Data Protection

Everyone throughout the UK, especially organisations have obligations under the Data Protection Act. Whilst many are fully aware and understand their duties to comply with the requirements of the 1998 Data Protection Act, a good portion are less aware of the severity when it comes to decommissioning and IT disposal.

As time progresses society is becoming increasingly dependent on the use of IT systems and at the same time as it advances, there is a surge in the amount of confidential information stored on such devices.

You and your organisation have an obligation under the Data Protection Act to ensure irreversible, safe destruction of any data forms once their use and retention period have expired. This is to protect unlawful and or unauthorised access to such data. This obligation doesn’t only apply to live data but any data whether it be your own or other peoples which is stored on decommissioned IT hardware.

Theft and sale of stolen and or misplaced data which is used for illegal purposes is becoming highly lucrative and is a fast growing sector of the black market. Sophisticated criminals are using expert knowledge to steal valuable information. One of the major areas such criminals prey on is accessing data on broken or disposed of IT hardware. Don’t assume that because an IT item is broken it is data safe because you are more often than not terribly wrong. The only data safe option once an item is broken is to undertake destruction by a certified and approved method.

To be compliant with the data protection act, avoid enormous fines and bad press, it is critical that when you approach IT disposal you should choose the appropriate, compliant service provider; even when you attempt to do this it is easy to fall short and use a ‘bodge job’ setup. Sadly the vast majority of IT recycling organisations (which were setup after the WEEE regulations came into law in 2007) are barely competent in ensuring data sanitization of simple storage devices such as hard devices, never mind items such as firewalls, IP phones and router devices etc.

We have put together a simple checklist to help you protect your business and yourself.

Request a Collection

Request a Collection