Computer and electronics recycling is an environmentally friendly, common sense alternative to disposal. With recycling, waste is properly managed through reuse or re-manufacturing, thereby using less energy and fewer raw materials than making new products. Additionally, electronic materials that are disposed of in the trash can release hazardous materials such as lead, mercury and hexavalent chromium into the environment.
Electronic Recycling, or e-Recycling, is the responsible recycling of electronics, like old computers, monitors, and televisions. Rapid technology changes, low initial cost, and planned obsolescence, have resulted in a fast-growing surplus of computers and other electronic devices around the globe. Obsolete computers, TVs, and monitors are valuable sources for secondary raw materials, if recycled. Computer parts are stripped of their most valuable components and sold for scrap.
DOD Data Destruction
The “DoD standard,” referring to DoD 5220.22-M, is a term often used in the data sanitization industry. But what does this “standard” actually mean for ITADs, organizations and data sanitization solution providers?
Though the simplest overwrite techniques write the same data everywhere—often just a pattern of all zeros—the DoD “standard” and others like it take overwriting a step further with prescribed random overwriting methods. At a minimum, such applications will prevent the data from being retrieved through standard data recovery methods.
What is the DoD Standard?
The DoD 5220.22-M “standard” for data erasure from hard drives first appeared in the early days of the still-evolving data sanitization industry. The “standard”, which was published in the National Industrial Security Program’s Operating Manual in 1995, specifies a process overwriting hard drives with patterns of ones and zeros. The process requires three secure overwriting passes and verification at the end of the final pass.
The DoD 5220.22-M data sanitization method is usually implemented in the following way:
- Pass 1: Overwrite all addressable locations with binary zeroes.
- Pass 2: Overwrite all addressable locations with binary ones (the compliment of the above).
- Pass 3: Overwrite all addressable locations with a random bit pattern
- Verify the final overwrite pass.
Erasing a hard drive using the DoD 5220.22-M data sanitization method will prevent all software-based file recovery methods from recovering data from the drive, as well as hardware-based recovery methods
HIPPA Compliant Security
Our security posture allows us to protect electronic medical records (EMR), electronic protected healthcare information (ePHI), and other sensitive workloads and applications while streamlining the compliance audit process. For data that needs to be tightly secure, HIPAA compliant, and yet readily accessible by authorized practitioners, trust Armor.
All electronics data are wiped with DOD department of defense standards with certification of data destruction.HIPAA compliance agreements are also available.