We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byDeborah Violet Hudson
Modified about 1 year ago
Data Destruction and the Impact on Recycling Albert Hacker – Business Solutions Advisor (615)
Innovation in Data Theft Ransomware
Innovation in Data Theft Mobile Malware
Low Tech Theft
Printers Copiers Fax Machines Low Tech Theft
How Should I Manage My Data on End of Life Assets?
Electronics Recycling Industry
What to Look for – Certifications
Three Options Available 1 Clear: Data Overwritten Purge: All Data Destroyed (including firmware) Destroy: Physical Destruction of Media 23
Three Options Available 1 Clear: Data Overwritten
Clearing Replace written data with random data
Why three passes?
Three Options Available Purge: All Data Destroyed (including firmware) 2
Purge Usually destroys data and drive as key firmware is destroyed
Three Options Available Destroy: Physical Destruction of Media 3
ClearPurgeShred Hard DrivesOverwriteDegaussSeparate Cell Phones / Tablets / Flash Drives Delete Remove battery and separate Storage Media
The Three R’s of Recycling
Reduce Carbon Footprint
SRS Global Operations
Recycle Locally - Avoid Export Whole ? ? ?
Reuse Reuse/Resell can Return Value $ Large Energy Savings
Recyclin g 1 Million Laptops Recycle Equals Energy Used by 3,657 U.S. Homes
Q&A Albert Hacker – Business Solutions Advisor
Data Decommissioning: Overwriting, Shredding, Degaussing, and Beyond Monday, June 02, 2014 ISSA New Jersey Chapter Parsippany, NY.
Rodney Buike IT Pro Advisor, Microsoft Canada
Delivering value for the nation through outstanding commercial capability and quality customer service 1 Closed Loop Overview Closed Loop is a cross-Government.
How to Buy…. What do I want to buy? What do I want?… A desktop or a mobile computer (notebook or tablet) What is the purpose? Where am I going to use.
Fundamentals of an Investor Pitch The material in this presentation is that of the presenter and does not necessarily represent the opinions of Deloitte.
TM ① ePOD is powerful and easy to use; simply plug in for savings. ② ePOD helps increase the efficiency of appliances you use everyday such as HVAC, refrigerators,
Who We Are… Synthetic Yarn Producer Producer and processor of polyester & nylon textured yarns Founded in 1971 New York Stock Exchange: UFI Sales Revenue.
Retirement Solution Overview. © 2007 TechTurn Page 2 85 million Old PCs in Circulation -60 million PCs retired in the US annually Technology Lifecycle.
11 Branded Replacement Cartridge Program Presented By.
Sustainable IT Reducing Carbon Footprint and Materials Waste in the IT Environment Lecture 4 Sample Presentation Developed by: Sponsored by:
Cloud Computing How it can help you!. Just what is a Clustered Cloud Server? A clustered cloud server is a group of servers that are connected and that.
Copyright © 2011 Levi, Ray & Shoup, Inc. All Rights Reserved Introducing LRS Nigel Whitmore & Taras Ciuriak.
OVERVIEW Virtualization Defined Server Virtualization Current Network Diagram Virtualized Diagram Cost of not Virtualizing Benefits and Cost Savings of.
© 2008 IBM Corporation IBM Retail Store Solutions This presentation is intended for the education of IBM and Business Partner personnel. It should not.
Intro to Computers Technology Applications Posted by Decatur Middle School with permission by North Ridge Middle School - BISD Use the information in this.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Information Security User Policy Training Business Applications Department October 2009.
Sustainable IT Reducing Carbon Footprint and Materials Waste in the IT Environment Lecture 5 Sample Presentation Developed by: Sponsored by:
Edwin J. Polverino, D.O.. Home Auto Life Disability Health Malpractice.
P2 – DESCRIBE THE PURPOSE OF DIFFERENT TYPES OF COMPUTER SYSTEMS.
Some Alarming Electronic Recycling Statistics Presented by TEcoArt, LLC Use Space bar to advance slide.
Records Management at Queen’s University By Shan Jin November 2008.
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Reduce – ReUse - Recycle1 Green Energy Masters Joins Forces With QSGI, Inc.
Key Jargon: communication, TCO, centralisation, sharing, networks, standalone, security, control, standardisation Learning Goals: All will: describe some.
Ontario Environment Network, Labour Caucus OVERVIEW OF EXTENDED PRODUCER RESPONSIBILITY Jim Mahon Ontario Environment Network Detoxifying the Economy &
1 Data Handling at Purdue. Section I The Importance of Data Security (slides 4 – 5) Laws and Policies (Slides 7 – 18) - Federal - State - Purdue Section.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Awareness - Protecting our Data Personally Identifiable Information (PII)
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2016 SlidePlayer.com Inc. All rights reserved.