ITAMG uses NIST 800-88 guidelines to ensure that sensitive data on your unwanted IT equipment cannot fall into the wrong hands. We stand out from other ITAD service providers because our employees, and senior leadership understand every aspect of the NIST 800-88 Guidelines for Media Sanitization.
There are no shortcuts to running a secure, documented, and audit-proof program. We are here to help you fill in the gaps of your process or provide a complete system for a successful and compliant NIST 800-88 driven data destruction program.
Surplus IT equipment can contain company secrets, health information, passwords, and other valuable data prized by hackers and cyber criminals. Following NIST 800-88 data-destruction standards makes it impossible to access this data as a result of careless disposal practices.
Data breaches can lead to lawsuits that cost your company millions of dollars. In addition to legal fees there are heavy costs associated with breach management, notifications to the affected, and lost business and consumer confidence. Following the NIST 800-88 guidelines make sense for your IT operation and your business's bottom line.
Devices that will be resold or reused must have all data rendered unusable.
Clearing means overwriting or formatting drives. When disposing of equipment clearing is not an approved method and we will only provide purging to the secure erase three pass binary wiping standard. (The Secure Erase command is a purging option for ATA drives.)
Purging also includes degaussing to create a magnetic field that destroys data. It works best with damaged media, diskettes, and drives with exceptionally large storage capacities.
Obsolete, highly confidential, or unusable media needs to be destroyed and broken down for recycling.
ITAMG uses NIST 800-88 guidelines to deploy shredding equipment that breaks hard drives, smartphones, and other electronic devices into tiny shards that are then recycled in compliance with our R2 certification requirements.
Our mobile-shredding unit can destroy data at your work site, protecting the chain of custody of any sensitive data on your equipment.