Skip to Search Skip to Content Skip to Footer
Sims Lifecycle Services
  • Locations
  • Blog
  • Client Portal
  • Contact
  • English
    • Deutsch
Menu
  • For Data Centers
    • Overview
    • Cloud Data Center Services
    • Colocation Data Center
    • Ultimate Decommissioning Guide
    • SLS plays a key role in helping companies manage ongoing technology shifts in data centers. Our record of success includes working with businesses, data centers and major cloud companies to provide periodic decommissioning of older data center equipment.
  • For Businesses
    • Overview
    • ITAD Services
      • RFP Template for ITAD
    • IT Asset Recovery
    • Data Destruction
      • On-Site Data Destruction
      • Bulk Data Destruction Services
      • Storage Device Types
      • Data Destruction Standards
      • Vendor Selection
    • On-Premise Data Center Decommissioning
    • E-Waste Recycling
    • ITAD Reporting and Portal
    • Logistics
    • Equipment We Process
    • SLS provides secure and compliant global IT asset disposition (ITAD), e-waste recycling and data center decommissioning services for businesses. We refurbish, repair and restore materials for continued useful life. In addition to facilitating reuse of equipment, SLS also recycles discarded electronics, transforming waste to raw material. Recycling diverts material from landfill or incineration and provides a feedstock for making next generation products.
  • For Manufacturers
    • Overview
    • Returns Management
    • Refining
    • Certified Destruction
    • Defense Contractors
    • Recycling
    • Extended Producer Responsibility
    • Portal and Reports
    • Recycling Innovation
    • How Computers Are Recycled
    • We work with manufacturers to manage reverse logistics and recover value from returned equipment. We resell whole units, manage spare parts recovery and responsibly recycle obsolete equipment. We also work with manufacturers in managing their extended producer responsibility requirements.
  • Global
    • Overview
    • Compliance
      • GDPR FAQ
    • Client Sustainability
      • Sustainability Reporting
      • Circular Economy Explained
    • International Associations
    • Consumer E-Waste
    • Leading companies trust SLS to provide a globally coordinated e-waste recycling and ITAD single solution with a high focus on data security, regulatory and corporate compliance, value recovery and sustainability.
  • About Us
    • Overview
    • Certifications
    • Sustainability at Sims
    • EH&S
    • Equipment We Process
    • Careers
    • As a business division of Sims Limited, SLS has the global reach, expertise, and infrastructure necessary to ensure to our customers that all electronic devices are processed in a secure and environmentally responsible manner.
  • News
    • Blog
    • Videos
    • Resources
    • Infographics
    • Press Releases
    • Backed by a global network of IT asset disposition and e-recycling facilities, SLS is a leader in compliant disposition and recycling of electronic equipment. Stay up-to-date with our press releases, blog, newsletter, case studies, white papers, tip sheets, infographics and videos.

NEW! - HOW TO GUIDE: Template for Developing IT Asset Disposition (ITAD) RFP

Get Your Copy

The Importance of Data Security in the Recycling Process

Menu
  • Locations
  • Blog
  • Client Portal
  • Contact
May 14, 2019
by SLS Media

Are there any electronics that do not store, access, process or backup data in today’s digital world?

Regardless of its function most electronics manage data in some way whether on a hard drive, USB flash drive, memory card or other. While this is not a new concept to consider when managing equipment in its live environment, it is often overlooked when it comes to responsible IT asset disposition (ITAD).

If you were not already considering data security in your electronics recycling plan, it would be best to prioritize it. Reports have shown the global average cost of a data breach to be $3.92 million, a figure that continues to increase. Taking every precaution to prevent a data breach from happening is extremely important.

While data breaches occur often by bypassing network security remotely, physical attempts to steal local files are common as well. Physical data theft attempts can occur whether devices are in use or are collected for recycling. There are a few areas throughout the e-recycling process where without adequate security protocols in place, items can be at risk for data threats.

Electronics are one of the most-stolen product types

When it comes to cargo-theft specifically, electronics are among the top three commodities stolen globally. 37 percent of these thefts happen while cargo is in transit, with 14 percent occurring while in the warehouse. Electronics recyclers today have to consider how they will help transport equipment back to their facility securely; and then how to maintain security of the equipment once it arrives and is prepared for further processing.

Reuse is the first step of recycling

Many businesses choose to enable reuse of their replaced or retired IT equipment as an option that delivers back the most returned value. A qualified and experienced ITAD vendor can present this to you as an opportunity for a new revenue stream and the process alone helps minimize your overall environmental impact.

It is encouraged to make sure you use an appropriate partner when considering reuse of equipment. If the recycling vendor is also managing the reuse of equipment, look into the data wiping and erasure services they provide to ensure they are performed sufficiently. For example, Blannco, a data erasure company, conducted a study that analyzed storage devices purchased on e-commerce sites and found that 42 percent still retained some data.

Read this blog post for information to reference when vetting your ITAD provider’s reuse process.

Irresponsible recycling can increase physical data threats

The process of e-Recycling involves the collection, testing/tracking, remarketing and final disposition and recycling of materials. Depending on what condition IT assets are in upon collection, data may remain on storage devices.

When working with a legitimate recycler, there will be some mechanical operation and infrastructure in place to dismantle devices, separate components (including removal of any hazardous waste), and shred materials into different sorts.

Once shredded the material is separated again, and commodities of value are sent to downstream recyclers and refineries for reuse. These refined commodities are sold to manufacturers to be made into new products.

There have been some circumstances however, where these steps were not taken and devices ended up dumped in developing countries. When this happens, it not only becomes an environmental disaster in addition to a PR nightmare, but this can also leave you at risk of data exposure as well.

In some cases, data can be retrieved from hard drives shredded for recycling

Believe it or not, if somebody really wanted to try and retrieve data from a shredded hard drive, there are ways they could attempt to rebuild the data from the shredded pieces. While unlikely, this is possible.

It is for this reason that choosing data destruction services wisely may go a long way.. Considerations for ensuring data destruction might include:

  • Erasing data (via degaussing or wiping) prior to shredding,
  • Witnessing data removal and destruction processes, and/or
  • Reviewing security standards implemented and maintained by your ITAD vendor.

A few of the top security standards that recyclers or data destruction vendors may hold around the world might include:

  • National Association for Information Destruction (NAID) AAA Certification – Global – Secure data destruction industry’s standards setting and oversight body.
  • Transported asset protection association (TAPA) – North America – Freight security requirements standard.
  • Information Security Management System (ISO 27001) – Global – Relates to the recycling of waste electrical and electronic equipment, asset management involving secure data eradication and the repair and reuse of electrical and electronic equipment.
  • Assured Service (Sanitisation) scheme (CAS-S) – United Kingdom – Scheme offered by NCSC for companies wishing to provide sanitization services to owners of highly classified Government data.

Electronics recycling is often viewed from an environmental perspective as preserving resources and minimizing waste but as you can see, these services provide much more value. It is recommended to take your ITAD program seriously and consider all security aspects of the process to ensure your company data, brand and liability is protected.

View this template for sample RFP questions that will help guide your e-waste vendor selection.

Posted in: Global ITAD Solutions, IT Asset Disposition
Previous Post Next Post

Circular Newsletter

Data Center Services

Learn More

Regions

  • Americas
  • Global
  • EMEA
  • APAC

Topics

Archives

Sims Lifecycle Services
  • Corporate Information
    • About Us
    • Certifications
    • Locations
  • Services
    • For Data Centers
    • For Businesses
    • For Electronics Manufacturers
    • Data Destruction
    • Global Services
  • Contact
    • Email
    • News
    • Blog
  • Sims Limited
    • SLS is a business division of Sims Limited. Discover how Sims Limited plays an integral role in the circular economy by making resources available for future use.
      Visit the Sims Limited Website
  • Other Business Divisions (external websites)
    • Sims Metal
    • Sims Resource Renewal

Sign up for our newsletter

  • Visit Us on Instagram (opens new window)
  • Visit Us on Facebook (opens new window)
  • Visit Us on LinkedIn (opens new window)
Copyright © 2025 Sims Lifecycle Services, All Rights Reserved.
  • Privacy Policy
  • Legal
  • Terms of Use