Disposal Management

The latest ITAD and Disposal Management News from IAITAM

Erasure Method for Mobile Devices – Understanding the Options by Type of Device

Mobile Device Erasure

By Ryan Laber & Steve Manalac, Arrow Value Recovery The proliferation of smartphones and tablets within the enterprise is prompting many asset managers and other IT professionals to examine their data destruction strategy.  According to a recent Gartner report, by 2017 the majority of end-point data breaches will shift from personal computing to smartphones and tablets. Of those breaches, 75% ...

Read More »

FTC as Data Security Watch Dogs – Data Security Enforcement on the Rise

By Matt MacLean, Cascade Asset Management ITAK V10 I4 Unfortunately, 2014 was another banner year for data breach incidents, resulting in numerous class actions and government investigations.  Data security protection was thought to be coming from the Department of Homeland Security, in the form of its Framework for Improving Critical Infrastructure Cybersecurity developed by the National Institute of Standards and ...

Read More »

IT Lifecycle Management – Avoiding Potential Loss of Control

By Jeffrey Dean, Arrow Electronics ITAK V10 I4 According to the Department of Justice, the term “breach” as it relates to data “is used to include the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users and for an other than authorized purpose have access or ...

Read More »

Combining ITAM and ITSM Processes – ITAM considerations in two popular ITSM processes

By Chris Borkert, Linium LLC ITAK V10 I2 Organizations are increasingly trying to combine what were traditionally separate IT Asset Management (ITAM) and IT Service Management (ITSM) functions.  These business processes may also assume other names such as IT Cost Management, Business Service Management, and others.  The motivation for combining processes may be driven by the implementation of a tool ...

Read More »

Changing Data Breach Response – Investor Rights as the Stimulus for Data Protection, Breach Response and IT Asset Management

By Bob Johnson, NAID ITAK V10 I1 At the height of the 2013 holiday buying season, Target department stores, the second largest retailer in the U.S., announced its payment card system had been hacked, resulting in unauthorized access to the private information of more than 110 million customers.  As a direct fall out, their longtime, highly successful CEO resigned, the ...

Read More »