{"id":7579,"date":"2020-10-08T10:45:42","date_gmt":"2020-10-08T14:45:42","guid":{"rendered":"https:\/\/www.itadsummit.com\/?page_id=7579"},"modified":"2020-10-08T10:45:42","modified_gmt":"2020-10-08T14:45:42","slug":"itad-blog-remote-employees-and-data-security-a-cautionary-tale","status":"publish","type":"page","link":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/","title":{"rendered":"ITAD Blog:  REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE"},"content":{"rendered":"<h1>\n\t\tITAD Blog\n\t<\/h1>\n<h6>\n\t\tREMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE\n\t<\/h6>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg\" alt=\"Remote1\" itemprop=\"image\"  \/>\n\t<h1>ITAD Blog<\/h1>\n<h3><strong>REMOTE EMPLOYEE AND DATA SECURITY: A CAUTIONARY TALE<\/strong><\/h3>\n\t<p>A major investment bank and financial services company recently became the target of multiple lawsuits filed by clients for possible data breaches stemming from the improper handling of decommissioned computer equipment at the firm\u2019s branch offices.<\/p>\n<p>This type of nightmare scenario can happen to virtually any type or size of businesses, even large multinational corporations with well-staffed IT departments. Throw in a pandemic, driving the migration of employees to a work-from-home model, and I fear the risk has increased significantly.<\/p>\n<p>Think about it. IT departments, accustomed to functioning in a highly controlled, centralized manner, now must manage laptops and other devices at hundreds or even thousands of remote locations. So, what happens when those devices need to be decommissioned? And how does a company safeguard sensitive data on those devices, especially while in transit?<\/p>\n<p>As reported in an industry trade journal, the financial institution mentioned above trusted an IT asset disposition (ITAD) vendor to scrub data from the decommissioned devices. You would think a company specializing in ITAD would be extra vigilant in the handling of hardware with sensitive data, particularly at a time when data security has received so much attention.<\/p>\n<p>In fact, doing ITAD right is inherently difficult \u2014 and the challenges are compounded when employees and their devices are widely dispersed, as they certainly are with today\u2019s work-from-home model. Clearly, it\u2019s more important than ever to choose a partner that possesses a proven track record with remote IT hardware services (RITHS). Criteria used in the vendor evaluation process should include:<\/p>\n<ul>\n<li><strong>Robust industry certifications, especially NAID AAA Certification, which verifies compliance with all known data protection laws through surprise audits by trained, accredited security professionals<\/strong><\/li>\n<li><strong>Data sanitization or destruction that complies with Department of Defense, National Institute of Standards and Technology (NIST) 800-88, and NAID standards<\/strong><\/li>\n<li><strong>Control over the entire \u201cchain of custody,\u201d from the time a device is picked up at an employee\u2019s work location until it is processed and scrubbed of sensitive data<\/strong><\/li>\n<li><strong>The option of a cloud-based, scalable solution for employees to perform their own data sanitization before shipping decommissioned hardware<\/strong><\/li>\n<li><strong>Adequate liability insurance (minimum $10 million) to cover data breaches<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>Author: Dynamic Lifecycle Innovations<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"post-excerpt\" class=\"post-excerpt\">ITAD Blog REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE ITAD Blog&hellip;<\/p>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\">Continue reading<span class=\"screen-reader-text\"> &#8220;ITAD Blog:  REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE&#8221;<\/span>&hellip;<\/a><\/div>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\">Continue reading<span class=\"screen-reader-text\"> \"ITAD Blog:  REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE\"<\/span>&hellip;<\/a><\/div>","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7579","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE - ITAD Summit - Las Vegas - August 2026 - Conference<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE - ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:description\" content=\"ITAD Blog REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE ITAD Blog&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\",\"url\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\",\"name\":\"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE - ITAD Summit - Las Vegas - August 2026 - Conference\",\"isPartOf\":{\"@id\":\"https:\/\/www.itadsummit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg\",\"datePublished\":\"2020-10-08T14:45:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#primaryimage\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.itadsummit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itadsummit.com\/#website\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"description\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"publisher\":{\"@id\":\"https:\/\/www.itadsummit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itadsummit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.itadsummit.com\/#organization\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"width\":744,\"height\":289,\"caption\":\"ITAD Summit - Las Vegas - August 2026 - Conference\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE - ITAD Summit - Las Vegas - August 2026 - Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/","og_locale":"en_US","og_type":"article","og_title":"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE - ITAD Summit - Las Vegas - August 2026 - Conference","og_description":"ITAD Blog REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE ITAD Blog&hellip;","og_url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/","og_site_name":"ITAD Summit - Las Vegas - August 2026 - Conference","og_image":[{"url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/","url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/","name":"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE - ITAD Summit - Las Vegas - August 2026 - Conference","isPartOf":{"@id":"https:\/\/www.itadsummit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#primaryimage"},"image":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg","datePublished":"2020-10-08T14:45:42+00:00","breadcrumb":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#primaryimage","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Remote1-circle.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-remote-employees-and-data-security-a-cautionary-tale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itadsummit.com\/"},{"@type":"ListItem","position":2,"name":"ITAD Blog: REMOTE EMPLOYEES AND DATA SECURITY: A CAUTIONARY TALE"}]},{"@type":"WebSite","@id":"https:\/\/www.itadsummit.com\/#website","url":"https:\/\/www.itadsummit.com\/","name":"ITAD Summit - Las Vegas - August 2026 - Conference","description":"ITAD Summit - Las Vegas - August 2026 - Conference","publisher":{"@id":"https:\/\/www.itadsummit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itadsummit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itadsummit.com\/#organization","name":"ITAD Summit - Las Vegas - August 2026 - Conference","url":"https:\/\/www.itadsummit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","width":744,"height":289,"caption":"ITAD Summit - Las Vegas - August 2026 - Conference"},"image":{"@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7579"}],"collection":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/comments?post=7579"}],"version-history":[{"count":2,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7579\/revisions"}],"predecessor-version":[{"id":7588,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7579\/revisions\/7588"}],"wp:attachment":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/media?parent=7579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}