SlideShare uma empresa Scribd logo
1 de 38
Interested in data center security and disaster recovery?

     Learn about the Security and DR track at the
     upcoming Fall 2012 Data Center World Conference at:

     www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.
Vito Arminio
Vito.arminio@lifespanrecycling.com
          858-729-0289
Bringing ‘Peace of Mind’ to IT
    Asset Retirement
• Reduce your Liability in 3
  Areas:



  – Environmental



  – Data              Privacy


  – Reputation


 Confidential – not for distribution without LifeSpan’s written consent.
Equipment Retirement -
   Issues
   • E-waste is the fastest growing portion of the entire
     waste stream, growing two to three times faster than
     any other waste stream. It is the largest single source
     of lead in municipal solid waste (about 30%).


    The United States faces a unique challenge regarding
    the disposal of obsolete computer equipment on a
    national and global scale.




Confidential – not for distribution without LifeSpan’s written consent.
Asset Retirement -
     Drivers

     • Increased focus on asset management  Must
       manage TCO
     • Environmental liability / data security  Detailed
       reporting and auditing
     • Multiple locations, distributed IT equipment  Complex
       and costly logistics
     • Greater corporate and environmental regulations 
       Increased scrutiny and accountability for tangible
       and intangible assets.




Confidential – – not for distribution without LifeSpan’s written consent.
 Confidential not for distribution without LifeSpan’s written consent.
IT Asset Management Process

                         Sources: Gartner, IDC
         Relative Cost




                                                                            Maintenance



                                         Procurement


                                                               Deployment                 Retirement
                          Requisition

                         Beginning of lifecycle                                     End of lifecycle




Confidential – not for distribution without LifeSpan’s written consent.
Why Can’t We Just Throw it
    Away?

• All E-Waste types
   – Computers & Monitors
   – Printers & Peripherals

   - Complex Circuitry Items
   – Materials Toxic to the Envt.
      • Lead
      • Mercury
      • Cadmium
      • Gallium Arsenide
      • Barium

 Confidential – not for distribution without LifeSpan’s written consent.
Bringing Peace of Mind…

• Department of Commerce report estimated that in
  2006, 50% - 70% of electronic waste was exported
  to developing countries




Confidential – not for distribution without LifeSpan’s written consent.
Environmental Risks

   • Comprehensive Environmental Response Compensation
     and Liability Act (CERCLA)
         –   a.k.a. “Superfund”
         –   Certificates of Recycling –”certification”
         –   Deep Pockets Ruling


   • State by State Regulations
         –   What’s legal in one state is illegal in another


   • A ‘Certificate of Recycling’ is meaningless

   • Ask for Pollution Liability Insurance - $5 Million


Confidential – not for distribution without LifeSpan’s written consent.
Environmental Liability:




Confidential – not for distribution without LifeSpan’s written consent.
Credit Card Log File




Confidential – not for distribution without LifeSpan’s written consent.
Point of Sale Log File – Credit Card Numbers




Confidential – not for distribution without LifeSpan’s written consent.
Outlook – Outlook.pst




Confidential – not for distribution without LifeSpan’s written consent.
Accounting System – Social Security Number




Confidential – not for distribution without LifeSpan’s written consent.
Data Destruction Dilemma
   Revenue or Neutral/Cost

   • Physical Data Destruction
         –   Crushing – HDC
         –   Shredding – Service / Equipment
         –   Visual verification


   • Sanitization
         –   Single Pass, Triple Pass, 7 pass, 29
             pass, zillion pass
         –   DBAN
         –   Active Killdisk
         –   Ontrack – Data Erasure
         –   Blancco


   • Degaussing
Confidential – not for distribution without LifeSpan’s written consent.
Degaussing




Confidential – not for distribution without LifeSpan’s written consent.
Profile Privacy Breaches
   • Identity Theft - On the rise
      – 22.4 Million Sensitive Records Breached in 2011
      – Costs $53 Billion annually
      – Costs $4,800 per individual
      – Costs public companies – 5% stock value


   • Sony
   • Epsilon
   • HealthNet




Confidential – not for distribution without LifeSpan’s written consent.
Confidential – not for distribution without LifeSpan’s written consent.
Bringing Peace of
                                         Mind to Data Privacy




   • Look for a NAID Certified Service Provider




Confidential – not for distribution without LifeSpan’s written consent.
Considerations for Process Enhancements
   • Chain of Custody
      – How long do drives sit around before destruction?
      – Where/How are they stored?
      – Can they accidentally be picked up for reuse?


   • Quality Assurance on Sanitization
      – How are disks validated? (Every day, lot, each… never)
      – Forensics Software?
         • Encase
         • RTT Toolkit
      – Different types of interfaces – SCSI, FibreChannel


   • MOST IMPORTANT: Process and Controls – Its Usually Human
     Error


Confidential – not for distribution without LifeSpan’s written consent.
Considerations for Process
   Enhancements
   Where things go wrong:

   Physical Destruction
   • No timely destruction - they sit around
   • Mistakened for wiped drives –so not crushed
   • Inadvertent reuse

   Sanitization
   • Little or no QA/QC
   • False negatives from faulty hardware
   • Interfaces
   • Mistakened wipe drives
Confidential – not for distribution without LifeSpan’s written consent.
Considerations for Process
   Enhancements
   NAID (Preliminary)
   •Physical Destruction Process Outline:
         – IT,  Surplus or Vendor Team removes
             equipment from end user – transports
             and places in secure area
         – Equipment                           is cataloged
         – Drive               is removed and cataloged
         – Immediately                               crushed
         – Subsequent                              shredding for recycling


Confidential – not for distribution without LifeSpan’s written consent.
Considerations for Process
   Enhancements
   NAID (Preliminary)
   • Sanitization Process Outline
         –   IT, Surplus, or Vendor Team removes equipment from end
             user – transports and places in secure area
         –   Equipment is cataloged

         –   System is sanitized
         –   Forensics verification – manager, outside firm
         –   Labeled

         –   Drive is removed and cataloged
         –   System is sanitized
         –   Forensics verification – manager, outside firm
         –   Labeled
Confidential – not for distribution without LifeSpan’s written consent.
Solid State Hard Drive
   Technology




Confidential – not for distribution without LifeSpan’s written consent.
Solid State Hard Drives
   • Reverse Engineered to mimic                                          Magnetic HD
     Magnetic Architecture


   • Flash Translation Layer


   • Lack of G-List
                                                                          SSD HD


   • In the race to go to market,
     SSD manufacturers were
     inconsistent in their adherence                                                    FTL
     to the SATA standard.
   • This has rendered
     wiping/sanitization software
     unable to perform a conclusive
     validation.
Confidential – not for distribution without LifeSpan’s written consent.
Are You Protected in the Event of a
   Data Privacy Breach?
   • Do they have sufficient insurance? $1M Errors & Ommissions


   • Privacy Liability ($250,000)
         –   Notification/Credit Monitoring
         –   Public Relations Expenses


   • Bodily Injury Coverage
         –   For those who claim emotional distress & mental anguish


   • Hammer Clause (for frivolous suits)


   • You shouldn’t have to worry about if a claim will be paid

Confidential – not for distribution without LifeSpan’s written consent.
Data Privacy – Have You Considered…
   • Digital Copy Machines contain Hard Drives
         –   Capture image of every page copied


   • High-end Printers contain Hard Drives


   • Smartphones & Blackberries
         –   Should be treated just as carefully as loose hard drives
         –   Sanitize Data/Shred SIMM Card




Confidential – not for distribution without LifeSpan’s written consent.
Reputation Risk
   • Many nationwide companies rely on smaller local
     recyclers, creating inconsistent practices on how
     materials are retired from region to region.

   • Often “sham recyclers” simply cross dock and export E-
     waste to non OECD countries.

   • Invariably, companies are unaware that their E-waste
     has not been legitimately broken down and recycled,
     but merely exported to countries that are unequipped
     to process it properly.

   • Environmental watchdog groups are producing exposes
     in order to make an example out of abhorrent
     companies.
Confidential – not for distribution without LifeSpan’s written consent.
Free E-Waste “Recycling”




        Source: Basel Action Network
        BAN.org




Confidential – not for distribution without LifeSpan’s written consent.
Environmental - Global “Recycling”


                                                                          Processing Residue along Lianjiang River




    Hydrochloric / Nitric Acid Baths



        Source: Basel Action Network
        BAN.org




Confidential – not for distribution without LifeSpan’s written consent.
Reputation Liability:
   E-Waste ‘Sting’ Operations
            60 Minutes Nov 9, 2008




                                                                          Frontline, June 23 2009




Confidential – not for distribution without LifeSpan’s written consent.
Confidential – not for distribution without LifeSpan’s written consent.
Look for a Nationwide ‘Footprint’




              Recycling
              Recycling / Sorting
              Sort / Audit




Confidential – not for distribution without LifeSpan’s written consent.   9/24/03
Asset Retirement Program–
   Elements to Consider

                                                         1 time pickup                                 Weekly
   • Frequency                                           once per year
                                                                                 Quarterly
                                                                                                       Monthly


                                                        0 to 1 Pallets or     2 to 4 Pallets or
   • Space                                                E cycle Box           E cycle Box
                                                                                                  ½ to Full Truckload


                                                                                                  Coastal, Regional,
   • Location                                           Single Location          Campus
                                                                                                      National


                                                     Plenty of Resources     Need Resources       Packing materials
   • Packing Resources                                     to Pack             Sometimes           Inside Removal


   • Data Security                                   Plenty of Resources
                                                      Strategic In-house
                                                                               Do In-House
                                                                              Need to Check
                                                                                                  SW and/or Physical
                                                                                                     Destruction

                                                     Plenty of Resources       Do In-House         Barcode serial #s
   • Audit                                            Strategic In House      Need to Check           Asset tags


   • Recycle                                          Transfer ownership
                                                                             Recycle Domestic
                                                                            Global Reman/Reuse
                                                                                                      No Reuse
                                                                                                    Domestic Only


Confidential – not for distribution without LifeSpan’s written consent.
Asset Retirement Program –
   Development of Continuum




                   i ng                                            up                    on            ng
                dit er                 ta   n                  ick                rt at i         y cli        se
              u
           t A umb                 Da uctio                 e P i ng            po tics          c           eu l e
         se N                          tr                 id k                s               Re            R sa
       As rial t Ta
                        g           es                I ns P ac             an is                            Re
                                  D                                       Tr Log
        Se sse
            A




                                                  Sample LifeSpan
                                                  Service Programs

Confidential – not for distribution without LifeSpan’s written consent.
Bringing ‘Peace of Mind’ to IT
    Asset Retirement
• Reduce your Liability in 3
  Areas:



  – Environmental



  – Data              Privacy


  – Reputation


 Confidential – not for distribution without LifeSpan’s written consent.
Vito Arminio
Vito.arminio@lifespanrecycling.com
          858-729-0289
Interested in data center security and disaster recovery?

     Learn about the Security and DR track at the
     upcoming Fall 2012 Data Center World Conference at:

     www.datacenterworld.com.




This presentation was given during the Spring, 2012 Data Center World Conference and Expo.
Contents contained are owned by AFCOM and Data Center World and can only be reused with the
express permission of ACOM. Questions or for permission contact: jater@afcom.com.

Mais conteúdo relacionado

Semelhante a Best Practices To Mitigate Risks When Retiring IT Assets

Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
Telaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle SolutionsTelaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle Solutionsajackson88
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overviewdfeldbaum
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika WijayatungaIndonesia Network Operators Group
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Baltimax
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311JohnMDoe
 
Information Management As Emerging Discipline 20040329
Information Management As Emerging Discipline 20040329Information Management As Emerging Discipline 20040329
Information Management As Emerging Discipline 20040329iain heron
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
How to Automate Offline IT Asset Workflow
How to Automate Offline IT Asset WorkflowHow to Automate Offline IT Asset Workflow
How to Automate Offline IT Asset WorkflowB&L Associates
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaMyNOG
 

Semelhante a Best Practices To Mitigate Risks When Retiring IT Assets (20)

Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Telaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle SolutionsTelaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle Solutions
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Reusable Packaging's Role in the Blockchain era
Reusable Packaging's Role in the Blockchain eraReusable Packaging's Role in the Blockchain era
Reusable Packaging's Role in the Blockchain era
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311
 
Information Management As Emerging Discipline 20040329
Information Management As Emerging Discipline 20040329Information Management As Emerging Discipline 20040329
Information Management As Emerging Discipline 20040329
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
How to Automate Offline IT Asset Workflow
How to Automate Offline IT Asset WorkflowHow to Automate Offline IT Asset Workflow
How to Automate Offline IT Asset Workflow
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
 

Mais de AFCOM

Maximizing the life of existing equipment
Maximizing the life of existing equipmentMaximizing the life of existing equipment
Maximizing the life of existing equipmentAFCOM
 
Lowering operating costs through cooling system design
Lowering operating costs through cooling system designLowering operating costs through cooling system design
Lowering operating costs through cooling system designAFCOM
 
Disaster recovery the new imperative
Disaster recovery the new imperativeDisaster recovery the new imperative
Disaster recovery the new imperativeAFCOM
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAFCOM
 
Benchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterBenchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterAFCOM
 
Understanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersUnderstanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersAFCOM
 
Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace AFCOM
 
Data Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunData Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunAFCOM
 
Taming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILTaming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILAFCOM
 
How to Design a Scalable Private Cloud
How to Design a Scalable Private CloudHow to Design a Scalable Private Cloud
How to Design a Scalable Private CloudAFCOM
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsAFCOM
 

Mais de AFCOM (12)

Maximizing the life of existing equipment
Maximizing the life of existing equipmentMaximizing the life of existing equipment
Maximizing the life of existing equipment
 
Lowering operating costs through cooling system design
Lowering operating costs through cooling system designLowering operating costs through cooling system design
Lowering operating costs through cooling system design
 
Disaster recovery the new imperative
Disaster recovery the new imperativeDisaster recovery the new imperative
Disaster recovery the new imperative
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Adding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf codeAdding intelligence to your dcim solution rf code
Adding intelligence to your dcim solution rf code
 
Benchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data CenterBenchmark the Relative Performance of Your Data Center
Benchmark the Relative Performance of Your Data Center
 
Understanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data CentersUnderstanding And Evaluating Colocation Data Centers
Understanding And Evaluating Colocation Data Centers
 
Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace Buy vs Build Considerations in Today's Data Center Marketplace
Buy vs Build Considerations in Today's Data Center Marketplace
 
Data Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet BraunData Center Management: Where Brain Meet Braun
Data Center Management: Where Brain Meet Braun
 
Taming the DCIM Wave with ITIL
Taming the DCIM Wave with ITILTaming the DCIM Wave with ITIL
Taming the DCIM Wave with ITIL
 
How to Design a Scalable Private Cloud
How to Design a Scalable Private CloudHow to Design a Scalable Private Cloud
How to Design a Scalable Private Cloud
 
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating CostsBalancing Trends in Data Center Migration, Site Selection, and Operating Costs
Balancing Trends in Data Center Migration, Site Selection, and Operating Costs
 

Último

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 

Último (20)

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 

Best Practices To Mitigate Risks When Retiring IT Assets

  • 1. Interested in data center security and disaster recovery? Learn about the Security and DR track at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.
  • 3. Bringing ‘Peace of Mind’ to IT Asset Retirement • Reduce your Liability in 3 Areas: – Environmental – Data Privacy – Reputation Confidential – not for distribution without LifeSpan’s written consent.
  • 4. Equipment Retirement - Issues • E-waste is the fastest growing portion of the entire waste stream, growing two to three times faster than any other waste stream. It is the largest single source of lead in municipal solid waste (about 30%).  The United States faces a unique challenge regarding the disposal of obsolete computer equipment on a national and global scale. Confidential – not for distribution without LifeSpan’s written consent.
  • 5. Asset Retirement - Drivers • Increased focus on asset management  Must manage TCO • Environmental liability / data security  Detailed reporting and auditing • Multiple locations, distributed IT equipment  Complex and costly logistics • Greater corporate and environmental regulations  Increased scrutiny and accountability for tangible and intangible assets. Confidential – – not for distribution without LifeSpan’s written consent. Confidential not for distribution without LifeSpan’s written consent.
  • 6. IT Asset Management Process Sources: Gartner, IDC Relative Cost Maintenance Procurement Deployment Retirement Requisition Beginning of lifecycle End of lifecycle Confidential – not for distribution without LifeSpan’s written consent.
  • 7. Why Can’t We Just Throw it Away? • All E-Waste types – Computers & Monitors – Printers & Peripherals - Complex Circuitry Items – Materials Toxic to the Envt. • Lead • Mercury • Cadmium • Gallium Arsenide • Barium Confidential – not for distribution without LifeSpan’s written consent.
  • 8. Bringing Peace of Mind… • Department of Commerce report estimated that in 2006, 50% - 70% of electronic waste was exported to developing countries Confidential – not for distribution without LifeSpan’s written consent.
  • 9. Environmental Risks • Comprehensive Environmental Response Compensation and Liability Act (CERCLA) – a.k.a. “Superfund” – Certificates of Recycling –”certification” – Deep Pockets Ruling • State by State Regulations – What’s legal in one state is illegal in another • A ‘Certificate of Recycling’ is meaningless • Ask for Pollution Liability Insurance - $5 Million Confidential – not for distribution without LifeSpan’s written consent.
  • 10. Environmental Liability: Confidential – not for distribution without LifeSpan’s written consent.
  • 11. Credit Card Log File Confidential – not for distribution without LifeSpan’s written consent.
  • 12. Point of Sale Log File – Credit Card Numbers Confidential – not for distribution without LifeSpan’s written consent.
  • 13. Outlook – Outlook.pst Confidential – not for distribution without LifeSpan’s written consent.
  • 14. Accounting System – Social Security Number Confidential – not for distribution without LifeSpan’s written consent.
  • 15. Data Destruction Dilemma Revenue or Neutral/Cost • Physical Data Destruction – Crushing – HDC – Shredding – Service / Equipment – Visual verification • Sanitization – Single Pass, Triple Pass, 7 pass, 29 pass, zillion pass – DBAN – Active Killdisk – Ontrack – Data Erasure – Blancco • Degaussing Confidential – not for distribution without LifeSpan’s written consent.
  • 16. Degaussing Confidential – not for distribution without LifeSpan’s written consent.
  • 17. Profile Privacy Breaches • Identity Theft - On the rise – 22.4 Million Sensitive Records Breached in 2011 – Costs $53 Billion annually – Costs $4,800 per individual – Costs public companies – 5% stock value • Sony • Epsilon • HealthNet Confidential – not for distribution without LifeSpan’s written consent.
  • 18. Confidential – not for distribution without LifeSpan’s written consent.
  • 19. Bringing Peace of Mind to Data Privacy • Look for a NAID Certified Service Provider Confidential – not for distribution without LifeSpan’s written consent.
  • 20. Considerations for Process Enhancements • Chain of Custody – How long do drives sit around before destruction? – Where/How are they stored? – Can they accidentally be picked up for reuse? • Quality Assurance on Sanitization – How are disks validated? (Every day, lot, each… never) – Forensics Software? • Encase • RTT Toolkit – Different types of interfaces – SCSI, FibreChannel • MOST IMPORTANT: Process and Controls – Its Usually Human Error Confidential – not for distribution without LifeSpan’s written consent.
  • 21. Considerations for Process Enhancements Where things go wrong: Physical Destruction • No timely destruction - they sit around • Mistakened for wiped drives –so not crushed • Inadvertent reuse Sanitization • Little or no QA/QC • False negatives from faulty hardware • Interfaces • Mistakened wipe drives Confidential – not for distribution without LifeSpan’s written consent.
  • 22. Considerations for Process Enhancements NAID (Preliminary) •Physical Destruction Process Outline: – IT, Surplus or Vendor Team removes equipment from end user – transports and places in secure area – Equipment is cataloged – Drive is removed and cataloged – Immediately crushed – Subsequent shredding for recycling Confidential – not for distribution without LifeSpan’s written consent.
  • 23. Considerations for Process Enhancements NAID (Preliminary) • Sanitization Process Outline – IT, Surplus, or Vendor Team removes equipment from end user – transports and places in secure area – Equipment is cataloged – System is sanitized – Forensics verification – manager, outside firm – Labeled – Drive is removed and cataloged – System is sanitized – Forensics verification – manager, outside firm – Labeled Confidential – not for distribution without LifeSpan’s written consent.
  • 24. Solid State Hard Drive Technology Confidential – not for distribution without LifeSpan’s written consent.
  • 25. Solid State Hard Drives • Reverse Engineered to mimic Magnetic HD Magnetic Architecture • Flash Translation Layer • Lack of G-List SSD HD • In the race to go to market, SSD manufacturers were inconsistent in their adherence FTL to the SATA standard. • This has rendered wiping/sanitization software unable to perform a conclusive validation. Confidential – not for distribution without LifeSpan’s written consent.
  • 26. Are You Protected in the Event of a Data Privacy Breach? • Do they have sufficient insurance? $1M Errors & Ommissions • Privacy Liability ($250,000) – Notification/Credit Monitoring – Public Relations Expenses • Bodily Injury Coverage – For those who claim emotional distress & mental anguish • Hammer Clause (for frivolous suits) • You shouldn’t have to worry about if a claim will be paid Confidential – not for distribution without LifeSpan’s written consent.
  • 27. Data Privacy – Have You Considered… • Digital Copy Machines contain Hard Drives – Capture image of every page copied • High-end Printers contain Hard Drives • Smartphones & Blackberries – Should be treated just as carefully as loose hard drives – Sanitize Data/Shred SIMM Card Confidential – not for distribution without LifeSpan’s written consent.
  • 28. Reputation Risk • Many nationwide companies rely on smaller local recyclers, creating inconsistent practices on how materials are retired from region to region. • Often “sham recyclers” simply cross dock and export E- waste to non OECD countries. • Invariably, companies are unaware that their E-waste has not been legitimately broken down and recycled, but merely exported to countries that are unequipped to process it properly. • Environmental watchdog groups are producing exposes in order to make an example out of abhorrent companies. Confidential – not for distribution without LifeSpan’s written consent.
  • 29. Free E-Waste “Recycling” Source: Basel Action Network BAN.org Confidential – not for distribution without LifeSpan’s written consent.
  • 30. Environmental - Global “Recycling” Processing Residue along Lianjiang River Hydrochloric / Nitric Acid Baths Source: Basel Action Network BAN.org Confidential – not for distribution without LifeSpan’s written consent.
  • 31. Reputation Liability: E-Waste ‘Sting’ Operations 60 Minutes Nov 9, 2008 Frontline, June 23 2009 Confidential – not for distribution without LifeSpan’s written consent.
  • 32. Confidential – not for distribution without LifeSpan’s written consent.
  • 33. Look for a Nationwide ‘Footprint’ Recycling Recycling / Sorting Sort / Audit Confidential – not for distribution without LifeSpan’s written consent. 9/24/03
  • 34. Asset Retirement Program– Elements to Consider 1 time pickup Weekly • Frequency once per year Quarterly Monthly 0 to 1 Pallets or 2 to 4 Pallets or • Space E cycle Box E cycle Box ½ to Full Truckload Coastal, Regional, • Location Single Location Campus National Plenty of Resources Need Resources Packing materials • Packing Resources to Pack Sometimes Inside Removal • Data Security Plenty of Resources Strategic In-house Do In-House Need to Check SW and/or Physical Destruction Plenty of Resources Do In-House Barcode serial #s • Audit Strategic In House Need to Check Asset tags • Recycle Transfer ownership Recycle Domestic Global Reman/Reuse No Reuse Domestic Only Confidential – not for distribution without LifeSpan’s written consent.
  • 35. Asset Retirement Program – Development of Continuum i ng up on ng dit er ta n ick rt at i y cli se u t A umb Da uctio e P i ng po tics c eu l e se N tr id k s Re R sa As rial t Ta g es I ns P ac an is Re D Tr Log Se sse A Sample LifeSpan Service Programs Confidential – not for distribution without LifeSpan’s written consent.
  • 36. Bringing ‘Peace of Mind’ to IT Asset Retirement • Reduce your Liability in 3 Areas: – Environmental – Data Privacy – Reputation Confidential – not for distribution without LifeSpan’s written consent.
  • 38. Interested in data center security and disaster recovery? Learn about the Security and DR track at the upcoming Fall 2012 Data Center World Conference at: www.datacenterworld.com. This presentation was given during the Spring, 2012 Data Center World Conference and Expo. Contents contained are owned by AFCOM and Data Center World and can only be reused with the express permission of ACOM. Questions or for permission contact: jater@afcom.com.

Notas do Editor

  1. We audit our Denver facility every quarter. Other DAM’s are once a year for insurance and ECHO