{"id":18657,"date":"2018-08-21T08:15:54","date_gmt":"2018-08-21T12:15:54","guid":{"rendered":"https:\/\/quantumlifecycle.com\/staging\/the-benefits-of-onsite-data-destruction\/"},"modified":"2023-09-06T15:40:11","modified_gmt":"2023-09-06T19:40:11","slug":"the-benefits-of-onsite-data-destruction","status":"publish","type":"post","link":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/the-benefits-of-onsite-data-destruction\/","title":{"rendered":"The Benefits of Onsite Data Destruction"},"content":{"rendered":"

Chain of custody<\/a> is a phrase that sounds more related to a criminal investigation than the world of data destruction<\/a>. Yet a good chain of custody is a critical concept for IT assets<\/a>. Without it, an organization could be vulnerable to fraud through data misappropriation. Essentially, a data chain of custody<\/u><\/span><\/a> is a documentation trail that clearly describes the receipt, transfer, analysis and ultimate disposition of IT assets when disposed of by an offsite recycler.<\/p>\n

As an IT professional, a strong chain of custody is what you want if your company\u2019s data is destroyed offsite. Think of the chain of custody as damage control similar to not letting your credit card out of your sight at a point of purchase. There are numerous scams by servers and clerks for copying credit cards<\/u><\/span><\/a> by taking the card just below the counter level, for example, or into another room while allegedly processing a transaction. Unfortunately, the same unethical behaviour can happen with your company\u2019s data.<\/p>\n

To mitigate against unethical behaviour when recycling<\/a> offsite, it\u2019s always best to work with a reputable, fully certified vendor<\/u><\/span> such as Quantum that is third party audited annually. This way, you can be sure that opting for offsite recycling will not be a decision that comes back to haunt you through misuse of data.<\/p>\n

Problems with Offsite Data Destruction<\/h2>\n

With offsite data destruction, there are several points in the process when problems can occur with your data. The usual procedure for hard drive destruction<\/a> is that data assets are first transported by truck from your office to the recycler where the data is then destroyed and the physical assets recycled or resold. A short list of things that can go wrong during this process is:<\/p>\n