Sustainability and Data Security

Sustainability and Data Security

As we reach for goals, both personal and professional, it's important to remember the key values that define us along the way such as empathy, integrity, and sustainability. Sustainability can be both in terms of your dedication towards completing a project as well as sustainability in the ecological sense of the word.  When you buy a new laptop or smart phone do you ever think about sustainability? What is going to happen to that expensive device when you get your next one? What happens to the one you just traded in? That disposal mindset comes with hidden factors at play, because when you're getting rid of old technology you have to be wary of the data it may contain.

When my co-authors Russ Ernst and Fredrik Forslund and I set out to write the first book on data sanitization over a year ago we were focused on the privacy and security aspects of erasure. But there is another benefit of a well managed data sanitization program: its impact of ESG (Environmental and Social Governance) and sustainability.

There is no question that the best security for data is to effectively and permanently erase it. Of the long list of things CISOs have to worry about, data that has been completely erased is not one of them. Data breaches, ransomware, cyber espionage, ediscovery litigation, do not arise against data that is gone forever. 

Privacy regulations, most notably GDPR, specifically call out the Right to Erasure. Any data subject in the EU can demand that a Google or Facebook permanently destroy all the records they keep on them. Accomplishing that is tricky. Sure you can close down an account, but can you go into every database and tape backup and truly overwrite all the data?

The IT Asset Disposition (ITAD) industry formed when it dawned on many people that old computers and electronic equipment were literally a goldmine. Gold, silver, copper and rare earth minerals could be extracted from printed circuit boards and components. But burning computers to create that flow of gold is definitely not a good thing for the environment. Besides, manufacturers found ways to lower their costs by eliminating those valuable metals. New government requirements were imposed and the EPA got involved.

ITADs turned to refurbishing old gear, particularly smart phones, and selling them in the secondary market.

Enterprises have a regular refresh cycle for their desktops and laptops. Rather then sell the old computers to employees or the public they contract with an ITAD to collect them. Sometimes they pay a fee, sometimes they get a share of the revenue generated from reselling the cleaned up computers.

This is where data sanitization plays an important role. A properly managed data lifecycle program will include the disposition of old computers and the data stored on their hard drives or SSDs. Often they erase all the data before letting the devices leave. More often, they contract with an ITAD to pick up the devices and provide attestation that all the data was erased before the devices were either refurbished or disassembled into its component parts.

As companies like Apple announce their plans for reducing their carbon footprint data sanitization is demonstrating a new benefit. Re-used devices save a lot of energy and petrochemicals. They reduce the burden on landfills as well as emissions into the atmosphere and water supply.

In addition to its security and privacy benefits data sanitization is beginning to play an important role in global sustainability. You can do your part by trading your phone in or giving or selling your laptop to an ITAD that will ensure all your data is erased before they repair it and sell it to the next owner.

Well written Richard. We are one of those such organisations. Our directors have been regenerating mobile phones for over 25 years and in recent years, have been more IT related. Even large printer copiers can carry confidential documents on their internal hard drive, (documents previously printed) Ego Technology markets to less demanding users, and makes equipment more affordable for them. Data security is our prime focus, but as you say organisations appreciate the rebated income, or gift it to their chosen charity.

Like
Reply

* Thanks 🙏 so much for sharing! I was thinking 💭 that this was going to be about plastics and when I saw 👀 that it was, PERSONAL DATA 👀foremost, I hadn’t even thought 💭 about THAT PART🙏 Wow!

If your provider can't help you dispose of that old equipment securely.. and ethically.. get another provider.

To view or add a comment, sign in

More articles by Richard Stiennon

  • If You Are an Industry Analyst, Please Stop Doing This.

    Every industry analyst wants to create a new three letter acronym (TLA). It’s just something you do.

    25 Comments
  • No-code to the Rescue.

    I am an engineer at heart. That means I like to build and refine things.

    8 Comments
  • A List of Cyber Attacks Against Ukraine

    Security Yearbook 2022 will publish the list of Significant Cyber Incidents tracked by CSIS.org.

    2 Comments
  • Which Cybersecurity Sector Grew the Fastest in 2021?

    In 2021, Security Operations was the fastest growing sectors out of the 16 I track. Security Operations includes all…

    12 Comments
  • Cybersecurity Stocks Up 22.2% in 2021

    Every year I check in on the performance of publicly traded cybersecurity stocks. I print a recap of the data in…

  • Cybersecurity Investments Hit All Time High in 2021

    Now comes my favorite part of laboring for two months to collect all the data on 2,800+ cybersecurity companies and how…

    5 Comments
  • What to Expect in Security Yearbook 2022

    It’s January. That means pulling together all the elements that go into my life’s work: Security Yearbook.

    6 Comments
  • Use Cases for My Dashboard App

    As we build our amazing app for viewing and analyzing industry data on the cybersecurity vendors I am thinking of all…

    1 Comment
  • Creating the Analyst Dashboard

    When I launched IT-Harvest in 2006 I had a vision for a data-driven analyst firm. The name was inspired by the annual…

    41 Comments
  • Short-listing Cybersecurity Vendors

    I am building what I call The Analyst Dashboard for cybersecurity. In January, for the third year running, I will be…

    16 Comments

Others also viewed

Explore content categories