Download presentation
Presentation is loading. Please wait.
Published byDeborah Violet Hudson Modified over 9 years ago
1
Data Destruction and the Impact on Recycling Albert Hacker – Business Solutions Advisor Albert.Hacker@simsmm.comAlbert.Hacker@simsmm.com (615) 751-5840
2
Innovation in Data Theft Ransomware
3
Innovation in Data Theft Mobile Malware
4
Data Breach
5
Low Tech Theft
6
Data Theft
7
Printers Copiers Fax Machines Low Tech Theft
9
How Should I Manage My Data on End of Life Assets?
10
Electronics Recycling Industry
11
What to Look for – Certifications
12
Three Options Available 1 Clear: Data Overwritten Purge: All Data Destroyed (including firmware) Destroy: Physical Destruction of Media 23
13
Three Options Available 1 Clear: Data Overwritten
14
Clearing Replace written data with random data
15
Why three passes? 11111111 11111111
16
1111111111111111
17
1111111111111111
18
Three Options Available Purge: All Data Destroyed (including firmware) 2
19
Purge Usually destroys data and drive as key firmware is destroyed
20
Three Options Available Destroy: Physical Destruction of Media 3
21
Destroy
22
ClearPurgeShred Hard DrivesOverwriteDegaussSeparate Cell Phones / Tablets / Flash Drives Delete Remove battery and separate Storage Media
23
Asset Retirement
24
The Three R’s of Recycling
25
Reduce Carbon Footprint
26
SRS Global Operations
27
Recycle Locally - Avoid Export Whole ? ? ?
28
Reuse Reuse/Resell can Return Value $ Large Energy Savings
29
Recyclin g 1 Million Laptops Recycle Equals Energy Used by 3,657 U.S. Homes
30
Q&A Albert Hacker – Business Solutions Advisor Albert.Hacker@simsmm.com Albert.Hacker@simsmm.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.