Customers rely on SEAM to completely destroy their data.
SEAM offers data destruction services in accordance with NIST Special Publication 800-88 (Revision 1) standards to ensure confidential information is never compromised. Certificates of Destruction and Recycling are always provided, whether devices are shredded onsite, offsite or securely erased. Depending on your needs, security carts and witnessed destruction is also available.
Detailed reporting and strict data security protocols ensure all devices are handled securely and in compliance with the complex, ever-changing compliance regulations of today. Our team of experts continually researches and stays updated on current legislation and trends so you don’t have to.
"Industry analysts estimate that 80% of corporate laptop and desktop PCs contain sensitive data. The percentage of enterprise servers with sensitive data is even higher."
- Seagate Technology
Data Destruction Options:
Cell phones, tablets and removable storage devices like hard drives, USB drives, CD's, DVDs, and tapes are physically destroyed using SEAM’s industrial shredder, available on-site at the customer's location or off-site at SEAM’s secure facility in compliance with NIST SP 800-88r1 standards.
SEAM performs secure data erasure services in compliance with Revision 1 of the National Institute of Standards and Technology (NIST) Special Publication Series 800-88, the current industry recognized standard for complete data sanitization. SEAM's wiping services also meet the outdated standard many customers still reference as well, the U.S. Department of Defense Sanitizing (DoD 5220.22-M) standards outlined in the National Industrial Security Program (NISP) Operating Manual.
What are you Protecting?
Intellectual property, Corporate financials, Client data, Personally identifiable information (PII), Protected health information (PHI) and Credit card information - All of which could lead to penalties, fines, lawsuits and loss of reputation if placed in the wrong hands.
Why You Should Care:
Most security programs are focused on protecting the network, leaving retired or off-network physical assets overlooked. With huge amounts of private data being collected and managed every day, the need to secure data-containing equipment all stages of the lifecycle is more important than ever.
A 2015 study by Blancco Technology Group and Kroll Ontrack found an alarming 48% of the hard disk drives and solid state drives they tested contained residual data. They also found ineffective deletion attempts had been made on 75% of the devices containing information. In some cases, 100% of the data was able to be recovered.
Make sure you know your data is properly destroyed, and that you know what happens to your equipment once it leaves your possession. Be Sure.
In 2013, a healthcare company gave their equipment to a vendor who "promised" to destroy their data and dispose of the items for free. The company's computers were found on eBay containing sensitive health records of 2,000 children and 900 adults, plus a number of human resources records. The company ended up paying around $300,000 in fines and underwent legal proceedings.
There's a reason certified, verifiable data destruction is not free.