Compliance

  • Making Sense of the New SEC Regulations and the Role of IT Asset Disposition (ITAD)

    By: Clint Parsons, Director of Strategic Partnerships, SEAM The Securities and Exchange Commission (SEC) has recently ramped up its focus on cybersecurity to address the growing threat of data breaches. This includes new rules for reporting cybersecurity incidents and updates to existing regulations that impact how organizations handle IT assets. The SEC’s New Cybersecurity Reporting […]

    read more
  • Safeguarding Data Security: The Crucial Role of Background Checks in ITAD Companies

    Safeguarding Data Security: The Crucial Role of Background Checks in ITAD Companies Megan Barkley, Client & Human Resource Specialist at SEAM In today’s digital landscape, where data breaches loom as a constant threat, the significance of safeguarding sensitive information cannot be overstated.  Companies in the IT Asset Disposition (ITAD) sector handle vast amounts of confidential […]

    read more
  • Protecting Your Business: Say No to Landfills for Electronics Disposal

    When it comes to retiring your IT assets, one key consideration is where they end up. Sure, you might be environmentally conscious, but there’s more at stake here than just green initiatives. IT equipment contains valuable recyclable materials, alongside hazardous components that demand responsible disposal. Dumping electronics, including IT equipment, is illegal in many areas, […]

    read more
  • Safeguarding Your Financial Institution: The Importance of Secure Data Disposal

    In today’s rapidly changing cybersecurity landscape, businesses in South Dakota and North Dakota must prioritize secure data disposal practices, especially concerning end-of-life IT equipment. This is especially crucial for financial institutions, which handle vast amounts of sensitive customer data, including personal information, financial records, and transaction details. To maintain customer trust and comply with data […]

    read more
  • How IT Professionals Handle Old Electronics – Insights from a Revealing Survey

    In a rapidly advancing technological landscape, businesses continually upgrade their IT assets to remain competitive. Yet, the process of IT asset disposal (ITAD) brings forth a unique set of challenges. A recent survey delves into the practices of small- and medium-sized businesses (SMBs) when it comes to handling aging electronics. The findings underscore a concerning […]

    read more
  • Safeguarding Data in the Dakotas: Proper Disposal of IT Equipment for Business Security

    In today’s digital age, data breaches pose a significant threat to businesses, including those in South Dakota and North Dakota. Recent incidents have highlighted the importance of proper data protection and disposal practices. There are a few crucial steps businesses in the Dakotas need to take when decommissioning servers, computers, or recycling electronics. By following […]

    read more
  • Beyond Encryption: Why Secure Shredding and Wiping Processes are Essential

    In today’s interconnected world, data security is a top priority for organizations. Encryption is commonly used to protect sensitive information during transmission and storage. While encryption provides an important layer of defense, it alone is not sufficient when it comes to securely disposing of retired IT assets. The Limitations of Encryption: Physical Vulnerabilities: Despite the […]

    read more
  • Knowing Your ITAD Vendor: Building Trust, Certifications, and Reputation

    When it comes to getting rid of electronics, recent news serves as a stark reminder of the consequences of partnering with an unreliable company. Lawmakers have had to allocate an additional $2 million in public funds to clean up a mess left by 5R Processors, a company that stockpiled millions of pounds of CRT materials […]

    read more
  • HITECH vs. HIPAA: What’s the Difference?

    HITECH vs. HIPAA: What’s the Difference? Businesses and organizations must protect many different types of personal information to prevent serious consequences in the event of a breach. However, among the most serious and specifically regulated is personal health information. Medical confidentiality has been a fundamental concept within medicine for millennia and is enshrined in U.S. […]

    read more