WE TAKE DATA SECURITY SERIOUSLY

SEE OUR INDUSTRY-STANDARD PROCESS

At Memory For Memory, our most important service is data security.  All data bearing assets (Hard Drives, Network Switches, Phones, etc) are erased, cleared, or destroyed before they leave our care custody and control.  Any client identifiable information (asset tags, personal stickers,etc) are removed from an item before it can be certified. Our secure chain of custody and data destruction service meets or exceeds all industry-specific regulations, including:

  • FACTA (Fair and Accurate Credit Transactions Act)

  • GLB (Gramm-Leach Bliley) – banking and financial institutions

  • Sarbanes-Oxley Act

  • HIPAA (Health Insurance Portability and Accountability Act)/HITECH

  • PCI DSS (PCI Data Security Standard)

  • SOX (The Sarbanes-Oxley Act)

Memory for Memory provides a certificate of Recycling and Data Security for each project received from our donors.  The certificate verifies that all items are recycled in accordance with all State, Local and Federal Laws, as well as all data and personal information, has been removed in accordance with NIST 800.88 and DOD 5220.22M.

STEP 1

Upon removal from a client’s location all asset are assigned a project / tracking number to ensure the hardware is tracked thought its end of life process.

STEP 1

Upon removal from a client’s location all asset are assigned a project / tracking number to ensure the hardware is tracked thought its end of life process.

STEP 2

Assets are received at the Memory for Memory Facility processing. All asset tags and other identifiable stickers or markers are removed from the item.

 

STEP 3

For PCs, Servers or Laptops, and any other item that contain a removable hard drive, all hard drives are pulled before the computer is booted to ensure no data is exposed.  All other data bearing devices (tablets, cell phones, network gear, etc) follow a strict protocol to clear them of any data.

 

STEP 3

For PCs, Servers or Laptops, and any other item that contains a removable hard drive, all hard drives are pulled before the computer is booted to ensure no data is expose.  All other data bearing devices (tablets, cell phones, network gear, etc) follow a strict protocol to clear them of any data.

STEP 4

Reusable hard drives are erased following the National Institute of Standards and Technology Guidelines for Media Sanitization (NIST 800-88).

STEP 5

Non-reusable hard drives are immediately crushed and then shredded.

STEP 5

Non-reusable hard drives are immediately crushed and then shredded.

CERTIFICATE OF RECYCLING

Together we can make memories last for a lifetime.

 

STEP 6

All items processed by Memory for Memory receive a certificate of recycling and data security to validate the secure, EPA approved, recycling of the donated items.

SCHEDULE A PICKUP TODAY

Pin It on Pinterest

Share This