Data Destruction and The Impact on Recycling. Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Data Destruction and the Impact on Recycling. With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are.
Data Destruction and the Impact on Recycling. With each passing year, the world of technology evolves and improves. Unfortunately, cybercriminals are.
WAREHOUSING MANAGEMENT
WAREHOUSING MANAGEMENT
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Why it matters what you do with old electronics © R2 Solutions.
Electronics Stewardship Tim Hilton
Computer Security Computer Security is defined as:
Data Destruction and the Impact on Recycling Bill Vasquez, General Manager West Region.
Safe, Secure, Economic, & Environmentally Sound Electronics Recycling Joe Clayton Synergy Recycling, LLC
United Electronic Recycling United Electronic Recycling.
Understanding secure data erasure and end-of-lifecycle IT asset management.
Aspects of Electronic Waste Disposal Lawrence P. Hayes P.E. E-Waste Experts, Inc.
NOAA Computer/Hard Drive Sanitization Validation Form and PDA/Cell Phone Destruction Worksheet.
Data Destruction and the Impact on Recycling Albert Hacker – Business Solutions Advisor (615)
Media Sanitization How to get rid of unwanted data so no one else can get it.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security Controls – What Works
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Market access requirements EU Engineering products General overview August 2014.
Sustainability Internal Drivers and Self-Assessment Dennis J. Stamm VP, Director Lean Enterprise Consulting February 22, 2010.
Green Business Practices Unit 1: BMT. Green Business Practices Adopting environmentally-friendly and energy efficient business practices provides numerous.
Data Elimination 101. What Does Degauss Mean? Computer hard drives use magnetic fields to store data on special discs called platters. Degaussing is the.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Data Destruction and the Impact on Recycling. Innovation in Data Theft Ransomware.
New Data Regulation Law 201 CMR TJX Video.
United Electronic Recycling United Electronic Recycling.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.
By: Marideth Bradley. OBJECTIVES Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can be performed.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Governor’s Task Force Waste Materials Recovery and Disposal Jim Cornwell CRT Processing Corporation Janesville, WI.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Technological Security Implementation and Privacy Protection.
By Mara and Claire. What is E-waste? E-waste (electronic waste) comes in many forms and is generated by business’s growing electronic needs. E-waste embraces.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Remanufacturing: Links to Sustainability Matt Bogoshian Senior Policy Counsel Office of Chemical Safety and Pollution Prevention U.S. Environmental Protection.
Collaborative Environmental Procurement Strategies May 24, 2006 Pamela Brody-Heine Eco Stewardship Strategies Zero Waste Alliance.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
ISO 9001:2000  ISO 14001:2004 IAER Certified Electronics Recycler  E-Scrap Recycling Recycling 3 categories –Reuse Reusing the entire item –Recovery.
More Sustainable E-waste Management © SERI – Home of the R2 Standard 8/6/15.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Data Destruction and the Impact on Recycling Sean Magann – Vice President of Sales and Marketing (510)
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
E-Waste Review. E-Waste ▫Waste made up of obsolete, broken, or surplus electronic devices.
Society & Computers PowerPoint
COPS, 2 nd Mai 2013, H. Leuenberger Promotion of Green Industries in Recycling Heinz Leuenberger PhD Director, Environmental Management Branch.
Why Collect and Recycle Electronics -Clive Hess. Benefits of Recycling Establishes more jobs, economic development, and tax revenue Makes less impact.
Sustainability in the Supply Chain 5 © 2014 Pearson Education, Inc. SUPPLEMENT.
Business Device Trade-in Program Frequently Asked Questions Through the Business Device Trade-in Program, you have the power to trade in your company’s.
1 Recycling Electronics: the R2 Effort Karen Pollard EPA, Office of Resource Conservation & Recovery June, 2009.
H O W T O P R O P E R L Y R E C Y C L E A S C H O O L ’ S E L E C T R O N I C W A S T E.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Sustainability Internal Drivers and Self-Assessment Dennis J. Stamm
E-Recycling: How It’s Done
Data Destruction Standards & Compliance
E&O Risk Management: Meeting the Challenge of Change
Sustainability Internal Drivers and Self-Assessment Dennis J. Stamm
Green Building and Sustainable Architecture
Life Cycle Analysis and Carbon Footprint
LO1 - Know about aspects of cyber security
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Data Destruction and The Impact on Recycling

Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per compromised record –$5.5 million per incident Damaged trust and reputation Increased legislation to address: –Health Insurance Portability and Accountability Act (HIPPA) –Fair and Accurate Credit Transaction Act (FACTA) –Identity Theft and Assumption Deterrence Act (ITADA) –Gramm-Leach-Bliley Act (GLBA) More than 46 States have passed legislation requiring owners of personal information databases to notify affected individuals of a data security breach

Where Data Lurks Data breaches made public were due to hackers Items for recycling fall outside of established security protocols –Data not only on computers Copiers, printers, and scanners –Employee owned devices (BYOD) What is the disposition plan for those devices? Affinity Health Plan, a New York based not-for-profit managed care plan learned the hard way –Information left on HDD of a previously leased copier

Electronics Recycling Industry Electronics recycling is a fairly young industry Companies entering the industry could so with few barriers to entry –Frequently operations are in low-cost spaces with low wages –Equipment can be as rudimentary as hand tools, pallet jack and pick-up or trailer Most recyclers continue to be, “mom and pop” operations with small facilities and fewer than 15 employees Easy to Export – US did not ratify rules set by Basel Action Network (BAN) Data more valuable than commodities

What to Look for - Certifications R2 & e-Stewards: Recycle Responsibly ISO 14001:2004 Environmentally Responsible OHSAS 18001: Safety TAPA: Transported Asset Protection Microsoft Authorized Refurbisher: able to load operating system for refurbished resale.

Transported Asset Protection Association HVTT (High Value Theft Targeted) asset theft poses a major problem for many industries Theft of electronics and almost any other cargo of value is a daily event throughout the world This type of crime leads to potential liability of data breaches and compromised brand integrity While government programs such as C-TPAT focus on keeping dangerous items out of the supply chain, TAPA focuses mainly on the issue of theft

Not All About Certifications - Observe Perform a Site Visit Security –Are there adequate security controls in place? Prevent theft of tablet and HDDs Safety –If the company does not care about the safety of their people will they care about the safety of your data? Environment –If the site is careless about the environment will they be careless about your data? Employees –Background checked? Prison labor? Equipment –Adequately process for secured data destruction?

Found a Recycler, Now What? Protecting data: Three main methods of erasing HD (Magnetic Media)

Clearing Ensure information cannot be retrieved by data, disk, or file recovery utilities Resistant to keystroke recovery attempts from standard input devices Overwriting is one method (software) Replace written data with random data Cannot be used for media that are damaged or not writeable Size and type of media determine if this is possible

Why three passes? Some organizations are not specific on number of passes When specified, normally three Why? –US NIST Special Publication

Purging Process that protects data from laboratory attack using non- standard means Degaussing – exposing media (hard drive) to strong magnetic field Usually destroys drive as key firmware info on drive is destroyed Ideal for large capacity drives Eliminates Boot Sector

Destruction Ultimate form of sanitization Variety of methods but shredding is typical method of destruction Shred sizes may vary depending on customers requirements

Hard Drives (non SSD) Clear Overwrite media by validated overwriting software Purge Use approved degausser on entire HD unit or disassemble HD and purge platters Shred Commodity separation Material sent to proper metal smelter

Cellphones/Tablets/Flash Drives Clear Delete all memory (internal and external) Perform manufacturer reset Use of external software Purge Same as clear Shred Remove battery and shred device Device shredded and processed at precious metal smelter

Maximizing the value of the asset while minimizing the carbon footprint impact

How to Minimize Impact Managing carbon footprint with efficient logistics And following the three R’s Reduce – Reuse – Recycle

Drivers of Recycling Costs Mechanical destruction consumes more energy than reusing Reusing electronics can save 5-20 times more energy than recycling (eassetsolutions) 500% Savings

Why Recycle Locally and Not Export Whole? Processing, shredding, and sorting –Increases security – Do you want your data sent to out of country on an un-wiped drive? SRS Other ?

Beyond Data Destruction - Benefits Recycling 1 million laptops saves the energy equivalent to the electricity used by 3,657 US homes in a year (Dosomething) One metric ton of circuit boards can contain 40 to 800 times the amount of gold and 30 to 40 times the amount of copper mined from one metric ton of ore in the US. (EPA) Overall, the processes used to make consumer goods from recycled material instead of raw resources is much more energy and water efficient (ecocycle) Paper 60-70% less energy than Virgin Pulp and 55% less water EPA tool to calculate energy savings from recycling:

Certificate of Sustainability Provides customers with a view of four energy equivalency savings due to electronic waste recycling Gallons of Gasoline Saved Barrels of Oil Saved Trees Planted Gallons of Water Saved Calculations sourced from v3 of the Electronics Environmental Benefits Calculator from U.S. EPA

Q&A