T H E E D G E
Chris Greene , VP and Global Head of Sales and Operations , Asset Lifecycle Management Business at Iron Mountain
This defines what happens to each element of the asset across the decommissioning process , such as servers , hard disks , tapes and other media . Recent research shows that 29 % of small and medium businesses ( SMBs ) admit to throwing such equipment away in a non-secure manner – a significant data security risk .
This is where real-time asset tracking plays a key role , as it enables businesses to track , view and share the location and status of their unwanted data-bearing assets . Throughout the process each item is scanned onto a tracking system and assigned a unique identifier code . The item is then repeatedly scanned and logged throughout the journey until the full data is destroyed or , if applicable ,
successful repurposing of the asset has been recorded .
Furthermore , it is also important to ensure that any processing facilities of assets go through adequate fire protection , power , HVAC and communication systems ; as well as utilising security guards , secure entry systems ( i . e ., key card entry ) and video surveillance . Not only does this process ensure that equipment is not misplaced during the process , but it also adds a layer of assurance against thirdparty interference .
Sanitisation and value recovery
With the chain of custody in place , the next stage is sanitisation . Despite what many believe about disposing of an IT asset , a piece of data-bearing media equipment is not ‘ dead ’ simply because it has had its files deleted , drive reformatted and been thrown away . The importance of protecting and securely erasing your data , therefore , travels far beyond the stage where an asset is still in your inventory , along with your organisation ' s regulatory responsibilities for ensuring that data is not leaked .
Criminals can easily recover data from assets that have not been properly wiped . Efficient sanitisation can only be achieved reliably with the use of NIST 800-88 compliant and ADISA certified data wiping software , such as Teraware .
This software was designed for data centres and uses automated discovery , erasure and reporting to eliminate the possibility of missed drives , minimise manual operations and generate auditcompliant records .
Then , as quickly as possible , each asset should be redeployed , recycled , or remarketed to recover a proportion of its value . Through this process of redeployment , re-engineering and the harvesting of components , IT leaders can divert waste from landfills , recover valuable metals and avoid greenhouse gas emissions . If recycling is not possible , however , assets should be physically destroyed .
The improper disposal of IT assets during data centre decommissioning exposes an organisation to unnecessary risks with significant reputational and financial damage .
Ensuring a compliant disposal procedure for sensitive data across all mediums and physical devices also allows businesses to keep track of their environmental impact and long-term sustainability more accurately .
As data protection legislation continues to tighten across the globe , ensuring that all data is fully removed , in a secure , compliant manner – within a proven chain of custody – is the critical final stage of the data centre life cycle . �
72 www . intelligentdatacentres . com