End-to-End Data Security
You already spend a great deal of time, money, and human resources defending your active data. Why let that work and investment go to waste by failing to administer the same security diligence for data after its hosting hardware has been phased out of your facilities? You may no longer need those units, but that doesn’t mean your data security responsibilities end there. Rather, you should secure the residual data with the same dedication with which you safeguard your active hardware and data (because we all know how ugly data breaches can be).
No one wants to be the next big data breach. And because data is one of your company’s most valuable assets, you need an ITAD partner that takes the proper precautions during the decommissioning process.
Guaranteed Chain of Custody
CentricsIT provides secure chain of custody for every hardware shipment by default, and we have documentation, physical parameters, and fail-safes to prove it.
Upon arrival, your units are carefully packed in Secure Transportable Units for Data Destruction, or “STUDD” for short (see our website14 for more details). This lockable bin securely contains your data-bearing units from your facility to ours, with each lock being uniquely identifiable.
The STUDDs are then loaded into point-to-point, dedicated trucks; “dedicated” meaning that the truck does not stop or pick up other clients’ units along the way. Our drivers are highly vetted and experienced within the industry.
Each truck is cable-sealed with a serialized lock. Our drivers (and you) will know immediately if there has been unauthorized access.
Pictures are taken throughout the entire shipment process to provide physical evidence of comprehensive security statuses. Our technicians take pictures of each locking mechanism before we leave your data center. Pictures are taken if/when drivers are relieved. Final pictures are taken upon arrival at our warehouse.
If your vendor is unwilling to provide you with the proper documentation and empirical assurances, don’t hire them. CentricsIT provides the proper documentation and procedures to guarantee your data (and your brand’s) security from end-to-end.
Compliance and Peace of Mind
Every service provided by CentricsIT is backed by our Certificate of Secure Data Erasure or Certificate of Secure Data Destruction. You will receive this certificate, along with detailed reporting, when your services are completed.
Security certificates and reports are important documents to have for compliance and auditing purposes. CentricsIT will make every effort to accommodate your logging and reporting requirements to help you remain compliant by any standards, whether internal to your organization or mandated by any governing authority.
Keep track of your decommissioned assets and Certificates through the CentricsIQ portal. When you engage the project team at CentricsIT, we become one with your internal team, delivering updates in real-time through the CentricsIQ collaboration tool. Logging in to CentricsIQ gives your team the ability to communicate with CentricsIT in real-time, check your asset lists, or access previous Certificates of Secure Data Erasure or Certificates of Secure Data Destruction. Transparency and collaboration are the keys to our ongoing customer relationships—and the backbone of our service delivery model.