Disposal Management

The latest ITAD and Disposal Management News from IAITAM

Checklist: Protecting Data During IT Asset Disposition

While not every business is required to protect each speck of data stored on their IT equipment, most companies find it’s in their best interest to do so anyway. However, without structure or guidance along with the large variety of devices storing data such as servers, hard drives, mobile devices, printers and more, some data can be overlooked by accident. ...

Read More »

The Dirty Problem of CRT Glass

By Dan Ingouf While attending the 2015 IAITAM ACE in San Diego, CA, I found myself in the midst of enjoyable and informative conversations with members and vendors.  In one conversation about disposal, the topic of types of IT equipment and disposal methods came up and my curiosity was piqued by the comment “we don’t see many CRT (cathode ray ...

Read More »

Turning Up the Heat on E-Waste

Cleaning up the planet is a big job and unfortunately, electronic waste (including organizational IT equipment) is a major contributor to the problem.  Although the exact amount of illegal e-waste is unknown, the United Nations Environmental Programme (UNEP) suggests that 60 – 90% of e-waste is being illegally traded or dumped, costing countries as much as $18.8 billion.   UN Under-Secretary-General ...

Read More »

Erasure Method for Mobile Devices – Understanding the Options by Type of Device

Mobile Device Erasure

By Ryan Laber & Steve Manalac, Arrow Value Recovery The proliferation of smartphones and tablets within the enterprise is prompting many asset managers and other IT professionals to examine their data destruction strategy.  According to a recent Gartner report, by 2017 the majority of end-point data breaches will shift from personal computing to smartphones and tablets. Of those breaches, 75% ...

Read More »

FTC as Data Security Watch Dogs – Data Security Enforcement on the Rise

By Matt MacLean, Cascade Asset Management ITAK V10 I4 Unfortunately, 2014 was another banner year for data breach incidents, resulting in numerous class actions and government investigations.  Data security protection was thought to be coming from the Department of Homeland Security, in the form of its Framework for Improving Critical Infrastructure Cybersecurity developed by the National Institute of Standards and ...

Read More »

IT Lifecycle Management – Avoiding Potential Loss of Control

By Jeffrey Dean, Arrow Electronics ITAK V10 I4 According to the Department of Justice, the term “breach” as it relates to data “is used to include the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users and for an other than authorized purpose have access or ...

Read More »

Combining ITAM and ITSM Processes – ITAM considerations in two popular ITSM processes

By Chris Borkert, Linium LLC ITAK V10 I2 Organizations are increasingly trying to combine what were traditionally separate IT Asset Management (ITAM) and IT Service Management (ITSM) functions.  These business processes may also assume other names such as IT Cost Management, Business Service Management, and others.  The motivation for combining processes may be driven by the implementation of a tool ...

Read More »