Certified, Corporate-Grade Data Destruction

How We Keep Your Data Secure

1
Secure Transportation & Storage

All devices with data storage will be received by authorized Human-I-T personnel at a NAID-certified, secure facility where they will be physically secured and closely supervised until processed. 

For organizations who do not want their devices transported, authorized Human-I-T personnel are also available for on-site data destruction and physical asset disposition in Los Angeles and the surrounding areas.

2
Comprehensive Data Sanitization

Using a NIST 800-88 method, random data is written through the entirety of the device with data storage in order to destroy all recoverable data on the device. The device with data storage is then re-scanned to verify that 100% of all sensitive information has been destroyed.

3
Physical Crushing of Remaining Assets

If we cannot erase all sensitive data using our software, the device with data storage will be physically crushed and recycled in an environmentally sound manner, via an R2-certified organization.

Providing you assurance with comprehensive verification

Just the extra steps we take so you don’t have to. Because we understand that with all your other difficult job responsibilities, direct oversight of tech disposal shouldn’t have to be one of them.

Certifies that all items which have been appropriately accounted for have been destroyed.

Example Certificate

A serialized PDF report  of all devices with data storage that had their data sanitized to show you things like the items’ serial numbers, their Human-I-T donation IDs, and the date they were each received.

Example Report

Similar to the Data Destruction Report, this report provides all the information you’ll want about the devices that were physically shredded, including serial number, destruction method, and technician name.

Example Report

The Chain of Custody

Human-I-T Secure Pickups

Your donation will be loaded onto a GPS-tracked truck equipped with four cameras: one road-facing camera, one inside the cabin, one inside the truck box, and one rear-facing camera. The rear-facing camera enables you to watch your items as they’re loaded onto the truck, while the truck box allows a continuous view of the items during transit. Each of the cameras deliver live feeds while the truck is on, and up to two months of footage from the truck can be accessed at all times.

Shipped Donations

Whether your donation is shipped to us via parcel or freight, we can provide real-time parcel tracking upon request – that way you don’t have to wonder where your donation is.

Prepaid Laptop Boxes 

If your donations exclusively contain laptops, Human-I-T can provide you with locked, padded laptop boxes to make it easy for you to safely and securely ship us your items. 

Facility Security 

All items are physically locked away in a NAID- and ISO-certified facility that is kept secure by advanced ADT security systems and cameras. All volunteers and personnel are required to pass a rigorous background check in order to access the facility.

Technology Partners

Our data destruction process is compliant with the following laws:

HIPAA

Data Security for Health Plans, Health Care Clearinghouses, and Health Care Providers

HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed.

Workstation and Device Security. A covered entity must implement policies and procedures to specify proper use of and access to workstations and electronic media. A covered entity also must have in place policies and procedures regarding the transfer, removal, disposal, and re-use of electronic media, to ensure appropriate protection of electronic protected health information (e-PHI).

GLBA

Data Security for Banks and Financial Institutions

The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data. Specifically, human-I-T helps assist Banks, Credit Unions and other companies adhere to the Federal Trade Commission’s (FTC’s) Disposal Rule. Where applicable, the GLBA requires that customer information is disposed of in a secure way.

FACTA

Data Security for Credit Institutions and Reporting Agencies

The Fair and Accurate Credit Transaction Act of 2003 (FACTA) added sections to the federal Fair Credit Reporting Act (FCRA, 15 U.S.C. 1681 et seq.), intended primarily to help consumers fight the growing crime of identity theft. Accuracy, privacy, limits on information sharing, and new consumer rights to disclosure are included in FACTA.

FISMA

Data Security for Federal Executive Branch Civilian Agencies

FISMA requires federal agencies to implement a mandatory set of processes and system controls designed to ensure the confidentiality, integrity, and availability of system-related information. The processes and systems controls in each federal agency must follow established Federal Information Processing Standards, National Institute of Standards and Technology standards, and other legislative requirements pertaining to federal information systems, such as the Privacy Act of 1974.

PIPEDA

Data SEcurity for Private SEctor Organizations and Commercial Activity

The Personal Information Protection and Electronic Documents Act (PIPEDA) sets out ground rules for how private sector organizations may collect, use or disclose personal information in the course of commercial activities. PIPEDA also applies to federal works, undertakings and businesses in respect to employee personal information. The law gives individuals the right to access and request correction of the personal information these organizations may have collected about them.

SOX

Data Security for Public Companies and Financial Reporting

The Sarbanes-Oxley Act of 2002 (SOX) mandated a number of reforms to enhance corporate responsibility, enhance financial disclosures and combat corporate and accounting fraud. It created the “Public Company Accounting Oversight Board,” also known as the PCAOB, to oversee the activities of the auditing profession.

FAQs

What is the Human-I-T data sanitization process?

We sanitize all devices with data storage at our NAID-certified facilities using DoD and HIPAA-compliant NIST 800-88 software. In the event not all data can be destroyed, we crush the storage and then responsibly dispose of the physical assets through an R2-certified organization.

What data security certifications does Human-I-T have?

We are NAID AAA Certified. More specifically, this certification recognizes that our facilities passed rigorous, unannounced audits by the National Association of Information Destruction to ensure every element of our data security and destruction practices.

What type of data destruction reporting does Human-I-T provide?

Every donation comes with a general Certificate of Data Destruction. For an added layer of data security reporting, we can also offer a Data Sanitization Wipe Report or Physical Crushing Report. Please connect with your Human-I-T representative to discuss our reporting options further!

Ready to start making an impact with your technology or have more questions?

Please provide your information here and a Human-I-T representative will be in touch in 1 business day.