How are you addressing potential data vulnerabilities in end-of-life IT equipment requiring disposal/recycling? Do you work with a third-party service/partner organization?

1.5k viewscircle icon2 Comments
Sort by:
Director of Systems Operations in Healthcare and Biotech4 months ago

We leverage a certified third party to ensure the equipment is  properly transported and disposed, including certification of each item. Would highly recommend finding a certified partner you trust to handle it properly. 

Lightbulb on1
Director of Information Security in Finance (non-banking)4 months ago

As all data is required to be encrypted at rest, deleting the key is sufficient.

Content you might like

Yes69%

No21%

It depends on the size/industry9%

I’m not sure…

View Results

Yes, one dedicated employee5%

Yes, multiple dedicated employees64%

No, but offensive security is covered by one or more employees as part of their role14%

No — we don’t handle offensive security internally14%

Other/don’t know5%

View Results