Information Security

We recommend you wipe your hard drive before you drop off your computer or laptop.

Goto http://www.killdisk.com for software.

The security of the data on your electronic devices is the most important factor when choosing an electronics recycler. A survey conducted by Converge1 revealed that IT managers at mid-to-large-size companies are most concerned about possible data breaches from discarded computers.

Recycle IT abides by the letter of the law when it comes to electronics recycling security, including federal regulations such as the Gramm-Leach Bliley Act (GLB)2, Sarbanes-Oxley Act (SOX)3, Fair & Accurate Credit Transaction Act (FACTA)4, and Health Insurance Portability & Accountability Act (HIPAA)5.

When recycling any electronics that could include sensitive or proprietary data, we completely destroy all data using a rigorous process of data destruction that’s an industry standard. That renders the data completely unreadable and unrecoverable.

Please contact us if you have any questions or concerns about our electronics recycling security protocols.

Sources:

  1. http://blog.converge.com/2010/10/data-security-ranks-number-one.html
  2. http://www.business.ftc.gov/privacy-and-security/gramm-leach-bliley-act
  3. http://www.soxlaw.com/
  4. http://www.gpo.gov/fdsys/pkg/PLAW-108publ159/pdf/PLAW-108publ159.pdf
  5. http://www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/disposalfaqs.pdf