WE TAKE DATA SECURITY SERIOUSLY

SEE OUR INDUSTRY-STANDARD PROCESS

At Memory for Memory, our most important service is data security.  All data bearing assets (Hard Drives, Network Switches, Phones, etc) are erased, cleared, or destroyed before they leave our care, custody, and control.  Any client identifiable information (asset tags, personal stickers, etc.) are removed from an item before it is certified.  

All data destruction methods meet or exceed NIST 800-88 standards, DoD 5200.22-M data sanitization and/or all different standards such as HIPAA/HITECH, Sarbanes-Oxley Act, Gramm-Leach-Bliley Act, FACTA Disposal Rule, Bank Secrecy Act, Patriot Act of 2002, Identity Theft and Assumption Deterrence Act, US Safe Harbor Provisions, FDA Security Regulations, PCI Data Security Standard, and all other various local, state, and federal regulation

Memory for Memory provides a certificate of Recycling and Data Security for each project received from our donors.  The certificate verifies that all items are recycled in accordance with all State, Local and Federal Laws, as well as all data and personal information has been removed in accordance with NIST 800-88 and DOD 5220.22M.

STEP 1

Upon removal from a client’s location, all assets are assigned a project/tracking number to ensure the hardware is tracked throughout its end of life process.

STEP 1

Upon removal from a client’s location, all assets are assigned a project/tracking number to ensure the hardware is tracked throughout its end of life process.

STEP 2

Assets are received at the Memory for Memory facility for processing. All asset tags and other identifiable stickers or markers are removed from the item.

 

STEP 3

For PCs, servers, laptops, and any other item that contain a removable hard drive, the hard drive is pulled before the computer is booted to ensure no data is exposed.  All other data-bearing devices (tablets, cell phones, network gear, etc) follow a strict protocol to clear them of any data.

 

STEP 3

For PCs, servers, laptops, and any other item that contains a removable hard drive, the hard drive is pulled before the computer is booted to ensure no data is exposed.  All other data bearing devices (tablets, cell phones, network gear, etc) follow a strict protocol to clear them of any data.

STEP 4

Reusable hard drives are erased following the National Institute of Standards and Technology Guidelines for Media Sanitization (NIST 800-88).

STEP 5

Non-reusable hard drives are immediately crushed and then shredded.

STEP 5

Non-reusable hard drives are immediately crushed and then shredded.

CERTIFICATE OF RECYCLING

Together we can make memories last for a lifetime.

 

STEP 6

All items processed by Memory for Memory receive a certificate of recycling and data security to validate the secure, EPA approved, recycling of the donated items.

SCHEDULE A PICKUP TODAY

Pin It on Pinterest

Share This