best Practices Guide HIPAA Primer series HEALTHCARE Iron Mountain Document Conversion Services The HIPAA-compliant approach to EMR transition Contents 3 EMR Transition: The Growing Importance of Document
How To Manage A University Computer System
PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Teamcenter s Records Management Application
Teamcenter s Records Management Application White Paper Providing a framework for regulatory compliance Teamcenter software s Records Management Application enables enterprises to comply with a wide range
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
Information Management Advice 18 - Managing records in business systems: Overview
Information Management Advice 18 - Managing records in business systems: Overview Introduction The purpose of this Advice is to assist agencies to identify and manage State records in business systems,
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
IT Asset disposition services
IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by
Samsung WEEE Management Policy (US and Canada)
Samsung WEEE Management Policy (US and Canada) 1. Purpose These requirements aim to minimize environmental impacts caused by all Electronic Waste generated by Samsung's US and Canadian operations and programs,
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Arrow IT Asset Disposition Trends Report
IT Asset Disposition ITAD Trends Report Arrow IT Asset Disposition Trends Report The data is in, and IT-industry practitioners have made it clear that concern over data security is the number one reason
How To Save Money On Health Care Through A Computer System
Save time, save money, save lives BETTER DOCUMENT AND DATA MANAGEMENT FOR THE NHS At a time when funds are scarce, investment in new and improved data management systems can actually create significant
What s your next move?
What s your next move? If you are thinking of moving premises let us know as soon as possible. Whether you are moving altogether, opening up additional premises or refurbishing existing premises, a move
Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents
DOCUMENT MANAGEMENT SOLUTIONS Speed the transition to an electronic environment Comprehensive, Integrated Management of Physical and Electronic Documents Store, protect and control your essential business
Our School Backup A trusted, safe and secure remote backup solution for the UK education sector.
Our School Backup A trusted, safe and secure remote backup solution for the UK education sector. A trusted, safe and secure remote data backup solution for schools. Our ICT presents Our School Backup,
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
Technology Asset Inventory Policies and Procedures
Technology Asset Inventory Policies and Procedures Table of Contents Technology Asset Accounting... 2 Introduction... 2 Technology Asset Tracking... 3 Roles and Responsibilities... 3 Technology Asset Acquisition...
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
ENVIRONMENTAL POLICY STATEMENT
ENVIRONMENTAL POLICY STATEMENT COMPANY NAME ADDRESS COMPANY ACTIVITIES TRACKYOU LTD BLACKWOOD BUSINESS PARK, ASH ROAD SOUTH, WREXHAM, LL13 9UG Telematics Provider of Vehicle Tracking Units to Local Authorities
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
POLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS
POLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS (As approved by the board at its meeting held on 27 th October 2015) 1. Introduction Securities and Exchange Board of India (SEBI) has introduced SEBI (Listing
Software Escrow Service Workflow. Comprehensive and Trusted Software Escrow Services from Iron Mountain.
escrow Software Escrow Service Workflow Comprehensive and Trusted Software Escrow Services from Iron Mountain. Get it right every time. Mission-critical technology is everywhere, and you depend on it every
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS
Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Informatica Application Retirement
Informatica Application Retirement Executive Insights for the Healthcare Industry CIO WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential Information
The nation s largest privately held records and information management company
The nation s largest privately held records and information management company Our mission is clear: to lead the records and information management industry by providing our clients the very best service.
Guidance on Personal Data Erasure and Anonymisation 1
Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data
5 Essential Benefits of Hybrid Cloud Backup
5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY
IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY Purpose The purpose of this policy is to provide the IFRS Foundation with a framework to govern management decisions on whether particular documents
