Rest assured, ACE Recycling has your data security at the top of our list of priorities. We are consumers also. We also have hard drives at home and work and understand that sensitive data is on those devices. When ACE Recycling takes your electronic device, it is never booted up. We never go into your operating system, and quite frankly, we don’t want to. The industry ACE Recycling is in is called IT Asset Disposition (ITAD). Data security is the focus of the ITAD industry. More recently, it has become central to the idea of a circular economy. Equally important, the industry has become focused on disposing of electronic equipment in an environmentally responsible way.
ACE Recycling Data Security Standards –
ACE Recycling adheres to the Department of Defense 5220.22-M and HIPAA specifications for data erasure. Those standards’ foundation is the U.S. National Institute of Standards and Technology (NIST) report Guidelines for Media Sanitization. We use a three-pass overwrite with verification, completed using the latest version of Active@ KillDisk. According to the National Security Agency, data wiped using these standards is “permanently destroyed as to make any type of forensic data recovery impossible.” In addition to the software verifying the sufficient wipe of your data, we check ourselves. ACE Recycling takes a random sampling of the devices that have gone through the sanitization process. This three-tier system ensures data security, giving our customers peace of mind while keeping the device in circulation.
We process electronics in two ways. First, our IT experts determine if the device is re-marketable. As part of our commitment to a circular economy, we want to refurbish anything we can. By reusing materials, ACE Recycling is doing its part to reduce electronic waste and carbon emissions. It is estimated that by 2040 carbon emissions from the production of new electronics will reach 14% of the world’s total carbon emissions.
DATA WIPING/ERASURE –
If the device is re-marketable, ACE overwrites data with ones and zeros using NIST compliant software. Therefore, destroying all electronic information on a hard disk drive, rendering it unrecoverable. One overwriting pass is sufficient for data erasure; however, most programs use multiple passes. The number of passes has become unnecessary with the inclusion of a “verify pass” that scans for verification of data removal. Complete data erasure destroys all data, including operating systems. Thus, during the wiping process, data on the hard drive is never accessed.
Data wiping offers an alternative to physical destruction, thus allowing the hard drive to remain in circulation, reducing electronic waste and carbon emissions.
PHYSICAL DESTRUCTION –
If the device not re-marketable, it is broken down and sorted to be recycled by our partners. From there, each component is processed differently, depending on what it is. Hard drives are physically destroyed or go through the wiping process described above. Wiping and physical destruction achieve the same outcome concerning data protection. The only difference is a destroyed hard drive is no longer part of the circular economy.
Want to see us destroy your hard drive? We can do that. Like we said, your security and privacy is our number one priority.