Services:

Reverse Logistics & Services

We strive to relieve our customers as much as possible of the constrains of handling surplus equipment. IT-Responsible takes care of the total process of reverse logistics and processing. We go beyond cost control and revenue optimalization. Handling the outgoing flow of used IT assets of our clients includes appropriate…

Datasanitization

IT-Responsible aims to facilitate End Of Life data protection by providing concise and practical information, tools and services for data sanitization. We support our clients by organizing and managing the processes of discharging IT hardware at a responsible and secure manner. Through comprehensive asset and data sanitization reporting, we ensure…

Environmental Solutions

For IT-Responsible, sustainability of used IT means first and foremost respecting the waste hierarchy as much as possible (see below). After the IT assets can no longer be used within the company, IT-Responsible offers solutions to minimize the part of redundant equipment that ends up as residual waste. Our processes…

Social Impact

In order to give people with limited resources access to the modern digital society, used hardware, especially laptops, can be used by means of donation. But there is often more to it than it seems at first glance. In order to ensure a correct and as large as possible social…

Articles:

How Well is Data Protected on iPhones?

How well does Apple protect user data on iOS devices? Serious questions can be raised after revelations that the Pegasus spyware uses iPhone vulnerabilities to spy on nearly every aspect of a target’s life (see our Pegasus report). iOS devices had the image of being secure, and Apple as a…

Destructing Data Carriers – Not So Simple

The destruction of a data carrier is not as simple as it may appear to be. First, you have to take the data carrier out of the device or system, except for when you decide to destruct the whole device. That can be a loss of capital and is not…

To Degauss or not to Degauss?

Degaussing or demagnetizing is a method of data storage sanitization. It can be used in combination or be complementary to other methods, like erasure with software, or shredding. Degaussing has some interesting advantages, for instance it is a quick process, and can be executed onsite by internal operators. But it…

Data Classification and Categorization More and More a Necessity

For ISO 27001, data classification is a compulsory part. Guidelines for data sanitization, like NIST 800-88, and norms for data destruction, like ISO/IEC 21964, refer to categorization of information and information systems. Large government and military organizations are familiar with the concept of data classification. In the past few years…

Pegasus, the Spy Who Loves iPhones

In summer 2021 a series of revelations about NSO Group and their mobile spyware Pegasus caused an uproar among those who thought the iPhone was relatively secure. NSO Group specialised in spying on mobile devices (including iOS and Android) and were proven not only to be able to exploit vulnerabilities…

The Unnoticed Security Threat: Data on MF-Printers or Digital-Copiers

A relatively silent revolution has been taking place for the last couple of years: the simple printer has become much smarter, accelerated by the integration of copiers and printers into digital-copiers or multi-functional-printers. While security has been focused on networks, servers, PC and mobile, the storage revolution of printing units…

Is ISO IEC 21964 good enough?

The ISO IEC 21964 is a very useful international standard for data carrier destruction. It is a copy of the German DIN norm 66399 from 2012.  The standard contains clear guidelines for the physical destruction of data carriers and for complete destruction processes. It can also be useful for evaluating…

Data Erasure Software Enveloped in Mist

Commercial software for data erasure is not as “shiny” as it could be because it has been enveloped in mist due to a lack of transparency and hard data. That has been the case since the beginning by not debunking the Guttman myth for HDD erasure, to today with the…

Reports:

Guidelines for Media Sanitization: The Essentials of NIST 800 88r1

Every decisionmaker involved in protecting the confidentiality of information in public or private organizations should be concerned about the protection of information stored on disposed media. Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort. Guidelines from…

What is the Most Sustainable Data Sanitization Solution?

There is no doubt that data erasure or wiping software is the most sustainable of all data sanitization solutions. This is because it allows the device to be re-used with its original data storage components. After degaussing, only certain types of tape can be reused, but other media, like HDD’s,…

What are the security risks of smartphone disposal?

Hackers and cybercriminals are increasingly interested in gaining access to mobile devices because of the rapid growth of data they carry. What are the risks of data recovered from used smartphones or tablets? How do you avoid becoming vulnerable to data leaks from these obsolete devices? Google (Android) and Apple…

How Secure is Data Erasure Software?

Deleting files and emptying the recycle bin or reformatting a drive is not sanitizing a data carrier. That only deletes references, which makes files invisible to the operating system. The data is still there, and easily recoverable. It is like tearing the table of contents out of a book. More…

How responsible are your IT assets disposed?

 

“The modern storage environment is rapidly evolving. Data may pass through multiple organizations, systems, and storage media in its lifetime. … As a result, more parties than ever are responsible for effectively sanitizing media and the potential is substantial for sensitive data to be collected and retained on the media.”             From NIST Guidelines for media sanitization.

 

For organizations responsibilities are increasing to manage safely and ethically the disposition of their redundant IT assets, as for compliance, security, environmental and social reasons.

Important related aspects to consider are:

– defining and applying thorough processes for managing the outgoing flow,

–  asset and data carrier tracking,

– application of effective sanitization techniques to protect against unauthorized disclosure,

– extending the lifespan of devices, also outside the organization,

– reduction to a minimum part of redundant IT assets that ends u as residual waste

– collecting data of the results and application of the process for internal and external reporting to comply with secure data protection, financial, environmental (ESG) and social reporting.

Our goal is to support organizations in responsible IT asset disposal. This starts with being an active partner who thinks along with our client about the entire process, with more than 20 years of experience in this sector.

Subsequently we propose solutions and services to optimize :

  • Reverse logistics
  • Data protection
  • Environmental sustainability
  • Social Impact
  • Value recovery

And finally, providing comprehensive data and reporting for meeting compliance standards and reporting obligations.

“The amount of waste electrical and electronic equipment (widely known as WEEE or e-waste) generated every year in the EU is increasing rapidly. It is now one of the fastest growing waste streams. It includes a large range of devices such as mobile phones, computers,….”     From website EU WEEE,  including the announcement that on Oct.2023 the EU Commission has adopted policy recommendations for national authorities to increase the return of used and waste mobile phones, tablets and laptops.

174000000storage devices per year

Projected annual industry volume from 2025