Secure Destruction FAQ: Data Wiping
As Method #1 in Sipi Asset Recovery’s portfolio for secure data destruction, data wiping carries with it many benefits for your ITAD program. It doesn’t require complex implementation, for example — nor does it produce environmental waste. This method also can result in higher recovered value from your IT assets.
John McLeod, VP of Sales & Marketing and Eric Dorn, Senior Vice President & General Manager of Sipi Asset Recovery help explain the pros and cons of data wiping:
Q: What is secure data wiping?
A: At its most basic level, secure data wiping is using software to overwrite the existing data with 0s and 1s. Drives can be overwritten one or many times and are often completed with a random pattern and a verification pass.
Q: Which asset disposition issue does this address?
A: Secure data wiping addresses three main issues: 1) it retains the most value when compared to the other three methods of destruction, 2) it doesn’t require complex technology or implementation and 3) it doesn’t contribute to any environmental concerns associated with other methods.
Q: What are the missing elements or concerns with this method?
A: The potential risks of this method would be to ensure the process is done properly and effectively. Although, not all drives will complete the wiping process successfully. Wipe failures must have a subsequent destruction method used to assure proper sanitization occurs. At least one additional method will be needed to complete a full wiping process. It is not possible to visually distinguish between a wiped and unwiped drive, so a robust tracking and inventory management system is recommended.
Q: When and why would an enterprise use Method 1?
A: Depending on the risk posture of the assets, secure data wiping may be a sufficient method. This method allows you to recover value from the asset as the other three methods do not.