If your business is on the bigger side and safeguards its data with specific security clearance procedures, then you may be a little concerned about handing over this access to an external computer recycling company. And while this is understandable, concerns about data being stolen or accessed during the recycling process shouldn’t deter your business from recycling its end-of-life items altogether.
Here, we’ll take a look at some of the key concerns that our customers have and our advice for how to deal with them.
Security clearance and recycling: Why is it a concern for high-security businesses?
We understand why businesses and organisations that deal with a lot of sensitive, secure data might be hesitant about recycling their hardware. For one thing, electronics are among the top three stolen commodities when it comes to cargo theft. 37 percent of such instances occur while cargo is in transport, while a further 14 percent occurs while hardware is sat in the warehouses of electronics recyclers.
That means reputable electronics recyclers need to be mindful of their transportation processes to ensure that a business’ equipment is transported back to their facility in the safest, most secure way possible. And once this equipment arrives, it must then be securely maintained before it’s processed further.
The good news is that we’re more than up to that task. Having a safe and secure logistics operation comes second nature to us here at ALS. In fact we go above and beyond. All our team are Baseline Personal Security Standard (BPSS) checked, with Security Clearance available if required, they are fully trained and possess decades of collection experience from the industry.
Our fleet of vehicles are fitted with CCTV to the front, rear, cab and cargo bay so we are able to track exactly what comes and goes from our vans.
Poor on-site security
Secure transportation is all well and good, but a business has every right to be concerned if their data is being dropped off at a site that lacks sound security.
We have 15,600 square metres of secure space at our IT recycling facility in Cheshire. It is fitted with the latest security features such as internal and external access control systems, 24/7 monitoring and CCTV, so you can rest assured that your equipment is well taken care of.
There’s a lot that goes into recycling computer hardware. From collection and testing, to remarketing and recycling, a formal infrastructure must be in place so that the process remains smooth and secure.
With so many elements involved, high-security businesses may be concerned about their data passing through so many processes. Rest assured, however, that legitimate electronic recyclers will have the necessary processes to dismantle devices, separate components, remove hazardous waste and shred materials without any need for concerns at your end. It’s only when your equipment falls into the hands of a disreputable recycler that you should worry.
Over the years, we’ve seen instances where the correct steps and procedures were not followed, and devices were sent to developing countries. In these parts of the world, e-waste recycling methods aren’t as sophisticated (or as safe) as they are elsewhere. So, as well as creating environmental hazards and PR disasters, high-security businesses run the risk of having their most sensitive data exposed too.
Asset Lifecycle Solutions works with private and public businesses to safely retire and recycle their outdated IT assets. To find out how we could help your business, contact us here.