National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.

Slides:



Advertisements
Similar presentations
Term Project Grade 9 Section B Due december 18 Find and research one Emerging technology not studied in class. It can be a prototype or already available.
Advertisements

Chapter 7: Physical & Environmental Security
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Data Destruction and The Impact on Recycling. Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
Sanitizing Data from Storage Devices with a Live CD Brian Compton College of Technology – University of Houston Sanitizing Data from Storage Devices with.
NOAA Computer/Hard Drive Sanitization Validation Form and PDA/Cell Phone Destruction Worksheet.
Pesticide Storage Security Iraqi Surface to Air Missile This is a funny slide, however the threat of terrorism is serious. We all have to do our part.
Media Sanitization How to get rid of unwanted data so no one else can get it.
Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock.
Computer Basics Dayton Metro Library Place photo here May 20, 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
3.1 Storage devices and media
Instructions Slides 3,4,5 are general questions that you should be able to answer. Use slides 6-27 to answer the questions. Write your answers in a separate.
STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
1st Choice Document Destruction, Inc (a member of the NAID Association) is proud to be an exclusive distributor for “The Guardian” Hard Drive Destroyer.
STORAGE DEVICES AND MEDIA BY: T.MINH. Backing Up Data Refers to the copying of files and data to different medium in case of problem with the main storage.
The two types of storage: Primary Storage Secondary Storage
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Essential Computer Concepts
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
1st Choice Document Destruction (a member of the NAID Association) is proud to be an exclusive distributor for The Guardian Hard Drive Destroyer. Anyone.
CHAPTER 7 Storage Katie Moody Storage Storage holds data, instructions, and information for future use. Every computer uses storage to hold software.
ELECTRONIC RECYCLING ELECTRONIC EQUIPMENT RECYCLING WEB CONFERENCING RECYCLED TONER CARTRIDGES.
Computers in the real world Objectives Explain the need for secondary storage devices Understand the three main storage types – Optical – Magnetic – Solid.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Privacy and Information Management ICT Guidelines.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
WHAT IS COMPUTER STORAGE? Computer storage is the storing of data in an electromagnetic form to be accessed by a computer processor.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
12015/10/20 Muhammad Salman University of Indonesia.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Incident Security & Confidentiality Integrity Availability.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
® HHM Clean Desk Policy. 2 ® Clean Desk Policy : What Will You Learn Importance of Privacy and Security The kinds of information we protect Privacy Requirements.
WIC CONFIDENTIAL INFORMATION SPRING 2014 CALIFORNIA DEPARTMENT OF PUBLIC HEALTH WIC PROGRAM.
CONTROLLING INFORMATION SYSTEMS
Storage devices 1. Storage Storage device : stores data and programs permanently its retained after the power is turned off. The most common type of storage.
Digital Literacy: Computer Basics
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
Information Security. Your responsibilities as a Government of Canada employee.
Information Management and the Departing Employee.
UNICOR Federal Prison Industries, Inc. UNICOR Federal Prison Industries, Inc. “Seeking a More Excellent Way” To Make a Greener Difference!
 The laws vary from state to state. The California Medical Association website states:  There is no general law requiring a physician to maintain records.
GETTING A GRIP ON DISPOSAL Carmela Gallo. Word origin of Disposal Disposal To dispose mid-14c., from Old.French. disposer (infl. by poser "to place"),
+ e-Waste Safe Disposal Drive City of Southlake. + Goodwill has always been a leader in recycling efforts. Today, Goodwill is on the cutting edge of e-Waste.
Unit 3—Part B Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Unit 3—Part B Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
ICT IGCSE Theory – Revision Presentation 3.1 Storage devices and media Chapter 3: Storage devices and media Identify storage devices,
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Saturday July 22, am to 2 pm ON THIS DAY ONLY Radios
Mysale Information Classification 101
Domain 2 – Asset Security
Archive / Destruction / Disposal
Dayton Metro Library Computer Basics September 19, 2018
McGraw-Hill Technology Education
Dayton Metro Library Place photo here Computer Basics December 8, 2018.
Mysale Information Classification 101
What is Computer A computer is a general purpose device that can be programmed to carry out a finite set of arithmetic or logical operations. Since a sequence.
Part C Computer Storage
1.2 Types of information storage media
McGraw-Hill Technology Education
Presentation transcript:

National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International

National Property Management Association Unfortunately, sensitive information is often left in assets by agencies or private parties that transfer, donate, or sell assets to the public. This can pose a potential risk to you and your agency. Sensitive information has a wide array of markings such as Top Secret, Secret, Classified, Sensitive, Official Use, and many other types of labels, and sometimes it’s not marked at all! The items listed below may contain sensitive information. VCR (tape) Cell Phones PDA’s Printers Hard drives USBs CD Rom’s CD Rom Drives Flash Drives Magnetic Tapes Copiers Memory sticks Typewriter Ribbons

National Property Management Association 3 Some of the material that businesses routinely throw away could be of use to a wide variety of groups including business competitors, identity thieves, criminals and terrorists. Useful information includes staff names and addresses, telephone numbers, product information, customer details, information falling under the Data Protection Act, technical specifications and chemical and biological data. (Terrorist groups are known to have shown interest in the last two areas.)

National Property Management Association 4 Particular care needs to be taken to effectively destroy digital media that may contain the personal and contact details of staff or customers and company confidential data. Digital media needs to be overwritten with random data several times to make the original data irretrievable; this should include all addressable locations and not just the file allocation table. Overwriting cannot be used for media that is damaged or otherwise not writeable; in these cases the media should be purged by degaussing with a strong magnetic field or destroyed.

National Property Management Association 5 There are several methods that may be used for destroying sensitive media; however, before investing in waste destruction equipment you should: Ensure that the equipment is up to the job. This depends on the material you wish to destroy, the quantities involved and how confidential it is. Ensure that your procedures and staff are secure. There is little point investing in expensive equipment if the people employed to use it are themselves security risks. Make the destruction of sensitive waste the responsibility of your security department rather than facilities management.

National Property Management Association 6 Contracting out the Destruction of Sensitive Media: If you use contractors, ensure that their equipment and procedures are up to the standard you require. Find out who oversees their process, what kind of equipment they have and whether the collection vehicles are double-manned, so that one operator remains with the vehicle while the other collects. Get references!

National Property Management Association 7 Methods of Destroying Sensitive Media Include: Shredding Paper shredders shred to many different sizes and the size of shred you use will depend on the type of information you are destroying. Highly confidential material should be shredded using a cross-cut shredder producing a shred size no more than 15mm x 4mm. This should ensure no more than two adjacent characters appear on any one piece of shred. Paper shredders can also be used to destroy diskettes, CDs, and similar optical media by cross-cutting or shredding. The shred size should be proportional to the confidentiality of the data, typical fragments should be no larger than 25mm.

National Property Management Association 8 Methods of Destroying Sensitive Media Include: Incineration Incineration is probably the most effective way of destroying sensitive waste, including disks and other forms of magnetic and optical media, provided a suitable incinerator is used (check with your local authority). Open fires are not reliable as material is not always destroyed and legible papers can be distributed by the updraft. Metallic-based digital media can be destroyed by melting.

National Property Management Association 9 Methods of Destroying Sensitive Media Include: Pulping This reduces waste to a fibrous state and is effective for paper and card waste only. Some pulping machines rip the paper into large pieces and turn it into a papier maché product from which it is still possible to retrieve information. This is more of a risk than it used to be because inks used by modern laser printers and photocopiers do not run when wet. There are alternative methods for erasing electronic media, such as overwriting and degaussing

National Property Management Association Asset tags (property tags) or any other identifying markings should be removed. It is highly recommend that you or your recycler ensures all property tags are removed from your equipment. This will minimize your agency’s risk of exposure from media attacks or a hacker who may attempt to compromise your agencies data.

National Property Management Association Hard drives, if properly wiped with the proper software can be reused. Instruct your IT personnel to double check computers that are going to be taken out of service. From time to time some computers host two or more hard drives. Be sure to check all drives for removable media.

National Property Management Association Ensure your agency or recycler has the capability to open CD/DVD caddies to ensure all discs have been removed. Most media that gets out into the general public comes from un- removed discs.

National Property Management Association Printers/Copiers can also host a hard drive. Often, documents of sensitive nature are left in paper trays or printer spools.

National Property Management Association Remove and destroy typewriter ribbons. Data is left on the used spool of the ribbon. Thumb drives : Re-format the drive. (Reuse) or destroy the unit when it becomes obsolete.

National Property Management Association Check VCR units to ensure no tapes are left in them.

National Property Management Association Cellular phones: Remove SIM card and destroy by crimping or cutting, (Please recycle the card) (Cellular phones are recyclable) or delete the information on the unit.

National Property Management Association Magnetic tape: Ensure your tape is degaussed or destroyed. Magnetic tape is a polyester compound (Mylar).

National Property Management Association Floppies/CD’s should be shredded or degaussed. These items are recyclable. CD disks can be recycled into new products.

National Property Management Association PDA’s should be erased (re-formatted) prior to resale or reuse or be disassembled into the state of a saleable commodity.

National Property Management Association Other items that can maintain hidden storage of data and sensitive information are micro fiche, cameras, filing cabinets, safes, and answering machine cassettes. Identity theft has become a major concern to law enforcement throughout the United States. It is the fastest growing crime, and affects more than 500,000 new victims each year. Protect yourself at work and at home by double-checking that all (media/data) is destroyed or erased.

National Property Management Association Media containing sensitive data should be clearly marked; however, when in doubt, treat all data as if it is sensitive! (Photos of media provided courtesy of FPI UNICOR)