Data Destruction and the Impact on Recycling Bill Vasquez, General Manager West Region.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Data Destruction and the Impact on Recycling. With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are.
Data Destruction and the Impact on Recycling. With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are.
WAREHOUSING MANAGEMENT
WAREHOUSING MANAGEMENT
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Why it matters what you do with old electronics © R2 Solutions.
Electronics Stewardship Tim Hilton
Data Destruction and The Impact on Recycling. Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per.
ELECTRONICS RECYCLING Revised May CONTENTS INDUSTRY OVERVIEW –General Perspectives –Highlights from the IAER Industry Report Industry Survey Industry.
United Electronic Recycling United Electronic Recycling.
Understanding secure data erasure and end-of-lifecycle IT asset management.
Aspects of Electronic Waste Disposal Lawrence P. Hayes P.E. E-Waste Experts, Inc.
Data Destruction and the Impact on Recycling Albert Hacker – Business Solutions Advisor (615)
Media Sanitization How to get rid of unwanted data so no one else can get it.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security Controls – What Works
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Green Business Practices Unit 1: BMT. Green Business Practices Adopting environmentally-friendly and energy efficient business practices provides numerous.
Data Elimination 101. What Does Degauss Mean? Computer hard drives use magnetic fields to store data on special discs called platters. Degaussing is the.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
Identify a few method to dispose of the hard drive of computers.
BUILD WITH US. ™ Contractors
Data Destruction and the Impact on Recycling. Innovation in Data Theft Ransomware.
United Electronic Recycling United Electronic Recycling.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.
By: Marideth Bradley. OBJECTIVES Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can be performed.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
KEEPING LABOR AND OVERHEAD COSTS DOWN Controlling Labor and Overhead Costs as a Long Term Strategy.
By Mara and Claire. What is E-waste? E-waste (electronic waste) comes in many forms and is generated by business’s growing electronic needs. E-waste embraces.
Computers in the Ambulatory Care Setting
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
Remanufacturing: Links to Sustainability Matt Bogoshian Senior Policy Counsel Office of Chemical Safety and Pollution Prevention U.S. Environmental Protection.
Collaborative Environmental Procurement Strategies May 24, 2006 Pamela Brody-Heine Eco Stewardship Strategies Zero Waste Alliance.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
ISO 9001:2000  ISO 14001:2004 IAER Certified Electronics Recycler  E-Scrap Recycling Recycling 3 categories –Reuse Reusing the entire item –Recovery.
More Sustainable E-waste Management © SERI – Home of the R2 Standard 8/6/15.
Data Destruction and the Impact on Recycling Sean Magann – Vice President of Sales and Marketing (510)
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
E-Waste Review. E-Waste ▫Waste made up of obsolete, broken, or surplus electronic devices.
Automation of Processes in Transactional Environments David Chulick Director of IT City of Gilroy, CA.
COPS, 2 nd Mai 2013, H. Leuenberger Promotion of Green Industries in Recycling Heinz Leuenberger PhD Director, Environmental Management Branch.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
UNICOR Federal Prison Industries, Inc. UNICOR Federal Prison Industries, Inc. “Seeking a More Excellent Way” To Make a Greener Difference!
Why Collect and Recycle Electronics -Clive Hess. Benefits of Recycling Establishes more jobs, economic development, and tax revenue Makes less impact.
Sustainability in the Supply Chain 5 © 2014 Pearson Education, Inc. SUPPLEMENT.
1 Recycling Electronics: the R2 Effort Karen Pollard EPA, Office of Resource Conservation & Recovery June, 2009.
H O W T O P R O P E R L Y R E C Y C L E A S C H O O L ’ S E L E C T R O N I C W A S T E.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Computers in the Ambulatory Care Setting
E-Recycling: How It’s Done
USB flash drive A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected.
E&O Risk Management: Meeting the Challenge of Change
Education – Partnership – Solutions
At Greentek Solutions, we provide customized solutions
Life Cycle Analysis and Carbon Footprint
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Data Destruction and the Impact on Recycling Bill Vasquez, General Manager West Region

Data Breaches In 2012, over 26M records from 617 data breaches were made public. Average cost per compromised record is $194 Average incident costs $5.5M Damages trust and reputation Increased legislation to address –Health Insurance Portability and Accountability Act (HIPPA) –Fair and Accurate Credit Transaction Act (FACTA) –Identity Theft and Assumption Deterrence Act (ITADA) –Gramm-Leach-Bliley Act (GLBA) More than 46 States, District of Columbia, Guam, Puerto Rico and the Virgin Islands have passed legislation that require owners of personal information databases notify affected individuals of a data security breach

Where Data Lurks 315 of the data breaches made public in 2012 were due to hackers –Results in heavy focus on actively used product Often items for recycle fall outside of established security protocols. Is your office covered? –Data is not just on computers and servers –Copiers, printers, scanners, and fax Machines often come with HDD’s and flash memory Employee owned devices –Do your employees use their own? –Cell phones, tablets, other? –What is the disposition plan for those devices? In 2010 Affinity Health Plan, a New York based not-for-profit managed care plan learned this lesson the hard way –Information left on HDD in a previously leased copier –Other recent breaches: Click hereClick here

How Should I Manage My Data? The End of Life Issue

Electronics Recycling Industry – The Problem Electronics recycling is a fairly young industry Companies entering the industry could so with few barriers to entry –Frequently operations are in low-cost spaces with low wages –Equipment can be as rudimentary as hand tools, pallet jack and pick-up or trailer Few companies initially had shredders or separation equipment By 2002, there were an estimated 1,000 companies in the industry Most recyclers continue to be, “mom and pop” operations with small facilities and fewer than 15 employees As volumes increased, capital was needed to buy and install high-powered shredding and separation systems Easy to Export – US did not ratify rules set by Basel Action Network (BAN)

What to Look for - Types of Certifications ISO 14001:2004 Environmentally Responsible OHSAS 18001: Safe R2 & eStewards: Recycle Responsibly TAPA: Transported Asset Protection Microsoft Authorized Refurbisher: able to load operating system for refurbished resale.

Transported Asset Protection Association HVTT (High Value Theft Targeted) asset theft poses a major problem for many industries Theft of electronics and almost any other cargo of value is a daily event throughout the world This type of crime leads to potential liability of data breaches and compromised brand integrity While government programs such as C-TPAT focus on keeping dangerous items out of the supply chain, TAPA focuses mainly on the issue of theft

Not All About Certifications - Observe Do a Site Visit Security –Are there adequate security controls in place? Theft of a HDD or tablet with data on it is a breach. Safety –If the company does not care about the safety of their people will they care about the safety of your data? Environment –If the site is careless about the environment will they be careless about your data? Employees –Background checked? Prison labor? Equipment –Adequately process for secured data destruction?

Found a Recycler, Now What? Protecting data: Three main methods of erasing HD (Magnetic Media)

Clearing Ensure information cannot be retrieved by data, disk, or file recovery utilities Resistant to keystroke recovery attempts from standard input devices Overwriting is one method (software) Replace written data with random data Cannot be used for media that are damaged or not writeable Size and type of media determine if this is possible

Why three passes? Some organizations are not specific on number of passes When specified, normally three Why? –US NIST Special Publication

Purging Process that protects data from laboratory attack using non- standard means Degaussing – exposing media (hard drive) to strong magnetic field Usually destroys drive as key firmware info on drive is destroyed Ideal for large capacity drives Does not work on optical media or flash drives Eliminates Boot Sector

Destruction Ultimate form of sanitization Variety of methods but shredding is typical method of destruction Shred sizes may vary depending on customers requirements

Hard Drives (non SSD) Clear Overwrite media by validated overwriting software Purge Use approved degausser on entire HD unit or disassemble HD and purge platters Shred Commodity separation Material sent to proper metal smelter

Cellphones/Tablets/Flash Drives Clear Delete all memory (internal and external) Perform manufacturer reset Use of external software Purge Same as clear Shred Remove battery and shred device Device shredded and processed at precious metal smelter

Asset Retirement On average, servers and data storage systems are replaced every three years. Managing these assets at the end of their useful life can be onerous and raise many questions: How do I minimize the carbon footprint of end-of-life assets? How do I protect the data on end-of-life assets? Do the assets still have value? 16

Maximizing the value of the asset while minimizing the carbon footprint impact

How to Minimize Impact Managing carbon footprint with efficient logistics And following the three R’s Reduce – Reuse – Recycle

Drivers of Recycling Costs Mechanical destruction consumes more energy than reusing Reusing electronics can save 5-20 times more energy than recycling (eassetsolutions) 500% Savings

Why Recycle Locally and Not Export Whole? Processing, shredding, and sorting –Increases security – Do you want your data sent to out of country on an un-wiped drive? SRS Other ?

Separation Improves Recycling Impact Increases in transportation and processing have an increased CO 2 impact on the environment

Beyond Data Destruction - Benefits Recycling 1 million laptops saves the energy equivalent to the electricity used by 3,657 US homes in a year (Dosomething) One metric ton of circuit boards can contain 40 to 800 times the amount of gold and 30 to 40 times the amount of copper mined from one metric ton of ore in the US. (EPA) Overall, the processes used to make consumer goods from recycled material instead of raw resources is much more energy and water efficient (ecocycle) Paper 60-70% less energy than Virgin Pulp and 55% less water EPA tool to calculate energy savings from recycling:

Certificate of Sustainability Provides customers with a view of four energy equivalency savings due to electronic waste recycling Gallons of Gasoline Saved Barrels of Oil Saved Trees Planted Gallons of Water Saved Calculations sourced from v3 of the Electronics Environmental Benefits Calculator from U.S. EPA

Q&A Bill Vasquez, General Manager West Region