Thursday, January 3, 2013

Tech Reworks Data Destruction Informational Summary & FAQs





When an individual or company makes the decision to upgrade their computer network, the older equipment is often restructured to work in another area of the business, sold on the secondary PC market, donated to charity or otherwise destroyed.  In any of these scenarios, it is of the utmost importance that the existing data residing on the hard drives of the computers are effectively erased (sanitized).

Data sanitization is the process of deliberately, permanently, irreversibly removing or destroying the data stored on a memory device.  A device that has been sanitized has no usable residual data.  Sanitization processes include using a software utility that completely erases the data, a separate hardware device that connects to the device being sanitized and erases the data, and/or a mechanism that physically destroys the device so its data cannot be recovered.

The data destruction industry adheres to two specific sets of standards – D.O.D 5220.22-M and NIST publication 800-88.  Both of which state the minimum requirements for an effective data destruction policy.

D.O.D 5220.22-M:
The Department of Defense Standard 5220.22-M, Section 5, Subsection 8.5.3 states that to effectively overwrite the data on recordable media, each section of the disk must be overwritten three times, or what’s known as three passes.  On the first pass, the data in each sector is replaced with a character.  On the second pass, the character is replaced with its complement.  And, on the third and final pass, the sector is filled with a random character.  In addition, items which have been cleared must remain at the original level of classification and in a secure, controlled environment.  It is important to note that 5220.22-M DOES NOT recommend the three pass system for sanitization of “top-secret’ information.
 
For disks sanitization to fall under the D.O.D standards, the information on the disk must be removed through a two-step process in which the three pass procedure is completed first, and then followed by the removal of all classified labels, activity logs and markings. 

NIST Publication 800-88:
NIST describes disc sanitization as “the removal of data from storage media so that, for all practical purposes, the data cannot be retrieved.  Currently, there are three primary methods for data sanitation: a) overwriting, b) degaussing and c) physical disc destruction.

a.        Overwriting – overwriting consists of using software to write (1s, 0s and/or a combination of both) onto the media where the file to be sanitized is located.  The number of times this is performed is relative to the sensitivity of the information being sanitized. 
b.       Degaussing – there are two types of degaussing machines that exist today, electric and strong magnet. 
c.        Destruction – the approved methods of disc destruction are as follows:
a.        Disk shredding
b.       Pulverization, smelting or disintegration at an approved metal destruction facility
c.       Application of hydriodic acid and/or an abrasive substance

Summary:

At Tech Reworks, Inc. we provide effective data destruction services by strictly adhering to the specified set of guidelines listed above.  At a minimum Tech Reworks performs three passes on each drive.  Every hard disk that is processed by Tech Reworks for data destruction is received, asset tagged and stored in a secured access room with full traceability of the product throughout the entire process.   In conclusion, Tech Reworks primary data destruction objective is to properly prevent secure or sensitive information from getting into the hands of unauthorized individuals. 

FAQ’s:
1.       How do you know that Tech Reworks adheres to the industry standards for data destruction?
Tech Reworks provides the customer with the following:
a.       An auditable report of disc sanitization and/or destruction including serial numbers and Asset Tag/ID.
b.      Chain of Custody documentation

2.       Are there industry specific regulations for Data Destruction?
Yes, industries that utilize customer information each have a set of regulations that MUST be adhered to with regard to destroying that data.  The industry specific regulations that MUST be adhered to in addition to the D.O.D standards are as follows:
·         FACTA (Fair and Accurate Credit Transactions Act)
·         GLB (Gramm-Leach Bliley) – banking and financial institutions
·         HIPPA (Health Insurance Portability and Accountability Act) – Healthcare Industry
·         SOX (Sarbanes-Oxley Act)

3.       How does Tech Reworks ensure the customer that the software used to overwrite data is effective?
Per the Department of Defense software overwriting is an approved method for data destruction, however; the software utilized MUST be capable of overwriting all addressable locations on the media.  If unusable sectors are incapable of being overwritten or if any errors occur during the overwriting process Tech Reworks flags the hard disk for degaussing and/or physical destruction. 

4.       What are the differences between D.O.D 5220.22-M and NIST 800-88? 
The primary difference between the two standards is how many passes are required to prevent data disclosure.  The D.O.D standard states clearly that three passes must be conducted to sanitize a hard disk.  The NIST standard states that one pass is effective enough to defy conventional forensic recovery on a modern hard drive.