The Absolute IT Asset Disposal Blog

Compliance With Information Security Regulations


The tasks you manage on a daily basis create a lot of data. Tracking suppliers, cash flow and payroll management is just the tip of the iceberg. And what about the information produced by your company; from employees, partners and clients? When you think about it, you begin to see just how much of that information can be considered sensitive. Sensitive information must be carefully managed so that security breaches can be prevented.

Click here to download our FREE guide: '7 Crucial Steps To Follow When  Disposing Of Old IT Equipment'


A lot of this data remains on HDDS and storage devices even after they are ‘wiped’ by conventional means, leaving sensitive information vulnerable to be exploited by criminals. This is the reason why most supposedly free IT AD services are so fraught with risk, and why you are far better off choosing a professional service.


Data Security Requirement


Most companies recognise that maintaining information security is sound business practice, which it is. It is also, however, required by law that you do everything you can to eliminate any conditions leading to data loss. This is your legal responsibility – as outlined in the Data Protection Act (DPA) 1998 – and not that of any third party recycling agent.


The DPA states that personal data cannot be disclosed to any third party without the express, written consent of the individual who originally submitted it. It also states that personal information is only to be used for the purpose for which it was collected.


Complying with the DPA means having appropriate security measures in place to prevent the possibility that sensitive data will be compromised. Using a professional asset disposal company like Absolute IT ensures compliance and gives you peace of mind that your sensitive data is completely eradicated from old storage devices.


Complying With The DPA (1998)


The appropriate security measures to prevent data breaches cover several areas. A company must build its data security strategy based around the nature of the data it holds, as well as around the consequences of a data breach.


An individual or team must be identified as being in charge of handling data and ensuring its security. These individuals will guarantee that regular security software updates and password changes are made, in addition to ensuring that all computers and devices at the end of life are dealt with properly.


Staff need to be well-trained to ensure they take their own steps to ensure data security. For this to occur, the right security procedures and policies must be in place. Finally, any data breach must be handled as efficiently and effectively as possible.


Significant Fines


Today, companies who don’t address security breaches can be in for large fines. Should an organisation lose the personal data of users, for example, they can face fines of up to £500, 000. This alone should place the security of your company data at the top of the list.


How To Ensure Security


All risks to the security of your company’s information should be listed. Every stage of the information cycle should be considered from the generation of data, to how it is destroyed at the end of its cycle. You should also ensure there is a well-documented data destruction process, and that all employees in your organisation understand it. This process should include the sanitisation of data, the shredding of hard drives and secure IT asset disposal. Doing this in house is a time-consuming and highly technical process, which is why many businesses opt for the services of a third party IT recycling company.


Where the amount of information being handled is too great for your organisation, a reliable and secure company should be contacted to pick up, transport and destroy any sensitive data. This will ensure compliance with the regulations outlined in the Data Protection Act.


The Dangers Of Free IT Recycling


Don’t take risks with your data: none of the free IT recycling companies we are aware of offer adequate data cleansing or a complete audit trail for each asset. This leaves you wide open to security breaches and prosecution.


To find out more about the risks of free IT recycling and the importance of thorough data security, please get in touch with one of our team today. We can explain how our services can help you reduce risk, save time and cut expenditure on IT asset disposal. More information about our data cleansing solutions can be found in our free guide to mobile IT recycling. Click here to claim your copy today.


How To Dispose of Old IT Equipment

Subscribe to Email Updates

Dispose of Old IT Equipment

Follow Us

Most recent post