{"id":7980,"date":"2021-03-04T11:53:34","date_gmt":"2021-03-04T16:53:34","guid":{"rendered":"https:\/\/www.itadsummit.com\/?page_id=7980"},"modified":"2021-03-04T11:53:34","modified_gmt":"2021-03-04T16:53:34","slug":"itad-blog-what-is-a-data-destruction-policy-and-why-it-matters","status":"publish","type":"page","link":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/","title":{"rendered":"ITAD Blog: What is a Data Destruction Policy and Why it Matters"},"content":{"rendered":"<h1>\n\t\tITAD Blog\n\t<\/h1>\n<h6>\n\t\tWhat is a Data Destruction Policy and Why It Matters \n\t<\/h6>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg\" alt=\"Data\" itemprop=\"image\"  \/>\n\t<h1>ITAD Blog<\/h1>\n<h3><strong>WHAT IS DATA DESTRUCTION POLICY AND WHY IT MATTERS<\/strong><\/h3>\n\t<p>In previous decades, a\u00a0<strong>data destruction policy<\/strong>\u00a0was needed to ensure that paper documents and recording tape were shredded and destroyed. While that remains true in our current information age, the way data is collected and destroyed as well as the vast quantity companies now collect calls for far more rigorous data destruction policies.<\/p>\n<p>What exactly does such a policy entail, and perhaps more importantly, why does having a robust data destruction policy matter so much?<\/p>\n<h2><strong>What is a Data Destruction Policy?<\/strong><\/h2>\n<p>Whenever an organization discards old or redundant IT assets such as computer hard drives, cell phones, or other storage media (e.g. DVDs, USB drives), a policy needs to be in place to ensure that any data stored therein is adequately rendered irretrievable.<\/p>\n<p>These policies must be created within the organization and enforced in order to remain effective. When creating a policy for\u00a0<a href=\"https:\/\/wisetekusa.com\/data-destruction-service\/\"><strong>data destruction<\/strong><\/a>\u00a0and disposal, it\u2019s important to consider all of the relevant factors, so try to involve voices and opinions from different branches of your organization.<\/p>\n<h2><strong>Why Should my Organization Implement a Data Destruction Policy?\u00a0<\/strong><\/h2>\n<p>In our private lives, a simple delete and clearing of the recycling bin \u2013 for most intents and purposes \u2013 might seem to be enough for some of us. But what would happen if your personal contact information such as an address, passport information, and\/or contact information fell into the wrong hands?<\/p>\n<p>If your personal computer has a potential gold mine of usable data, imagine how much data a large corporation handles on a daily basis. Businesses handling thousands of customers\u2019 personal data cannot leave it to chance, so a robust policy for data destruction must be put in place and enforced.<\/p>\n<h2><strong>Why Having a Data Destruction Policy Matters\u00a0<\/strong><\/h2>\n<p>There\u2019s simply no getting around the fact that data breaches are growing both in number as well as magnitude. Some of the more infamous cases in terms of severity include Equifax, who\u00a0had exposed nearly 150 million US accounts and had to pay over $700 million, and; Sony Playstation Network, where 77 million users\u2019 personal data (far more than login information!) were exposed at a total cost of $171 million.<\/p>\n<p>These are, of course, notable examples of data breaches.\u00a0<a href=\"https:\/\/www.ibm.com\/security\/data-breach\">IBM has\u00a0revealed<\/a>\u00a0that the average cost of a data breach is $3.92 million, but that\u2019s a global average. In the United States, this figure is estimated to be $8.19 million, making it the costliest nation for data breaches.<\/p>\n<p>It should be evident that having a data destruction policy matters now more than ever since secure data destruction and policies designed to better handle and dispose of IT assets are amongst the most effective means of minimizing data breaches altogether.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>How to Get Started\u00a0<\/strong><\/p>\n<p>There are plenty of details that may be specific to the circumstances of your organization, so the following is an overly general description of the core inclusions worthy of considering in a data destruction policy.<\/p>\n<p>First and foremost, all company IT assets should be listed in an inventory, from USB drives to individual computer workstations. You may wish to further categorize each IT asset based on security levels, such as classified for hard drives containing sensitive data and low-priority for DVDs containing promotional marketing material, for example.<\/p>\n<p>Next, create a plan for how your organization ought to discard\u00a0<strong>redundant IT assets<\/strong>\u00a0before they are disposed of. This could include, for example, using online or boot drive wiping software for hard drives as well as factory resets on iPhones and company cell phones. It\u2019s always a good idea to follow up with a quality check to ensure that no sensitive data is left behind.<\/p>\n<p>Last, and perhaps most importantly, you must find an effective way of disposing of IT assets with our precious environment in mind. As of 2021, nearly every state in the Union has\u00a0<a href=\"https:\/\/www.ncsl.org\/research\/telecommunications-and-information-technology\/data-disposal-laws.aspx\">data disposal laws<\/a>\u00a0that\u00a0prohibit the improper disposal of media containing sensitive data. Wisetek is committed to a Zero-Landfill Policy, so rest assured that your organization\u2019s IT assets will not contribute to the growing e-waste crisis. We also provide refurbishment and remarketing services, all within our circular economy model.<\/p>\n<p>It is imperative that you employ the services of an\u00a0<a href=\"https:\/\/wisetekusa.com\/it-asset-disposition-providers\/\"><strong>IT asset disposition<\/strong><\/a>\u00a0(ITAD) company such as Wisetek that is also NAID-certified to ensure that your organization remains compliant. These specialized companies often provide many ancillary services to better keep your organization safe, compliant, and at minimal risk to costly data breaches.<\/p>\n<p><strong>Important Factors to Consider When Forming a Policy\u00a0<\/strong><\/p>\n<p>Any policy can be rendered ineffective if your organization fails to maintain good due diligence or lacks enforcement of the said policy. This applies to data destruction policies as well.<\/p>\n<p>Everyone in your organization from entry-level employees to c-suite management should be aware of the policy, understand its contents, its importance, and how to adhere to the policy in their day-to-day tasks. This may necessitate additional training or workshops, or perhaps a company-wide email will do \u2013 this depends on what you think is best for your organization.<\/p>\n<p>Another important consideration pertains to good record-keeping. Even with the assistance of an\u00a0<a href=\"https:\/\/wisetekusa.com\/itad\/\"><strong>ITAD company<\/strong><\/a>\u00a0for data destruction, you\u2019ll want to have sufficient means to prove that your data is being disposed of properly and that your organization is exercising its proper due diligence. Always ask your ITAD company for\u00a0<a href=\"https:\/\/wisetekusa.com\/data-destruction-certificate\/\"><strong>data destruction certificates<\/strong><\/a>. Should your company ever face an audit, these documents act as proof and validity that IT assets are being disposed of?<\/p>\n<p>Data destruction is a serious matter now and going into our increasingly digital business world. Policies pertaining to data destruction and disposal are therefore no longer a \u2018good to have\u2019 but\u00a0<em>must\u2013haves<\/em>, so make sure your organization is doing its part.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Author: Wisetek<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"post-excerpt\" class=\"post-excerpt\">ITAD Blog What is a Data Destruction Policy and Why It Matters&hellip;<\/p>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\">Continue reading<span class=\"screen-reader-text\"> &#8220;ITAD Blog: What is a Data Destruction Policy and Why it Matters&#8221;<\/span>&hellip;<\/a><\/div>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\">Continue reading<span class=\"screen-reader-text\"> \"ITAD Blog: What is a Data Destruction Policy and Why it Matters\"<\/span>&hellip;<\/a><\/div>","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7980","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ITAD Blog: What is a Data Destruction Policy and Why it Matters - ITAD Summit - Las Vegas - August 2026 - Conference<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITAD Blog: What is a Data Destruction Policy and Why it Matters - ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:description\" content=\"ITAD Blog What is a Data Destruction Policy and Why It Matters&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\",\"url\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\",\"name\":\"ITAD Blog: What is a Data Destruction Policy and Why it Matters - ITAD Summit - Las Vegas - August 2026 - Conference\",\"isPartOf\":{\"@id\":\"https:\/\/www.itadsummit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg\",\"datePublished\":\"2021-03-04T16:53:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#primaryimage\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.itadsummit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITAD Blog: What is a Data Destruction Policy and Why it Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itadsummit.com\/#website\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"description\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"publisher\":{\"@id\":\"https:\/\/www.itadsummit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itadsummit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.itadsummit.com\/#organization\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"width\":744,\"height\":289,\"caption\":\"ITAD Summit - Las Vegas - August 2026 - Conference\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ITAD Blog: What is a Data Destruction Policy and Why it Matters - ITAD Summit - Las Vegas - August 2026 - Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/","og_locale":"en_US","og_type":"article","og_title":"ITAD Blog: What is a Data Destruction Policy and Why it Matters - ITAD Summit - Las Vegas - August 2026 - Conference","og_description":"ITAD Blog What is a Data Destruction Policy and Why It Matters&hellip;","og_url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/","og_site_name":"ITAD Summit - Las Vegas - August 2026 - Conference","og_image":[{"url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/","url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/","name":"ITAD Blog: What is a Data Destruction Policy and Why it Matters - ITAD Summit - Las Vegas - August 2026 - Conference","isPartOf":{"@id":"https:\/\/www.itadsummit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#primaryimage"},"image":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg","datePublished":"2021-03-04T16:53:34+00:00","breadcrumb":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#primaryimage","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/Data-circle.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-what-is-a-data-destruction-policy-and-why-it-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itadsummit.com\/"},{"@type":"ListItem","position":2,"name":"ITAD Blog: What is a Data Destruction Policy and Why it Matters"}]},{"@type":"WebSite","@id":"https:\/\/www.itadsummit.com\/#website","url":"https:\/\/www.itadsummit.com\/","name":"ITAD Summit - Las Vegas - August 2026 - Conference","description":"ITAD Summit - Las Vegas - August 2026 - Conference","publisher":{"@id":"https:\/\/www.itadsummit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itadsummit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itadsummit.com\/#organization","name":"ITAD Summit - Las Vegas - August 2026 - Conference","url":"https:\/\/www.itadsummit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","width":744,"height":289,"caption":"ITAD Summit - Las Vegas - August 2026 - Conference"},"image":{"@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7980"}],"collection":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/comments?post=7980"}],"version-history":[{"count":2,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7980\/revisions"}],"predecessor-version":[{"id":7983,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7980\/revisions\/7983"}],"wp:attachment":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/media?parent=7980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}