Building an ITAD Program:

Size: px
Start display at page:

Download "Building an ITAD Program:"

Transcription

1 Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies

2 Contents Introduction Understanding The Concepts of IT Asset Disposition Evaluating by Asking Questions Choosing an ITAD Provider Conclusion About The Author 2

3 Introduction Electronic waste (e-waste) is a problem for every company, big or small, as IT equipment often breaks, becomes outdated or obsolete, or is simply no longer needed. This old equipment has to go somewhere, and laws and common sense dictate that it should not simply be thrown in the trash. Electronics that end up in a landfill can be very harmful to the environment and human health by leaching toxins, heavy metals, and other dangerous substances into the air, ground, and water supply. Additionally, improperly thrown out electronics run a high risk of a data breach if they aren t properly wiped before being re-used or thrown out. Because of this, the disposal of e-waste is regulated by a number of different laws. Unfortunately, it s not always easy to keep up with these regulations. No matter what industry your company is in, you need to have a policy for dealing with old electronics responsibly an IT asset disposition program. There are many benefits to having clear, concrete, and effective policies in plans for disposing of old technology, including: Avoiding fines and cleanup fees from improper e-waste disposal Compliance with state and federal laws Reducing the need for harvesting new materials to make electronics Contributing to the preservation of the environment Helping to improve global human health Improving company image Avoiding a data breach Recovering value from used but working equipment (IT Asset Recovery) Salvaging value from precious metals in electronics So how do you set up a program for responsibly handling your company s e-waste? It s a multistep process that begins with understanding the concepts surrounding e-waste disposal. 3

4 Understanding the Concepts of IT Asset Disposition If you are trying to create a program for disposing of unwanted equipment, you will need to know what the basic concepts behind the process. Let s define some of the core concepts of IT asset disposition to help you plan your approach more effectively. What is ITAD? IT asset disposition (ITAD) is a phrase that may seem complicated, but in reality, ITAD just describes a process: the process of disposing of unwanted, broken, or obsolete equipment safely and securely, in an eco-friendly way that minimizes costs and losses and protects confidential data. Effective IT asset disposition varies for each individual company, and may include reselling or repurposing equipment, equipment donation, data destruction, and recycling. Many organizations also need solutions for packing up, removing, and transporting the equipment during this process. What is the Chain of Custody? Your company s electronics contain sensitive data, and while the amount of data may vary depending on your industry, you do not want any of this information getting into the hands of hackers and data thieves. This is why a secure chain of custody is important for ensuring data is tracked and destroyed properly. Chain of custody is the documentation ( paper trail ) showing who was in charge of the equipment at each stage of the process, ensuring accountability and proper disposition of the data and equipment. It is especially important during the transport process, which is when data is typically most vulnerable. Depending on the security needs of the data to be disposed of, secure transport may simply mean documentation and transport in sealed packaging, or anything up to an armored vehicle and even a bonded driver. How Does Data Security Relate to Retired IT Equipment? Whether it s proprietary company data, client financial information, or personal data, every company has sensitive information to protect information that is often located on office IT equipment. When preparing to retire this equipment, how do you keep that information safe? Simply deleting the files is not enough doing so only deletes the reference to the file so the computer can easily find it not the file itself. Anyone who knows what they re looking for can access the data, and a mere 1 gigabyte of data can contain a staggering amount of information, whether it s located on a server, computer, USB drive, CD, or even a printer. Most companies do not have the resources or knowledge to dispose of secure data effectively and in compliance with data security regulations, and must utilize the services of a responsible, certified IT recycling service to provide data destruction. Effective methods include nondestructive (software-based) wiping, which keeps the equipment in usable condition for resale, or destructive (physical using electromagnetic fields or shredding), which is used for equipment that will be recycled. This ensures that no unauthorized persons will have access to your sensitive data. 4

5 Understanding the Concepts of IT Asset Disposition (Cont.) What is Reverse Logistics? Once again, we come across a term that sounds more technical than it actually is. Reverse logistic refers to the supply chain in reverse: taking a product from its final destination of use, such as in an office, and taking it at least one step back in the supply chain process. This might mean: De-installation, packaging, and removal of equipment at an office, retail center, or school Transporting the equipment for refurbishment or recycling Destroying sensitive data Resale or donation of the equipment when possible Recycling broken and extremely outdated equipment and salvaging the components Reverse logistics essentially breaks down the ITAD process into a series of steps steps that may vary depending on the needs of the business that is disposing of the equipment. Reverse logistics help companies by reducing the costs associated with asset disposition and ensuring equipment is disposed of in a responsible, compliant way. What Certifications and Standards Exist? Technology moves into obsolescence at such a breakneck pace these days, that regulations have had to quickly adapt to keep up with the growing e-waste problem worldwide. In the United States, the EPA (Environmental Protection Agency) and other organizations enforce strict guidelines and best practices for recycling e-waste and minimize environmental impact, imposing stiff fines on businesses that do not dispose of old equipment properly. Data security is also subject to regulation, particularly in certain industries, which helps protect personal privacy. NIST are The National Institute of Standards and Technology guidelines, spelling out everything from the proper handling of secure data to safe disposal methods. The Health Insurance Portability and Accountability Act (HIPAA) is an industryspecific agreement that protects the privacy of patients data, and it s important for companies to be aware of any regulations like these that could affect the ITAD process. New regulations are emerging all the time, as the consequences of improper e-waste disposal become more apparent and continue to negatively affect global communities and the environment. Laws surrounding the export of e-waste, best practices for recycling, and data security are constantly evolving, and it can be difficult to keep up with the current regulations without the help of an expert recycler. 5

6 Evaluating by Asking Questions Now that you know the basics of IT asset disposition, it s time to start putting that knowledge to use in planning your company s strategy for retiring electronic equipment. Your first step is to evaluate your current processes, needs, and resources to help you develop a costefficient and compliant plan. Here are some questions to ask yourself: 1) Your Current Process a. What happens to old IT equipment once it s no longer needed? b. Is there any type of written policy currently in place for IT asset disposition? c. What is the company budget for asset disposition? e. What are the requirements for equipment to be retired and sold/recycled? 2) Your Equipment a. What type of equipment needsto be disposed of? b. How often is equipment replaced? c. How old is the equipment? d. Where is retired equipment stored? e. What condition is retired equipment in? 3) Scope a. How many locations/offices need to dispose of old equipment? b. Will international recycling be necessary? c. What is the volume of the retired equipment? d. How often will asset disposal be necessary? 4) Compliance a. What is the current process to destroy data on retired equipment? b. Which departments play a role in disposing of IT equipment? c. What are the current policies (if any) on data destruction d. Are there any environmental goals within the company? e. Are there are any specific standards in the industry (i.e healthcare) Once you and your team have explored these questions and come up with some answers, it s time to organize those answers into a document that can be refined, improved, and worked into your new ITAD program. For a more in-depth analysis of your company s current policies, request our 48 question survey that will help you refine your goals further. 6

7 Formulating a Plan Once you ve decided what your needs and goals are based on the answers you compile, it s time to determine how you are going to execute that plan. Most companies do not have the staff, time, expertise, or equipment to handle the process themselves, so finding a reputable IT asset disposition provider is typically the next step in the process. Choosing an ITAD Provider So why should you work with a certified ITAD provider? Simple. They know the industry best practices, regulations, and handle retired equipment on a daily basis. It is often more efficient and cost-effective to hire an expert than to take your employees away from their work to figure out the components of responsible IT asset disposition. In addition, a knowledgeable IT provider will know when it is a good idea to try and resell or repurpose equipment or simply recycle it. Peace of mind is one of the top benefits of working with a responsible IT recycler. But how do you choose a company to work with? To avoid hiring an irresponsible, non-compliant, or simply inexperienced company to partner with, consider these factors: 1) Certifications You may be surprised to learn that there are no laws that require electronics recyclers to be certified. The EPA does encourage certification, but working with an uncertified recycler is common and dangerous. There are two major certification types recyclers can seek in the United States: R2 (Responsible Recycling) and e-stewards. You should only consider working with an ITAD provider who maintains one of these certificates, as they denote compliance with regulations related to environmental and recycling practices, data security, and even worker safety. 2) Data Security Data breaches are common these days, and you don t want your company to be the next cautionary tale. Responsible ITAD providers are diligent about documenting the chain of custody for data every step of the way, providing secure transport, and using appropriate methods for destroying the data permanently, in accordance with industry standards such as NIST , DOD M(E) 3-Pass, and the DOD M(ECE) 7-pass. 3) Capabilities and Procedures Obviously, a qualified IT recycling company will need to have the proper equipment and facilities to process equipment in a compliant, environmentally-friendly way. However, aside from the basics, you may need to consider some other factors as well. If your company will need not only domestic recycling services, but international as well, you will need to choose an ITAD provider who has the ability to arrange for overseas disposition as well. If you anticipate selling some of your unwanted equipment, you should ensure that these products will be stored safely until they can be sold and shipped. 7

8 4) Rates Choosing an ITAD Provider (Cont.) Of course, cost is an issue when disposing of old computers, but you also need to take into account that choosing a cheap but uncertified IT recycler over a reputable company could end up costing a great deal more in fines and damage to reputation than the initial cost of the service. Think about value over overall costs, and go with a provider who will help you minimize your losses and protect you from violations. When evaluating costs of ITAD providers, take into account how they charge: is it per pound? Per piece? Per pallet? The pricing structure that will be most economical for your company s needs will depend on the type and condition of your equipment. 5) Accountability A quality ITAD provider will assume responsibility for your equipment, keeping documentation every step of the way and ensuring that both the data and hardware of your retired equipment go through a secure chain of custody on the way to their final destination. Responsible companies will assume liability for your e-waste, giving you peace of mind and the knowledge that your company s old IT equipment will not contribute to the growing crisis of e-waste in landfills. Conclusion: Make Your Policies and Stick With Them By now you ve probably figured out that IT asset disposition shouldn t be an afterthought, but a priority. Just like trash and normal recycling, IT asset disposition is just another cost of doing business. However, it s a cost that supports your company and your community in preserving the planet and keeping confidential information safe both of which your organization can be proud. Because of this, it s important to make your policies concrete and stick with them. Make a document you ll refer to again and again, and form a partnership with an ITAD provider you can trust you ll never again have to deal with a pile of old equipment sitting in storage. 8

9 About The Author Susannah Bruck is a freelance writer and editor from the Seattle area, who has worked on diverse projects ranging from blogs to plays. A long term writer for ICT Asset Recovery, she s been diving into topics ranging from electronics recycling to sustainability and data destruction. She frequently writes non-fiction and marketing pieces behind the scenes as a ghostwriter, but is also a fiction writer, with a short story appearing in Jeopardy magazine. She is always excited to tackle new subjects and projects, and isn t afraid to dive into research when it s (nearly always) necessary. A recovering English major, she currently resides in Cambridge, MA. For more than 20 years our team at ICT has mastered the industry's best practices in IT equipment disposal and asset recovery, in secure e-waste management and overstock solutions for corporations, government agencies and non-profit organizations worldwide. All practices are fully compliant with regulation and standards, providing our customers reliable, secure and transparent ITAD services.

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

Office Equipment Disposal Policy

Office Equipment Disposal Policy Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

Responsibly Retiring IT Assets, Medical or Laboratory Equipment

Responsibly Retiring IT Assets, Medical or Laboratory Equipment Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security

More information

Arrow IT Asset Disposition Trends Report

Arrow IT Asset Disposition Trends Report IT Asset Disposition ITAD Trends Report Arrow IT Asset Disposition Trends Report The data is in, and IT-industry practitioners have made it clear that concern over data security is the number one reason

More information

Value Recovery Enterprise IT Asset Disposition

Value Recovery Enterprise IT Asset Disposition Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.

More information

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder

More information

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6 GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE 899-ENVIRONMENTAL SERVICES AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms and conditions, up-to-date

More information

HARD DRIVE REMARKETING

HARD DRIVE REMARKETING A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS

More information

Value Recovery. arrow.com

Value Recovery. arrow.com Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,

More information

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:

More information

We are the solution. erecycling. We have the solution. made easy.

We are the solution. erecycling. We have the solution. made easy. We have the solution. erecycling made easy. Nowadays, business and technology go hand in hand. But what happens to those old or unwanted electronics? The answer, more often than not, is: nothing. We stack

More information

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those

More information

Understanding Data Destruction and How to Properly Protect Your Business

Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business I. Abstract This document is designed to provide a practical

More information

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc.

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc. DCAG Data Center Assistance Group, Inc. Revision Date: 5/20/2013 Asset Management Redeployment And Termination Services A Service Offering From Data Center Assistance Group, Inc. (DCAG) Prepared by: Thomas

More information

E-waste Challenges & Solutions

E-waste Challenges & Solutions E-waste Challenges & Solutions December 2013 SIMS at a glance Global 6 continents, 46 countries Over 500,000 tonnes processed annually #11 on the list of Global 100 Most Sustainable Companies Quality ISO

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

Preventing Final Disposition Data Breaches

Preventing Final Disposition Data Breaches Preventing Final Disposition Data Breaches How to Evaluate an ITAD Vendor for Your Organization By: Jim Kegley Founder, President and CEO, U.S. Micro Corporation The IT asset disposition (ITAD) industry

More information

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number: State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

Value Recovery. arrow.com

Value Recovery. arrow.com Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like

More information

Chapter 15 Managing Reverse Flows in the Supply Chain

Chapter 15 Managing Reverse Flows in the Supply Chain Chapter 15 Managing Reverse Flows in the Supply Chain Traditionally, reverse flows were not viewed as adding value for customers or revenue for the manufacturer or producer. Information and financials

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk

More information

Electronic Recycling 101 Class 59 of the Metro Area Master Recycler Program April 22, 2015 www.universalrecyclers.com

Electronic Recycling 101 Class 59 of the Metro Area Master Recycler Program April 22, 2015 www.universalrecyclers.com Electronic Recycling 101 Class 59 of the Metro Area Master Recycler Program April 22, 2015 www.universalrecyclers.com e-waste asset recovery u-waste commodities State of Oregon Recycling 101 In the late

More information

IT asset disposal for organisations

IT asset disposal for organisations ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk

More information

Recycling Old Mobile Phones

Recycling Old Mobile Phones Schools Mobile Phone Recycling Program Lesson Background This lesson plan has been designed using the Australia Curriculum to engage students from Middle and Upper Primary (Years 3 to 6), with extension

More information

Recycling Electronics to Create Local Jobs for People with disabilities

Recycling Electronics to Create Local Jobs for People with disabilities A 501c3 Social Enterprise COLORADO SPRINGS ENVIRONMENTAL HEALTH & SAFETY REPORT Recycling Electronics to Create Local Jobs for People with disabilities www.bluestarrecyclers.com 2016 Blue Star Recyclers

More information

Risks of Electronic Dumping in Recycling

Risks of Electronic Dumping in Recycling The Federal Electronics Challenge Presents Potential Liabilities of Electronic Waste 1 Agenda Introduction to two environmental laws Liability laws for information Two examples of electronic waste dumping

More information

CREATIVE SOLUTIONS FOR REVERSE LOGISTICS NON-PROFIT ORGANIZATIONS AND RETURNS MANAGEMENT UTILIZING

CREATIVE SOLUTIONS FOR REVERSE LOGISTICS NON-PROFIT ORGANIZATIONS AND RETURNS MANAGEMENT UTILIZING CREATIVE SOLUTIONS FOR REVERSE LOGISTICS AND RETURNS MANAGEMENT UTILIZING NON-PROFIT ORGANIZATIONS INCREASE COMPANY MARGINS WHILE REDUCING LANDFILL TONNAGE By Gary Schuler Founder/CEO of Gleaning the Fields,

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization

More information

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and

More information

IT Asset disposition services

IT Asset disposition services IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

It s easy to jump start your charity s income!

It s easy to jump start your charity s income! It s easy to jump start your charity s income! Become a charity partner and raise money for your charity We collect from anywhere in the UK! Car Donation Network is a not-for-profit service, operated by

More information

Waste, Not! Recovering Value from Unused and Surplus IT Assets

Waste, Not! Recovering Value from Unused and Surplus IT Assets Waste, Not! Recovering Value from Unused and Surplus IT Assets A CNE Direct Whitepaper Contents 2 Introduction 3 The Asset-Value Recovery Landscape 4 Five Steps to Maximizing Asset-Value Recovery 6 Conclusion

More information

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment

More information

الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات - البحرين الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات Agenda The problem Traditional Methods Case Study Recommendation The problem What

More information

THE TRIPLE BOTTOM LINE HELPING PEOPLE. AND THE ENVIRONMENT.

THE TRIPLE BOTTOM LINE HELPING PEOPLE. AND THE ENVIRONMENT. THE TRIPLE BOTTOM LINE Goodwill of Orange County People. Planet. Profit. OUR ROOTS ARE IN RECYCLING Goodwill s business model has relied on the re-use and recycle process for over 100 years. New Technology

More information

Electronic Waste: Managing the Environmental and Regulatory Challenges

Electronic Waste: Managing the Environmental and Regulatory Challenges Electronic Waste: Managing the Environmental and Regulatory Challenges Jasmine Nasiri, Steven Piatkowski and Frank Westfall Business Descriptor Electronic Waste: Managing the Environmental and Regulatory

More information

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 I. POLICY STATEMENT Increasing amounts of electronic data are being transmitted and stored on computer systems and electronic media by virtually

More information

Secure Data Destruction

Secure Data Destruction Secure Data Destruction Secure Data Elimination (Degauss) Onsite Magnetic Degaussing service eliminates data from Tape and Magnetic Hard Disk media Portable machines allow for degaussing to be competed

More information

Best Practices for Responsible Disposal of Tape Media

Best Practices for Responsible Disposal of Tape Media Best Practices for Responsible Disposal of Tape Media The Environmental and Economic Benefits of Recycling vs. Destruction White Paper The Data Media Source San Jose, CA Data Media Source 2006 For use

More information

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information

More information

Sustainability: 5 Simple Ways Businesses Can Save at Work Tips from the Logistics Experts at UPS

Sustainability: 5 Simple Ways Businesses Can Save at Work Tips from the Logistics Experts at UPS Sustainability: 5 Simple Ways Businesses Can Save at Work Tips from the Logistics Experts at UPS "Employees who say they have the opportunity to make a direct social and environmental impact through their

More information

Department of Health and Human Services Policy ADMN 004, Attachment A

Department of Health and Human Services Policy ADMN 004, Attachment A WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc. Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT PROGRAM. Revised January 15, 2014

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT PROGRAM. Revised January 15, 2014 SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT PROGRAM Revised January 15, 2014 Page 1 Introduction In compliance with the Code of Virginia, Section 42.1085, Southwest Virginia Community College

More information

HIPAA, PHI and Email. How to Ensure your Email and Other ephi are HIPAA Compliant. www.fusemail.com

HIPAA, PHI and Email. How to Ensure your Email and Other ephi are HIPAA Compliant. www.fusemail.com How to Ensure your Email and Other ephi are HIPAA Compliant How to Ensure Your Email and Other ephi Are HIPAA Compliant Do you know if the patient appointments your staff makes by email are compliant with

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Have you ever accessed

Have you ever accessed HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

http://www.guardianedge.com/

http://www.guardianedge.com/ Full Disk Encryption & IT Asset Disposition: Protecting Data During the PC Disposal Process A GuardianEdge White Paper 4/7/2006 The information contained in this document represents the current view of

More information

HP Standard 007-2 Vendor Requirements for Hardware Recycling

HP Standard 007-2 Vendor Requirements for Hardware Recycling HP Standard 007-2 Vendor Requirements for Hardware Recycling Responsible Group Document Identifier Revision and Date Last Re-validation date Abstract Applicability Status Global Social and Environmental

More information

Reverse Logistics From Black Hole to Untapped Revenue Stream. A White Paper Prepared by Ryder Supply Chain Solutions

Reverse Logistics From Black Hole to Untapped Revenue Stream. A White Paper Prepared by Ryder Supply Chain Solutions Reverse Logistics From Black Hole to Untapped Revenue Stream A White Paper Prepared by Ryder Supply Chain Solutions 2010 Ryder System, Inc. All rights reserved. In a recent survey of over 160 companies

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

Challenges and Solutions for Effective SSD Data Erasure

Challenges and Solutions for Effective SSD Data Erasure Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina

PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest

More information

Data Security for ITAD, Corporate & Consumer Electronics

Data Security for ITAD, Corporate & Consumer Electronics Up cy cle \ ŭp-sỳ-kil\ v (ca. 2011) 1. the action of giving devices a second life 2. the mission to keep electronics out of landfills 3. to fund important causes without writing a check 4. to nearly double

More information

Asset recovery Balancing risk and opportunity

Asset recovery Balancing risk and opportunity Asset recovery Balancing risk and opportunity Table of contents Executive summary...2 Risks and rewards in the asset recovery process...2 Opportunities in asset recovery...2 The challenge of the IT lifecycle...3

More information

Dell Service Description

Dell Service Description Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service

More information

GENERAL FIXED ASSETS Fixed Assets Administration

GENERAL FIXED ASSETS Fixed Assets Administration GENERAL FIXED ASSETS Fixed Assets Administration Colorado Revised Statutes (CRS) 22-45-101(2), 22-45-112, 29-1-506(1) and generally accepted accounting principles (GAAP) require that certain records be

More information

CHAPTER 339D ELECTRONIC WASTE AND TELEVISION RECYCLING AND RECOVERY ACT

CHAPTER 339D ELECTRONIC WASTE AND TELEVISION RECYCLING AND RECOVERY ACT Part I. Definitions Section 339D-1 Definitions CHAPTER 339D ELECTRONIC WASTE AND TELEVISION RECYCLING AND RECOVERY ACT Part II. Electronic Waste Recycling 339D-2 Scope of products 339D-3 Sales prohibition

More information

HIPAA Training Part III. Health Insurance Portability and Accountability Act

HIPAA Training Part III. Health Insurance Portability and Accountability Act HIPAA Training Part III Health Insurance Portability and Accountability Act POLICIES & PROCEDURES Goals Learn simple ways to protect information. Learn how to continually give training. Learn how to continually

More information

InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc.

InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc. InfoGard Healthcare Services 10 Steps To Protect My Covered Entity From Breach Your Presenters Alan Martin Account Manger Marvin Byrd Security Engineer Test and Certification Laboratory Healthcare Payment

More information

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability

More information

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits HIPAA Security Rule & Live Hack Tod Ferran, CISSP, QSA Intro Tod Ferran, CISSP, QSA 25 years working with IT and physical security 2 years PCI and HIPAA security consulting, performing entity compliance

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

McGill University IT Asset Management Regulation

McGill University IT Asset Management Regulation Publication Date May 8, 2015 Revision V 1.1 McGill University IT Asset Management Regulation OVERVIEW McGill University seeks to provide its community with the necessary IT equipment, infrastructures and

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010 New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

Hard Drive Retention Offering for Xerox Products in the United States

Hard Drive Retention Offering for Xerox Products in the United States Hard Drive Retention Offering for Xerox Products in the United States November 19, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards

More information

MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2

MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2 MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...

More information

T: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple.

T: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple. Records Management Made Simple. Document Storage Cyclone offers customers a complete end -to-end service including box collection, bar code tracking, document retrieval, delivery, and status reporting.

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

M E M O R A N D U M. Definitions

M E M O R A N D U M. Definitions M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice

More information

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY Statement of Intent This policy establishes the general responsibilities for management, retention, and disposition of SOUTHWEST VIRGINIA

More information

Chapter 15: Computer Security and Privacy

Chapter 15: Computer Security and Privacy Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some

More information

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Compliance and the Protection of Patient Health Information HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance

More information

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational

More information

Sustainability. Your Partner In Green IT & Bottom Line

Sustainability. Your Partner In Green IT & Bottom Line Electronic Greenscape Waste Eco Management & Sustainability Your Partner In Green IT & Bottom Line Industry Background Greenscape Eco Management was incepted in late 2007 with an aim to formulate new value

More information

Records management. Don t just store your information, manage it. Save space Improve efficiency Safeguard your information Digitise your records

Records management. Don t just store your information, manage it. Save space Improve efficiency Safeguard your information Digitise your records Records management Don t just store your information, manage it 444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 Save space Improve efficiency Safeguard your information

More information

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise Protection as a Priority TM Keep Your Data Secure in the Cloud to ensure your online data is protected from compromise Abstract The headlines have been dominated lately with massive data breaches exposing

More information

Contents. Best Practices Guide. 3 Physical Records: The Ongoing Compliance Challenge

Contents. Best Practices Guide. 3 Physical Records: The Ongoing Compliance Challenge Best Practices Guide HIPAA Primer series HEALTHCARE Iron Mountain Records Management Services HIPAA-Compliant Solutions that keep you compliant Contents 3 Physical Records: The Ongoing Compliance Challenge

More information

HIPAA Audit Risk Assessment - Risk Factors

HIPAA Audit Risk Assessment - Risk Factors I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your

More information