RESEARCH FINDINGS
SAFEGUARDING YOUR
BRAND WITH SECURE IT
ASSET DISPOSITION
2
CHRIS GREENE
2
DIRECTOR
Data Management – SITAD
BRODY WEST
MANAGER
Data Management – SITAD
48.5 MILLION TONSOF E-WASTE GENERATED IN 2018
THAT’S LIKE THROWING AWAY 800 LAPTOPS
EVERY SECOND!
Globally, only 20% of society
IS DEALING WITH E-WASTE APPROPRIATELY
ONLY 9.7 MILLION TONS
OF E-WASTE ARE RECYCLED OR REMARKED ANNUALLY!
E-WASTE IS THE FASTEST GROWING
MUNICIPLE WASTE STREAM IN THE WORLD
FAILURE TO DISPOSE PROPERLY
OF IT EQUIPMENT CAN HAVE
SERIOUS CONSEQUENCES FOR
YOUR DATA, THE
ENVIRONMENT, AND YOUR
BRAND
Improper disposal of old IT assets
introduces two areas of risk resulting
in damage to the brand:
ENVIRONMENTAL
DAMAGE
DATA
SECURITY
IDG Research
IT Asset Management: Spotlight on FinServ & Healthcare
Research Goal: Understand key challenges managing end-of-life IT assets
Industry
Bank 70%
Insurance 14%
Brokerage firm 14%
Other 3%
Hospital 71%
Pharmaceuticals 14%
Private practice 7%
Business office 4%
Other 4%
Job Title
Financial Services
CIO (Chief Information Officer) 11%
CTO (Chief Technology Officer) 11%
CSO/CISO (Chief Security
Officer/Chief Information
Security Officer) 6%
Chief Compliance Officer 6%
IS/IT related VP 31%
IS/IT related Director 34%
Healthcare
CIO (Chief Information Officer) 25%
CTO (Chief Technology Officer) 10%
CSO/CISO (Chief Security
Officer/Chief Information
Security Officer) 1%
Chief Compliance Officer 7%
IS/IT related VP 18%
IS/IT related Director 39%
Financial
Services
50%
Healthcare
50%
KEEPING DATA SECURE IS THE TOP IT ASSET
MANAGEMENT CHALLENGE.
49%
31%
28%
26%
24%
19%
20%
25%
20%
20%
19%
13%
3%
43%
38%
33%
35%
33%
36%
35%
28%
26%
25%
19%
14%
0%
3%
Data security concerns (thorough data sanitization of all data-bearing assets)
Chain of custody security risks (e.g., the loss of IT assets in transit from your site to a
vendor facility)
Multiple sites and locations are handling IT asset disposal differently
Meeting local, state, federal and industry requirements
Centralized asset tracking and reporting
Proper environmental recycling
Mobile workforce (assets at many locations)
Lack of space to store retired IT assets
Lack of cooperation from employees
Introduction of significant business risk
Lack of best practice knowledge and expertise to build a strategy for IT asset disposal
Lack of interest on the part of executive management
Other
None
Financial Services
Healthcare
Key Challenges in Managing Obsolete or Retired IT Devices/Assets
NEARLY 60% OF ORGANIZATIONS DO NOT YET
HAVE AN ITAD POLICY IN PLACE.
3%
33%
23%
19%
24%
4%
29%
25%
28%
14%
We do not have a formal ITAD policy and have NO PLANS to create one
We HAVE PLANS to create a formal ITAD policy, but we haven’t started yet
We are IN THE PROCESS of creating a formal ITAD policy
We HAVE CREATED and implemented an ITAD policy within the PAST 2 YEARS
We have had an ITAD policy IN PLACE for 2 YEARS OR MORE
Financial Services
Healthcare
Status of ITAD Policy
Vulnerable Assets:
Mobile devices
(tablets, phones, etc.)
PCs and laptops
Tapes
Hard drives
Servers & data center equipment
MORE DEVICES AND EQUIPMENT.
MORE MANDATES. MORE RISK…
Regulations Impacting End-of-Life IT Assets
MORE DEVICES AND EQUIPMENT. MORE
MANDATES. MORE RISK…
31%
25%
23%
21%
16%
11%
10%
9%
8%
5%
5%
5%
4%
3%
3%
9%
BAS/AML
FACTA
FINRA SEC 17a
EPA
Graham Leach Bliley Act (GLBA)
ISO 27001
DIN 66399
e-Stewards
ADISA
ISO 14001
OHSAS 18001
NAID
R2
RIOS
Other
None
51%
38%
32%
31%
22%
18%
15%
11%
10%
10%
10%
10%
6%
3%
1%
HIPAA
EPA
FDA
CMS
ISO 14001
ISO 27001
HITECH Act
e-Stewards
DIN 66399
OHSAS 18001
NAID
RIOS
R2
PPACA
Other
None
FINANCIAL SERVICES HEALTHCARE
MAJOR US RETAILER
$22.5M
Fine for improper disposal
of hazardous material and
electronics
1,500
PATIENTS
Employee lost his briefcase that
contained a laptop while in transit
20M
ACCOUNTS
Unable to assure two magnetic
tapes were destroyed
HEALTHCARE PROVIDER MAJOR BANK
REAL LIFE EXAMPLES OF
IMPROPERY ITAD…GONE BAD
COMPLETE CHAIN
OF CUSTODY
ASSET
ITEMIZATION
SECURE TO THE CORE:
TRUCKS EQUIPPED WITH
GPS, PATENTED SECURITY
CERTIFIABLE TRACK RECORD
ON ENVIRONMENTAL
RESPONSIBILITY
THE JOURNEY YOUR ASSETS TAKE:
WHAT YOU SHOULD BE LOOKING FOR
BEST PRACTICES: add IM logo
MEDIA AND HARD DRIVE DESTRUCTION
Ask about a provider’s capabilities around security practices:
Does the provider track materials as they move offsite
Does the provider have the ability to destroy media onsite
Does the provider follow NIST 800-88 guidelines for media sanitization best
practices
Know what you’re getting in hand to validate top security practices:
Secure, auditable workflow capabilities
Documented chain of custody
Documented proof that assets have been securely destroyed
Can you be serviced beyond traditional assets – such as:
Tablets
Thumb drive/ chip based memory
Printers
IoT devices
BEST PRACTICES: add IM logo
PROTECTING THE ENVIRONMENT
E-WASTE RECYCLING
Understand environmental protection practices.
Do you destroy data on all assets prior to recycling them?
Do you de-manufacture e-waste into its component parts and recycle each piece
properly?
Can you confirm that e-waste will never be sent to a landfill?
Can you certify you’re using recycling programs that utilize ITAD industry best
practices?
Are you compliant with eStewards, R2, or Rios?
BEST PRACTICES: add IM logo
IT ASSET REMARKETING
Understand how you benefit. Are you getting:
Fair Market Value price lock
Maximum remarketing value through a multiple direct sales channels
Ability to recycle all hardware that has insufficient end-of-life value
The same security and chain-of-custody practices across destruction,
e-waste recycling and remarketing processes
All data-bearing devices erased prior to remarketing?
ITAD VENDOR SELECTION TIPS
FINANCIAL
Be warry of low priced or “free” vendors who may cut
corners
FLEET SECURITY
Utilizes alarmed and GPS-tracked vehicles and
services sizable organizations with multiple sites.
GLOBAL FOOTPRINT Has a physical presence in all of the countries you serve.
FUTURE READY
Has a defined roadmap and an ongoing commitment to
enhancing services to account for the growth of e-waste,
as well as changing regulations regarding how it should
be managed.
Look for a vendor who…
IRON MOUNTAIN’S SITAD SOLUTION IS DESIGNED TO
MITIGATE RISKS AND PROVIDE POSITIVE BUSINESS OUTCOMES
WHAT YOU’LL GAIN…
Best practices disposition
methods
Consistent, secure and
reliable service for all sites
Solid disposition strategy
with regimented policies
Dispose of IT assets in
environmental friendly way
Meet local, state and federal
requirements
In accordance with
e-Stewards procedures
Be sure all information is
completely destroyed
Proven logistics and secure
chain-of-custody
Centralized reporting
Confidently Manage
Your Decommissioned IT
Equipment
Ensure Compliant,
Environmentally Friendly
Disposal
Securely Track – From Asset
Preparation to Certificate of
Destruction
ITAD VENDOR
EVALUATION
GUIDE
IRON MOUNTAIN: SECURING DATA ACROSS THE IT LIFECYCLE
Offsite Media
Vaulting
STORE
Tape data with centralized, secure vaulting
RESTORE
Tape data to access and move data to the cloud, as well as
respond to compliance and litigation requests
MIGRATE
Tape data to the cloud to enable big data and analytics OR
cloud data to tape for air gapping and added protection
against ransomware
DISPOSE
Tape data with secure processes that offer recycling
options to optimize costs
Data
Restoration
Data
Migration
SITAD
Modular portfolio of data
management services
Cost-effective low-tier
option for all data types
Managed services remove
burden from IT resources
Long Term Data Retention. Data Migration. End of Life Asset Disposition
(877) 654-3809 | IRONMOUNTAIN.COM/SITAD
Thank You

Safeguarding Your Brand With Secure IT Asset Disposition

  • 1.
    RESEARCH FINDINGS SAFEGUARDING YOUR BRANDWITH SECURE IT ASSET DISPOSITION
  • 2.
    2 CHRIS GREENE 2 DIRECTOR Data Management– SITAD BRODY WEST MANAGER Data Management – SITAD
  • 3.
    48.5 MILLION TONSOFE-WASTE GENERATED IN 2018 THAT’S LIKE THROWING AWAY 800 LAPTOPS EVERY SECOND! Globally, only 20% of society IS DEALING WITH E-WASTE APPROPRIATELY ONLY 9.7 MILLION TONS OF E-WASTE ARE RECYCLED OR REMARKED ANNUALLY! E-WASTE IS THE FASTEST GROWING MUNICIPLE WASTE STREAM IN THE WORLD
  • 4.
    FAILURE TO DISPOSEPROPERLY OF IT EQUIPMENT CAN HAVE SERIOUS CONSEQUENCES FOR YOUR DATA, THE ENVIRONMENT, AND YOUR BRAND Improper disposal of old IT assets introduces two areas of risk resulting in damage to the brand: ENVIRONMENTAL DAMAGE DATA SECURITY
  • 5.
    IDG Research IT AssetManagement: Spotlight on FinServ & Healthcare Research Goal: Understand key challenges managing end-of-life IT assets Industry Bank 70% Insurance 14% Brokerage firm 14% Other 3% Hospital 71% Pharmaceuticals 14% Private practice 7% Business office 4% Other 4% Job Title Financial Services CIO (Chief Information Officer) 11% CTO (Chief Technology Officer) 11% CSO/CISO (Chief Security Officer/Chief Information Security Officer) 6% Chief Compliance Officer 6% IS/IT related VP 31% IS/IT related Director 34% Healthcare CIO (Chief Information Officer) 25% CTO (Chief Technology Officer) 10% CSO/CISO (Chief Security Officer/Chief Information Security Officer) 1% Chief Compliance Officer 7% IS/IT related VP 18% IS/IT related Director 39% Financial Services 50% Healthcare 50%
  • 6.
    KEEPING DATA SECUREIS THE TOP IT ASSET MANAGEMENT CHALLENGE. 49% 31% 28% 26% 24% 19% 20% 25% 20% 20% 19% 13% 3% 43% 38% 33% 35% 33% 36% 35% 28% 26% 25% 19% 14% 0% 3% Data security concerns (thorough data sanitization of all data-bearing assets) Chain of custody security risks (e.g., the loss of IT assets in transit from your site to a vendor facility) Multiple sites and locations are handling IT asset disposal differently Meeting local, state, federal and industry requirements Centralized asset tracking and reporting Proper environmental recycling Mobile workforce (assets at many locations) Lack of space to store retired IT assets Lack of cooperation from employees Introduction of significant business risk Lack of best practice knowledge and expertise to build a strategy for IT asset disposal Lack of interest on the part of executive management Other None Financial Services Healthcare Key Challenges in Managing Obsolete or Retired IT Devices/Assets
  • 7.
    NEARLY 60% OFORGANIZATIONS DO NOT YET HAVE AN ITAD POLICY IN PLACE. 3% 33% 23% 19% 24% 4% 29% 25% 28% 14% We do not have a formal ITAD policy and have NO PLANS to create one We HAVE PLANS to create a formal ITAD policy, but we haven’t started yet We are IN THE PROCESS of creating a formal ITAD policy We HAVE CREATED and implemented an ITAD policy within the PAST 2 YEARS We have had an ITAD policy IN PLACE for 2 YEARS OR MORE Financial Services Healthcare Status of ITAD Policy
  • 8.
    Vulnerable Assets: Mobile devices (tablets,phones, etc.) PCs and laptops Tapes Hard drives Servers & data center equipment MORE DEVICES AND EQUIPMENT. MORE MANDATES. MORE RISK…
  • 9.
    Regulations Impacting End-of-LifeIT Assets MORE DEVICES AND EQUIPMENT. MORE MANDATES. MORE RISK… 31% 25% 23% 21% 16% 11% 10% 9% 8% 5% 5% 5% 4% 3% 3% 9% BAS/AML FACTA FINRA SEC 17a EPA Graham Leach Bliley Act (GLBA) ISO 27001 DIN 66399 e-Stewards ADISA ISO 14001 OHSAS 18001 NAID R2 RIOS Other None 51% 38% 32% 31% 22% 18% 15% 11% 10% 10% 10% 10% 6% 3% 1% HIPAA EPA FDA CMS ISO 14001 ISO 27001 HITECH Act e-Stewards DIN 66399 OHSAS 18001 NAID RIOS R2 PPACA Other None FINANCIAL SERVICES HEALTHCARE
  • 10.
    MAJOR US RETAILER $22.5M Finefor improper disposal of hazardous material and electronics 1,500 PATIENTS Employee lost his briefcase that contained a laptop while in transit 20M ACCOUNTS Unable to assure two magnetic tapes were destroyed HEALTHCARE PROVIDER MAJOR BANK REAL LIFE EXAMPLES OF IMPROPERY ITAD…GONE BAD
  • 11.
    COMPLETE CHAIN OF CUSTODY ASSET ITEMIZATION SECURETO THE CORE: TRUCKS EQUIPPED WITH GPS, PATENTED SECURITY CERTIFIABLE TRACK RECORD ON ENVIRONMENTAL RESPONSIBILITY THE JOURNEY YOUR ASSETS TAKE: WHAT YOU SHOULD BE LOOKING FOR
  • 12.
    BEST PRACTICES: addIM logo MEDIA AND HARD DRIVE DESTRUCTION Ask about a provider’s capabilities around security practices: Does the provider track materials as they move offsite Does the provider have the ability to destroy media onsite Does the provider follow NIST 800-88 guidelines for media sanitization best practices Know what you’re getting in hand to validate top security practices: Secure, auditable workflow capabilities Documented chain of custody Documented proof that assets have been securely destroyed Can you be serviced beyond traditional assets – such as: Tablets Thumb drive/ chip based memory Printers IoT devices
  • 13.
    BEST PRACTICES: addIM logo PROTECTING THE ENVIRONMENT E-WASTE RECYCLING Understand environmental protection practices. Do you destroy data on all assets prior to recycling them? Do you de-manufacture e-waste into its component parts and recycle each piece properly? Can you confirm that e-waste will never be sent to a landfill? Can you certify you’re using recycling programs that utilize ITAD industry best practices? Are you compliant with eStewards, R2, or Rios?
  • 14.
    BEST PRACTICES: addIM logo IT ASSET REMARKETING Understand how you benefit. Are you getting: Fair Market Value price lock Maximum remarketing value through a multiple direct sales channels Ability to recycle all hardware that has insufficient end-of-life value The same security and chain-of-custody practices across destruction, e-waste recycling and remarketing processes All data-bearing devices erased prior to remarketing?
  • 15.
    ITAD VENDOR SELECTIONTIPS FINANCIAL Be warry of low priced or “free” vendors who may cut corners FLEET SECURITY Utilizes alarmed and GPS-tracked vehicles and services sizable organizations with multiple sites. GLOBAL FOOTPRINT Has a physical presence in all of the countries you serve. FUTURE READY Has a defined roadmap and an ongoing commitment to enhancing services to account for the growth of e-waste, as well as changing regulations regarding how it should be managed. Look for a vendor who…
  • 16.
    IRON MOUNTAIN’S SITADSOLUTION IS DESIGNED TO MITIGATE RISKS AND PROVIDE POSITIVE BUSINESS OUTCOMES WHAT YOU’LL GAIN… Best practices disposition methods Consistent, secure and reliable service for all sites Solid disposition strategy with regimented policies Dispose of IT assets in environmental friendly way Meet local, state and federal requirements In accordance with e-Stewards procedures Be sure all information is completely destroyed Proven logistics and secure chain-of-custody Centralized reporting Confidently Manage Your Decommissioned IT Equipment Ensure Compliant, Environmentally Friendly Disposal Securely Track – From Asset Preparation to Certificate of Destruction
  • 17.
  • 18.
    IRON MOUNTAIN: SECURINGDATA ACROSS THE IT LIFECYCLE Offsite Media Vaulting STORE Tape data with centralized, secure vaulting RESTORE Tape data to access and move data to the cloud, as well as respond to compliance and litigation requests MIGRATE Tape data to the cloud to enable big data and analytics OR cloud data to tape for air gapping and added protection against ransomware DISPOSE Tape data with secure processes that offer recycling options to optimize costs Data Restoration Data Migration SITAD Modular portfolio of data management services Cost-effective low-tier option for all data types Managed services remove burden from IT resources Long Term Data Retention. Data Migration. End of Life Asset Disposition
  • 19.
    (877) 654-3809 |IRONMOUNTAIN.COM/SITAD Thank You