Data Destruction and the Impact on Recycling. With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Data Destruction and the Impact on Recycling. With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Atlas Copco Group Q4 Results February 2, Q4 - highlights  Order growth continued  Record operating profit –All business areas above 20% operating.
Why it matters what you do with old electronics © R2 Solutions.
Electronics Stewardship Tim Hilton
Data Destruction and The Impact on Recycling. Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per.
Data Destruction and the Impact on Recycling Bill Vasquez, General Manager West Region.
Safe, Secure, Economic, & Environmentally Sound Electronics Recycling Joe Clayton Synergy Recycling, LLC
United Electronic Recycling United Electronic Recycling.
Understanding secure data erasure and end-of-lifecycle IT asset management.
Aspects of Electronic Waste Disposal Lawrence P. Hayes P.E. E-Waste Experts, Inc.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Data Destruction and the Impact on Recycling Albert Hacker – Business Solutions Advisor (615)
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security Controls – What Works
Principles and Learning Objectives
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Data Elimination 101. What Does Degauss Mean? Computer hard drives use magnetic fields to store data on special discs called platters. Degaussing is the.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
Data Destruction and the Impact on Recycling. Innovation in Data Theft Ransomware.
United Electronic Recycling United Electronic Recycling.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Technological Security Implementation and Privacy Protection.
KEEPING LABOR AND OVERHEAD COSTS DOWN Controlling Labor and Overhead Costs as a Long Term Strategy.
By Mara and Claire. What is E-waste? E-waste (electronic waste) comes in many forms and is generated by business’s growing electronic needs. E-waste embraces.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
Lauren Olin Eastern Regional Mgr. Public Sector Government Solutions cell phone
Chapter 2 Hardware. Learning Objectives Upon successful completion of this chapter, you will be able to: describe information systems hardware; identify.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
More Sustainable E-waste Management © SERI – Home of the R2 Standard 8/6/15.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Data Destruction and the Impact on Recycling Sean Magann – Vice President of Sales and Marketing (510)
Society & Computers PowerPoint
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
UNICOR Federal Prison Industries, Inc. UNICOR Federal Prison Industries, Inc. “Seeking a More Excellent Way” To Make a Greener Difference!
Why Collect and Recycle Electronics -Clive Hess. Benefits of Recycling Establishes more jobs, economic development, and tax revenue Makes less impact.
Sustainability in the Supply Chain 5 © 2014 Pearson Education, Inc. SUPPLEMENT.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Protecting PHI & PII 12/30/2017 6:45 AM
Data Destruction Standards & Compliance
E&O Risk Management: Meeting the Challenge of Change
Customized Solutions to your needs
Virtual Private Networks (VPN)
About TCIL As a prime telecom engineering and consultancy firm, we at TCIL also offer integrated, end-to-end services for responsible disposal and recycling.
Securing Information Systems
My First Template.
At Greentek Solutions, we provide customized solutions
Presentation transcript:

Data Destruction and the Impact on Recycling

With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are continuously adapting and acquiring new techniques, too, and successfully exploiting emerging technologies in a perpetual game of security leapfrog PCWorld – December 2013

Ransomware Attackers encrypt your data or lock you out of your PC or device using malware exploits Demand payment in exchange for restoring your access Report from Dell suggests that CryptoLocker raked in $30 million in only 100 daysCryptoLocker raked in $30 million Average cost $300 to unlock PC PCWorld – December 2013

Mobile Malware The volume of mobile malware has continued to grow exponentially FortiGuard Labs reported 500 malicious Android samples a day in January 2013 By November the number had risen to 1500 new malware samples per day PCWorld – December 2013

Data Breaches According to DataLossDB, the top five breaches in 2013 affected about 450 million records Infamous Target breach, 40 million people had their credit card information captured during the Christmas shopping season

Data Breaches Average costs: –Per compromised record – $194 –Per incident - $5.5M Damages trust and reputation Increased legislation to address: –Health Insurance Portability and Accountability Act (HIPPA) –Identity Theft and Assumption Deterrence Act (ITADA) –Gramm-Leach-Bliley Act (GLBA)

Low Tech Theft Most data breaches made public in were due to criminals using the high tech means listed on the previous slides Items for recycling often fall outside of established security protocols Items for recycling just a vulnerable

Low Tech Theft Data is in more than computers and servers; copiers, printers, scanners, and fax Machines often come with HDDs and flash memory Employee owned devices –Do your employees use their own…cell phones, tablets, other? Affinity Health Plan, a New York based not-for- profit managed care plan learned the hard way –Information left on hard drive of a copier

Low Tech Theft Bad guys getting smart Electronic materials sent to developing countries for crude, illegal and inexpensive metal extraction process Potential data in material more valuable than commodity value

How Should I Manage My Data on End of Life Assets?

Electronics Recycling Industry Electronics recycling is a fairly young industry Companies entering the industry could so with few barriers to entry –Warehouse, truck, low cost labor Most recyclers continue to be, mom and pop operations with small facilities and fewer than 15 employees Easy to Export – US did not ratify rules set by Basel Action Network (BAN )

What to Look for - Types of Certifications R2 & e-Stewards: Recycle Responsibly ISO 14001:2004 Environmentally Responsible OHSAS 18001: Safety TAPA: Transported Asset Protection Microsoft Authorized Refurbisher: able to load operating system for refurbished resale.

Transported Asset Protection Association HVTT (High Value Theft Targeted) asset theft poses a major problem for many industries Theft of electronics and almost any other cargo of value is a daily event throughout the world This type of crime leads to potential liability of data breaches and compromised brand integrity While government programs such as C-TPAT focus on keeping dangerous items out of the supply chain, TAPA focuses mainly on the issue of theft

Not All About Certifications - Observe Do a Site Visit Security –Are there adequate security controls in place? Theft of a HDD or tablet with data on it is a breach. Safety –If the company does not care about the safety of their people will they care about the safety of your data? Environment –If the site is careless about the environment will they be careless about your data? Employees –Background checked? Prison labor? Equipment

Found a Recycler, Now What? Protecting data: Three main methods of erasing HD (Magnetic Media)

Clearing Ensure information cannot be retrieved by data, disk, or file recovery utilities Resistant to keystroke recovery attempts from standard input devices Overwriting is one method (software) Replace written data with random data Cannot be used for media that are damaged or not writeable Size and type of media determine if this is possible

Why three passes? Some organizations are not specific on number of passes When specified, normally three Why? –US NIST Special Publication

Purging Process that protects data from laboratory attack using non- standard means Degaussing – exposing media (hard drive) to strong magnetic field Usually destroys drive as key firmware info on drive is destroyed Ideal for large capacity drives Does not work on optical media or flash drives Eliminates boot sector

Destruction Ultimate form of sanitization Variety of methods but shredding is typical method of destruction Shred sizes may vary depending on customers requirements

The Three Rs of Recycling

Reduce Managing carbon footprint with efficient logistics –Reduce carbon and cost of program Find a recycler with multiple sites

26 SRS Global Operations 45 Operations Globally 12 US Operations 4 Canada Operations 25 EU Operations 1 New Zealand Operation 5 Australia Operations 3 India Operations 1 UAE Operation 1 South Africa Operation 1 Singapore Operation Asia Representative Offices

North American Locations Sacramento, CA San Francisco, CA Los Angeles, CA Montreal, QC Edison, NJ Toronto, ON (2) Vancouver, BC Nashville, TN Chicago, IL (2) Dallas, TX Tampa, FL Washington, DC Tucson, AZ

Recycle Locally - Avoid Export Whole Processing near generation site –Increases security – Do you want your data sent to out of country on an un-wiped drive? SRS Other ?

Reuse Consider allowing recycler to reuse/resell assets With proper controls, it is safe and can return value to the recycling program Huge energy savings versus recycling and fabricating new product 500% Energy Savings

Recycle Overall, the processes used to make consumer goods from recycled material versus raw resources is much more energy and water efficient Recycling 1 million laptops saves the energy equivalent to the electricity used by 3,657 US homes in a year (EPA) A ton of circuit boards can contain up to 800 times the amount of gold mined from one ton of ore in the US. (EPA) EPA tool to calculate energy savings from recycling:

Q&A Sean Magann, Vice-President Sales and Marketing