The Risk of Letting Obsolete I.T. Equipment Sit

electronics for recycling 12
Mar

 

You program a brand-new computer for an employee, unhook the old equipment, set up the new, and now you’re left with an outdated computer. It sits on your desk for a while until you build up the courage to enter the closet of doom: the place where all your company’s old I.T. equipment goes after it has completed its tour of duty.

As the key master to the closet, many may not realize the amount of responsibility that lies in the palm of your hands: the contents of the old equipment still hold valuable data, company financials, trade secrets, confidential employee information, and proprietary customer details.

And, each time you lock the door behind you, the same questions run through your mind:

  • What happens if someone gets ahold of this data?
  • How do I properly get rid of it?
  • Is there a secure way to destroy data?
  • Is my company at risk?
  • Is my job at risk if I improperly destroy the data?
  • Is this equipment worth something?

Out with the Old

We get it. As planned upgrades are implemented, your business may end up with hundreds of pieces of equipment. Closets can fill with old or obsolete equipment after just a few technology refreshes.

Thinking bigger picture, statistics indicate that 75 percent of all obsolete computing equipment is currently in storage. That represents a lot of wasted space. More importantly it represents a lot of technology that could end up in a landfill versus being properly recycled or remarketed.

Not everyone realizes that improper disposal of electronics (e-waste) is illegal in many states. Over the years, many big corporations such as Target, AT&T, and others have gotten big fines for wrongly dumping hazardous waste. And, we’re talking about big fines.

Electronics such as computers contain chemicals and materials that are hazardous to the environment. Electronic recycling (e-recycling) not only helps the environment, but it creates energy savings, too.

Securing Your Data

Without a reliable and trusted partner with whom to recycle electronics, the responsibility of securely disposing and destroying data often falls on I.T. That’s not only tedious work, but a massive security obligation that falls on the shoulders of I.T. personnel. Is the data you wiped truly (and securely) destroyed?

When you recycle electronics, what happens to your sensitive data? Just clicking “delete” or reformatting a hard drive isn’t enough. The only ways to be certain that data is destroyed are by degaussing (magnetic disruption that makes the drive useless) or shredding the drive.

Think hard about the impact of your data finding its way into the wrong hands. If you don’t have resources in your company that know how to properly destroy data, find resources that do. Look for a partner that’s able to clearly able to define their recycling and data destruction process.

At Sadoff Electronics Recycling and Data Destruction, we have two levels of data destruction confirmation services from which to choose, follow a proven process, and, most importantly, will contractually own liability of the data destruction to provide you true peace of mind.

  • Collection: E-recycle items are picked up, secure data destruction collection containers are provided, items are dropped off at one of our recycling centers, or other collection options are discussed.
  • Processing: Inventory is secured, and drive destruction takes place. This can be performed at your location or at our ISO-compliant facility.
    • Drive destruction: Both the magnetic and solid-state drives are destroyed – 100% effective.
    • Drive purging: Magnetic disruption from a degausser totals the drive – 100% effective.
  • Certification: Upon request, we provide a certificate of destruction so that you’re certain your data is destroyed.

 

Find Peace of Mind

We take security and the environment seriously. If the idea of an insightful and trusted consultant gives you peace of mind, contact us by filling out our quick e-recycling form to get started. We always adhere to NAID requirements and are backed by insurance to help create total security for you, your business, and its customers.

 

chad hayes headshotChad Hayes joined Sadoff Iron and Metal in 2015, where he oversees and leads the strategic planning and implementation of I.T. He combines 20 years of I.T and business leadership experience with a passion for data security, making him the perfect choice to establish, build, and lead the Sadoff E-Recycling & Data Destruction Company, a company of Sadoff Iron and Metal.

 

Tags: , , ,

Categorized in: