Secure Data Destruction Under GDPR

Blog > ITAD > Secure Data Destruction Under GDPR

You’ve heard it before, right?

It’s the acronym we can’t seem to get rid of at the moment. Even our favourite radio station has been taken over by it! You know what we’re about to say…GDPR. The more we learn about it, the more we realise it’s not that scary – It’s a change; and a change for the better in our opinion.

If a company or ‘processor’ holds personal data about a person or ‘controller’, it’s the controllers right to know what is going on with their personal information at any given time. With that in mind, it’s important for companies to understand that disposing of their end of life data bearing assets needs to be factored in as well.

We’ll get to the point

We recently came upon an article written by Information Security Buzz, which helps to explain our point:

‘Secure data destruction and disposal continues to be one of the biggest risks to businesses today. Currently, many businesses outsource their asset disposal to specialist, third-party IT Asset Disposal firms (ITADs) to ensure regulatory compliance, mitigate any risk and free up business resource.

For many of these businesses, secure data asset management, disposal and destruction fall outside of its core business remit – and it can be argued that the legislation surrounding asset disposal makes the process too complex for them to manage internally.

While outsourcing the responsibility of data asset management and data asset disposal enables these businesses to focus on what they do best, this practice is quickly becoming unsustainable. With the General Data Protection Regulation (GDPR) inching ever closer, businesses will need to reconsider the current approach to outsourcing their secure asset disposal. With data breach fines set to double in some cases, businesses must ensure that they have a clear audit trail and proof of data destruction to protect themselves against these large fines.’

Who can you trust?

XPO IT Services holds ISO 27001 certification (Information Security Management System), which ensures we comply with the Secure Destruction of Confidential Materials BS EN 15713:2009 code of practice. As well as this, we have also gained ADISA accreditation to a Merit standard: ADISA being the leading accreditation standard in Data Security.

Destroy your data with someone you can trust.

For the full article follow: 


The author: Mark Cotterell
No comments to read

Leave a Reply

Your email address will not be published. Required fields are marked *