Dumping data: e-waste--yet another headache for government and corporations.

AuthorCollins, Lisa
PositionCOMMENTARY

Everyone worries about the safety of information. The technology industry is robust with firewalls, encryption systems, and network security hardware. Corporations hire chief security officers, facility security officers, install cameras and metal detectors and have their facilities and the employees "cleared."

But often times the security breaks down at a place so simple it is often overlooked: the end of the life cycle for computer and electronic equipment.

After spending countless hours and dollars protecting information while the electronic equipment is in use, old computers are often unplugged, put in a storage room, sent to a warehouse, donated or even given away or sold with the data still intact. The equipment enters a twilight zone where no one is really sure what its status is, what information may be on it, who has had access to it and how it should be dealt with.

The paper shredding industry gained a foothold years ago and most companies now have on-site shredder trucks that make weekly visits to their facility. But one cannot forget that the paper being shredded was generated by the PC that may be sitting in the hallway totally unattended and unsecured.

PCs and laptops are not the only devices where data lies unprotected. Telecom equipment, servers, PDAs, cell phones, fax machines, copiers, scanners, tape drives, back up drives, flash drives, thumb drives, even ribbon from dot matrix printers and typewriters--all these devices are capable of storing and releasing data.

Equipment disposal often is not a high priority within a corporate structure. No one wants to be the responsible party and no one wants to add another line item to their yearly budget. Depending on the company, the person responsible may be the IT manager, the facility manager, property manager, procurement, security officer or any combination of those areas.

It is estimated that the cost of ownership of a PC is three to four times the purchase price of the unit. This includes all of the support for installing, maintaining, securing and licensing the piece of equipment. The end-of-life costs also must be considered.

There are currently no less than four regulations mandating protection of private information. While some of these regulations are geared toward specific businesses or industries, some deal with information that organizations of all shapes and sizes will collect and maintain. In a world of constantly heightened security, government contractors need to be particularly vigilant in the management of their computers and data.

Approximately 70 percent to 80 percent of used electronic equipment is shipped overseas for "recycling." The recipients include Thailand, Nigeria, Indonesia, China, India and Pakistan.

In October 2006 the environmental watchdog organization Basel Action Network (BAN) traveled to Nigeria to investigate how...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT