{"id":7258,"date":"2020-07-16T09:35:42","date_gmt":"2020-07-16T13:35:42","guid":{"rendered":"https:\/\/www.itadsummit.com\/?page_id=7258"},"modified":"2020-07-16T10:21:41","modified_gmt":"2020-07-16T14:21:41","slug":"itad-blog-data-breaches-and-itad","status":"publish","type":"page","link":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/","title":{"rendered":"ITAD Blog:  Data breaches and ITAD"},"content":{"rendered":"<h1>\n\t\tITAD Blog\n\t<\/h1>\n<h6>\n\t\tData Breaches and ITAD\n\t<\/h6>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg\" alt=\"cyberspace\" itemprop=\"image\"  \/>\n\t<h1>ITAD Blog<\/h1>\n<h3><strong>DATA BREACHES AND ITAD<\/strong><\/h3>\n\t<p>In light of the recent Equifax data breach, many information technology (IT) managers and compliance specialists are putting their data security standards and procedures under the microscope. They are asking:<\/p>\n<ul>\n<li>Where does the data trail end?<\/li>\n<li>Am I liable for the equipment housing my data after I\u2019ve retired it?<\/li>\n<\/ul>\n<p>How important is IT asset disposition (ITAD) in data security?<\/p>\n<p>Data breaches are costly. Preventing data leaks and practicing data destruction best practices are paramount. If IT professionals are not securely and responsibly disposing of assets, they\u2019re ignoring the final stage of the IT asset life cycle and potentially negatively impacting their bottom lines.<\/p>\n<h4>An expensive mistake \u2013 from both a financial and reputation perspective<\/h4>\n<p>A good reputation is hard to establish and can be even harder to protect. If a company\u2019s name is tarnished by a data breach, not only must it go into damage control to rebuild its reputation, there\u2019s also a very real financial cost.<\/p>\n<p>Since the dawn of the new millennium, more than 5 billion users have been affected by data breaches. The average cost of a data breach is now almost $4 million, which represents an average of 25,575 records at an average cost of $150 per record. According to the\u00a0<a href=\"https:\/\/www.hipaajournal.com\/2019-cost-of-a-data-breach-study-healthcare-data-breach-costs\/\"><em>HIPAA Journal<\/em><\/a>, the health care industry feels the sting of a breach even more, at\u00a0<a href=\"https:\/\/www.hipaajournal.com\/2019-cost-of-a-data-breach-study-healthcare-data-breach-costs\/\">a cost of $429 per record<\/a>.<\/p>\n<p><strong>Beyond security patches and shredding: ITAD<\/strong><\/p>\n<p>When IT gear reaches its end of life or end of service, it needs to be retired or decommissioned responsibly. Servers and hard drives can store bits of data that still contain sensitive information subject to industry-related or general compliance standards. Data security and compliance do not begin and end with real-time security, end-user training, patches, shredding, and backups but with the final disposal of assets.<\/p>\n<p>ITAD can be complex. The guidelines for data destruction include NIST 800-88, PCI DSS, and ISO 27001, three security standards that dictate how digital media (such as hard drives) are destroyed when no longer in use. IT managers are ultimately responsible for choosing how to dispose of their organization\u2019s data, defining processes, and implementing those processes.<\/p>\n<p>Two major decisions for data destruction are:<\/p>\n<ol>\n<li>classifying information based on value, legal requirements, sensitivity, and organizational need; and<\/li>\n<\/ol>\n<p>finding the best data destruction process based on the value of the information (and the IT assets in question) to the company and its stakeholders.<\/p>\n<h4>Finding peace of mind \u2013 and money \u2013 in ITAD<\/h4>\n<p>ITAD always should be viewed through the lens of data security first. But importantly, it should be recognized as a way to enhance IT budgets. Just as ITAD is a critical prong in a data breach prevention strategy, IT asset value recovery should be an important consideration in the budget management process.<\/p>\n<p>When shopping for an ITAD partner, I suggest looking for:<\/p>\n<ul>\n<li>Certification \u2013 Find a vendor who is certified to destroy data, preferably through\u00a0<a href=\"https:\/\/www.naid-online.org\/\">the National Association for Information Destruction<\/a><a href=\"https:\/\/nextuse.us\/understand-the-differences-between-r2-and-naid-aaa-certifications\/\">\u00a0(NAID)<\/a><u>,<\/u>\u00a0Phoenix.<\/li>\n<li>Competitive bidding \u2013 Seek out organizations that have deep connections within the IT industry so they can offer accurate valuations on your equipment.<\/li>\n<li>Compliance \u2013 Ensure that the vendor understands<a href=\"https:\/\/nextuse.us\/certifications-and-compliance\/\">\u00a0your industry\u2019s compliance requirements<\/a>\u00a0and can provide you the necessary documentation upon job completion.<\/li>\n<li>Responsible disposal \u2013 Any and all waste or scrap should be properly disposed of, not exported, or placed in a landfill.<\/li>\n<\/ul>\n<p>Ultimately, a better understanding of ITAD will help you be a good environmental citizen, ensure data security, protect your brand reputation, improve your return on investment, and positively impact your company\u2019s bottom line.<\/p>\n<p>&nbsp;<\/p>\n<p>Author: NextUse<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"post-excerpt\" class=\"post-excerpt\">ITAD Blog Data Breaches and ITAD ITAD Blog DATA BREACHES AND ITAD&hellip;<\/p>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\">Continue reading<span class=\"screen-reader-text\"> &#8220;ITAD Blog:  Data breaches and ITAD&#8221;<\/span>&hellip;<\/a><\/div>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\">Continue reading<span class=\"screen-reader-text\"> \"ITAD Blog:  Data breaches and ITAD\"<\/span>&hellip;<\/a><\/div>","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7258","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ITAD Blog: Data breaches and ITAD - ITAD Summit - Las Vegas - August 2026 - Conference<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITAD Blog: Data breaches and ITAD - ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:description\" content=\"ITAD Blog Data Breaches and ITAD ITAD Blog DATA BREACHES AND ITAD&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-16T14:21:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\",\"url\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\",\"name\":\"ITAD Blog: Data breaches and ITAD - ITAD Summit - Las Vegas - August 2026 - Conference\",\"isPartOf\":{\"@id\":\"https:\/\/www.itadsummit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg\",\"datePublished\":\"2020-07-16T13:35:42+00:00\",\"dateModified\":\"2020-07-16T14:21:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#primaryimage\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.itadsummit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITAD Blog: Data breaches and ITAD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itadsummit.com\/#website\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"description\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"publisher\":{\"@id\":\"https:\/\/www.itadsummit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itadsummit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.itadsummit.com\/#organization\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"width\":744,\"height\":289,\"caption\":\"ITAD Summit - Las Vegas - August 2026 - Conference\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ITAD Blog: Data breaches and ITAD - ITAD Summit - Las Vegas - August 2026 - Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/","og_locale":"en_US","og_type":"article","og_title":"ITAD Blog: Data breaches and ITAD - ITAD Summit - Las Vegas - August 2026 - Conference","og_description":"ITAD Blog Data Breaches and ITAD ITAD Blog DATA BREACHES AND ITAD&hellip;","og_url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/","og_site_name":"ITAD Summit - Las Vegas - August 2026 - Conference","article_modified_time":"2020-07-16T14:21:41+00:00","og_image":[{"url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/","url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/","name":"ITAD Blog: Data breaches and ITAD - ITAD Summit - Las Vegas - August 2026 - Conference","isPartOf":{"@id":"https:\/\/www.itadsummit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#primaryimage"},"image":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg","datePublished":"2020-07-16T13:35:42+00:00","dateModified":"2020-07-16T14:21:41+00:00","breadcrumb":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#primaryimage","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/cyberspace-circle.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-data-breaches-and-itad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itadsummit.com\/"},{"@type":"ListItem","position":2,"name":"ITAD Blog: Data breaches and ITAD"}]},{"@type":"WebSite","@id":"https:\/\/www.itadsummit.com\/#website","url":"https:\/\/www.itadsummit.com\/","name":"ITAD Summit - Las Vegas - August 2026 - Conference","description":"ITAD Summit - Las Vegas - August 2026 - Conference","publisher":{"@id":"https:\/\/www.itadsummit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itadsummit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itadsummit.com\/#organization","name":"ITAD Summit - Las Vegas - August 2026 - Conference","url":"https:\/\/www.itadsummit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","width":744,"height":289,"caption":"ITAD Summit - Las Vegas - August 2026 - Conference"},"image":{"@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7258"}],"collection":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/comments?post=7258"}],"version-history":[{"count":4,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7258\/revisions"}],"predecessor-version":[{"id":7317,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7258\/revisions\/7317"}],"wp:attachment":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/media?parent=7258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}