How are you addressing potential data vulnerabilities in end-of-life IT equipment requiring disposal/recycling? Do you work with a third-party service/partner organization?
Sort by:
Director of Information Security in Finance (non-banking)4 months ago
As all data is required to be encrypted at rest, deleting the key is sufficient.
We leverage a certified third party to ensure the equipment is properly transported and disposed, including certification of each item. Would highly recommend finding a certified partner you trust to handle it properly.