Category Archives: IT Asset Disposal

How Maxxum Helps Educational Institutions

May 5, 2017

How Maxxum Helps Educational Institutions

With the 2016-17 school year winding down, many schools are now considering IT equipment refreshes for next year and beyond. As part of their planning effort, schools will be assessing the remarketing or residual value of their current equipment to determine the viability of leasing or purchasing new equipment.

As trusted advisors to schools, colleges, universities and corporations, Maxxum helps these institutions assess the value and best disposition path for their IT assets. Maxxum’s remarketing programs are an effective way to mitigate data security risk, liquidate equipment, and actually gain a return before equipment becomes a liability due to obsolescence, disposal or recycling costs. We purchase all leading brands and types of IT equipment including tablets, laptops, desktops, networking gear, etc.

Maxxum has an easy process and makes it as simple as possible for school districts and institutions. Maxxum provides a full range of services to support any individual requirements. Our MaxxumSafe web portal makes asset tracking and record keeping transparent and simple. Maxxum also sells schools new and used equipment.

Throughout Maxxum’s history, and through our recent acquisition of Trace TM, we have worked with many clients in the education sector, providing data sanitization and remarketing services. Maxxum’s clientele has spanned the Twin Cities metro area, including public school systems in Edina, Fridley, Monticello and Owatonna, and Bethel College, Augsburg College, College of St. Scholastica and Capella University.

One of the advantages of working with Maxxum is that we are local. With two facilities in the Twin Cities, we’re able to get to know and meet with our school partners and prospects to understand their needs and requirements. Questions we ask our education partners include:

  • How do they value their equipment?
  • Why are they turning over their current equipment?
  • What are the financial considerations?
  • What is the greater purpose of remarketing the equipment?
  • What are their expectations for disposition?
  • What does the timing look like for their equipment refreshes?
  • Have they explored secure and compliant data destruction?

The more information Maxxum has the more resourceful and better advisor we can be. Maxxum wishes all education institutions a great last few weeks of the current school year and congratulates you on another successful year. Maxxum encourages you to reach out to us if you have any questions at all about your IT equipment.

4 Questions to Ask Your Technology Disposal Company

November 3, 2015

technology disposal company

When you’re ready to dispose of your old technology assets, do so with the support and guidance of people whose job it is to stay on top of the ever-evolving regulatory and security requirements: a certified compliant and dependable technology disposal company.

4 Things You Need to Know About Your Technology Disposal Company

We’ve outlined a few questions to ask your technology disposal company:

1. Are they certified for data destruction and environmental compliance?

With so many stories about data breaches and information leaks dominating the news over the last few years, most organizations are a little spooked about how they’re disposing of their used technology assets.

You may be vulnerable to legal ramifications if you don’t dispose of your data and drive assets properly. If your sensitive data leaks, you’ll have to answer to the law and your customers. Financial penalties can be quite harsh, and a tarnished reputation can have long-term ramifications.

Environmental compliance laws have become far more strict over the last decade, and getting hit with environmental penalties is a bad “look” for any organization. Now more than ever, it’s important to vet a technology asset disposal company to ensure they have industry certifications for both security and environmental compliance.

2. Do they understand the resale market?

Your technology asset disposal company should know the resale market inside and out in order for your organization to get the best return on the equipment it’s retiring.

PCs, laptops, and servers that are less than three to four years old retain value, even if they’re no longer of use to your company. If you’re ready to dispose of your technology assets, why not recover that value? Remarketing your technology assets is an opportunity to recoup some of the initial investment or cover some or all of the disposal costs.

Your technology asset disposal company should understand price trends on the resale market and help your organization plan ahead and determine when your assets will turn from revenue generators to cost creators. They should help you plan to refresh your technology cycles to ensure that you get the optimum value on your old equipment.

3. How do they document data destruction and disposal?

Find out from any potential provider how they document their full process. There are too many factors along the way during the disposal process that could find your organization liable for mistakes made by your provider.

Disposing of data can have security, financial, and software asset management implications. Proper documentation can shield your company from financial and legal penalties. You should be provided with a Certificate of Data Destruction and a detailed inventory report, as well as a report to show the environmental impact that your responsible recycling is having.

4. Can they serve all of your locations?

Technology asset disposal can be a pretty complicated matter. From drive sanitization to environmental compliance, there are numerous reasons to rely on a proven and trusted technology disposal company.

Don’t forget to ask about logistics. Your vendor has to have experience that allows them to serve all of your sites and the logistical capability to properly handle all of your assets.

If you have multiple locations, make sure you hire a disposal company that can handle your work load and that understands the different regulations that might be in play in each of your locations.


Where Does Your E-Waste End Up?

October 8, 2015


50 million tons of e-waste is dumped into landfills worldwide every year.

That’s a huge number, but it only represents two percent of what is dumped each year. That two percent of e-waste, however, makes up 70 percent of the toxic waste in landfills. According to Popular Science, when electronics start to break down, they release the metals and chemicals inside them, including lead, which has been linked to a myriad of health issues.

E-Waste: What You Can Do About It

It’s obvious that more and more organizations are in need of a technology asset disposal company that responsibly recycles their technology. Maxxum is an industry leader in technology asset disposal because we won’t let our clients be compromised.

In fact, Maxxum has a zero landfill policy. We’re committed to responsible, domestic recycling of technology assets — in the best interest of the environment and your business.

At Maxxum, we believe that retiring technology assets shouldn’t mean risking an environmental breach. We’re committed to smart, strategic partnerships with our clients. We stay up-to-date on laws and regulations regarding environmental responsibility. We develop and support industry best practices in compliance, recycling and reporting.

In order to track what happens to your recycled technology from start to finish, Maxxum executes the following for every client:

  • Provides a Certificate of Electronic Equipment Destruction (CEED) that includes serial number, type, date, and our downstream recycle partner
  • Thoroughly vets our downstream recycling partners for compliance with our strict standards
  • Provides current copies of EPA licenses for all recycling partners
  • Reduces end-of-life assets to their smallest component parts and material types
  • Engages domestic recycling partners who utilize the most eco-friendly processes

It’s this attention to detail and accountability that makes Maxxum a leader in the field.

Data Protection | Dont’ Let Your Data Fall Into the Wrong Hands

October 1, 2015

data protection

Class-action lawsuits, crippling financial penalties, tarnished reputations and even jail time are some of the repercussions that can stem from information falling into the wrong hands and the lack of data protection.

If you think your organization is immune to a data breach, you’re wrong.

Early next year the movie, Snowden, will be released, detailing the story of Edward Snowden, an American computer professional who leaked classified information from the National Security Agency (NSA) to the British daily newspaper, The Guardian, in 2013.

If the NSA can be compromised, that probably means every organization has some type of vulnerability. There are, however, precautions that can be taken.

One particular point of vulnerability for every organization is when they refresh their technology assets. Just because new technology has entered the building, that doesn’t mean that you’re no longer responsible for the data on the technology that is being disposed of.

The best way to ensure that your data doesn’t fall into the wrong hands is to hire a trustworthy, dependable Technology Asset Disposal firm like Maxxum.

Data Protection Made Easy

Demand certified drive sanitization and destruction. Maxxum creates a smart, strategic partnership with each client. We will help your organization build a comprehensive and cost-effective risk-management program. This program eliminates potential data and environmental breaches and offers a secure, documented chain of custody that mitigates liability.

Maxxum utilizes best practices for sanitization of digitally stored information, meeting the NIST (National Institute of Standards and Technology) standard, also adopted by the Department of Defense.

Our comprehensive documentation and certification includes:

  • Asset receipt reporting provided by Maxxum’s technology center
  • Certification of data destruction by serial number of the host machine and drives
  • Drive sanitization date and method used

If you need physical destruction of your drives to ensure data protection, Maxxum can help. We offer certified and documented physical destruction that shields you and your company.

Technology breaches are happening to organizations big and small. If you’re not being diligent about where your data ends up, it can fall into the wrong hands. Ensure data protection and turn your used technology over to Maxxum; it will be disposed of properly.

5 Best Practices for Technology Asset Disposal

asset disposal

If you’re a little wary about the best way to manage technology asset disposal these days, you’re not alone. While security breaches have been featured in some of the biggest headlines over the last few years, the number of companies that have been hit with criminal and civil penalties, as well as executive fines and even incarceration, is alarming.

As technology continues to advance at a high rate, organizations are now experiencing a more involved process when disposing of their technology equipment. Moreover, smart organizations are finding qualified, trusted, Technology Asset Disposal companies to manage this complicated process.

Technology Asset Disposal – the Right Way

Here are five best practices any Technology Asset Disposal company should provide for their clients:

1. Data Destruction

You might be finished with your storage drive, but that doesn’t mean that the data is gone. You may be vulnerable to legal ramifications if you don’t dispose of your data and drive assets properly. If you’re sensitive data leaks, you’ll have to answer to the law and your customers. Demand certified drive sanitation or destruction.

2. Equipment Remarketing

Technology assets (such as PCs, laptops, and servers) that are less than three to four years old have resale value. A disposal company should work to recoup that value on your behalf through a variety of remarketing channels. Re-selling, selling to employees or donating to schools or foundations are all ways to get value back from your old technology.

3. Equipment Recycling

A Certificate of Electronic Equipment Destruction (CEED) should be provided for all recycled technology assets. Having documentation that demonstrates or certifies that your company took the proper steps can save you from penalties down the line.

4. Compliance Reporting

Detailed documentation makes it easy to prove compliance with all laws and regulations. With so many government agencies tasked with oversights (HIPPA, PCI, SOX, FCC, FDA, etc.), an asset disposal company needs to provide a detailed audit trail to prove compliance.

5. Policy and Program Development

If your company is not sure how to start developing a compliant technology asset disposal program, you are not alone. A strong and reliable technology asset disposal company should be your guide through the process.

6 Reasons to Properly Dispose of Technology

September 23, 2015

dispose of technology

We’ve said this before, and we’ll keep saying it: just because used technology gets unplugged and leaves your building, that doesn’t mean the data on it dies. While ensuring that your data doesn’t end up in the wrong hands is reason enough to make sure you dispose of technology properly, it’s far from the only reason.

Look around your office. If it’s like most, it probably looks a lot different than it did five years ago. Computers, phones, copiers and just about everything else associated with office work has changed dramatically. And, they’re going to keep changing.

Technology is advancing faster than just about anybody can manage. With everyone constantly upgrading to the latest, “next best thing,” it begs the question, “what’s happening to all of the old stuff?”

There are Several Good Reasons to Dispose of Technology

Here are six reasons to do so, and all of them can affect your company’s bottom line and reputation.

  1. Criminal Penalties

As the world around us continues to demand faster and more complete access to information (better technology), there is now a more robust policing of used technology disposal.

Depending on your industry, the laws that govern how you dispose of technology can fall under one or more of the following: HIPPA (healthcare), EPA (environmental), FDA (pharmaceuticals and medical devices), FCC (broadcast and phone providers), PCI regulations (credit card data), Sarbanes-Oxley (financial services), Gramm-Leach-Bliley (banking) , PII (personally identifiable information) and FACTA (credit reports).

The repercussions of criminal penalties go without saying and can impact each of the remaining reasons we list.

  1. Executive Fines and Incarceration

With information being such a high value commodity in this technological age, punishments are now catching up to the heft of the crime. Companies are now tasked with responsibly disposing of their used technology. Cavalier behavior with information can now lead to huge fines and even jail time depending on the case.

  1. Civil Penalties

Civil penalties are fines imposed by government agencies as restitution for wrongdoing. Check any business page or television news broadcast and it won’t take you long to realize that both State and Federal agencies are recognizing the growing exposure related to information security. Fines can add up quickly and not only damage your company’s bottom line, but your reputation as well. 

  1. Litigation Costs

One of the misconceptions with technology disposal is that all liability for data is transferred once technology exits. Too often that’s not the reality, and it’s the reason many companies are blindsided by cases even when they believed that things had been done correctly. Nobody wants litigation because that can get expensive very quickly.

  1. Diminished Stock Prices

Perception is almost as powerful as reality when it comes to the value of stocks. Any of the above can lead to a negative perception of your company, whether it’s founded or not. If the perception of your company is diminished, your company’s stock will be as well.

  1. Public Relations Fallout

The old adage that any publicity is good publicity doesn’t hold true here. Your company’s reputation is damaged if any of the above events occur. As technology becomes increasingly integrated into our daily business and private lives, data security is more important than it’s ever been. Understand your responsibility and ensure that old technology is disposed of properly. Your reputation depends on it.

Feds Get Forward-Looking IT Procurement Advice

May 6, 2015


By John K. Higgins – E-Commerce Times – ECT News Network
May 1, 2015 9:23 AM PT

The old cliché about the difficulty of turning an aircraft carrier around applies to changing the way government deals with investing in information technology, according to two recent reports.

Federal agencies need to change course in handling IT spending quickly, particularly in reversing the inertia behind longstanding conflicts between chief information officers and chief financial officers over the procurement of IT resources, according to Research Director Shawn McCarthy, who authored the IDC Government Insights report.

Government IT managers need to loosen their longstanding attachment to unproductive legacy systems and focus on the advantages of newer technologies — especially the cloud and mobile platforms, suggested Research Director Rick Howard, author of the Gartner report.

From Confrontation to Collaboration

Despite past conflicts between finance and IT staffs, federal IT spending has been robust — although it should remain largely flat, at about US$78 billion per year for the next few years. However, budgetary demands to do more with less almost certainly will create tension between the CIO and the CFO.

“When it comes to where information technology money should be spent, the goals and motivations of a CFO can differ from those of a CIO,” McCarthy said.

With the tightening of government budgets, the role of the CFO has expanded, he noted. The CFO now has a central role in determining how the taxpayers’ money is spent. However, that can — and often does — lead to clashes with the IT staff, who have in-depth expertise on utilizing technology.

In the future, collaboration between the two will be required in the productive acquisition and deployment of IT, McCarthy said.

To reconcile the differences between IT staffs and financial managers, federal government departments and major agencies should continue the trend to “consolidate multiple, lower-level CIO offices into a single, more powerful agency-wide CIO,” McCarthy suggested.

That would lead to a more focused and coherent approach to IT management. The process also would simplify collaboration between the CIO and CFO by reducing or even eliminating diffuse communication between multiple low-level IT staff members and the CFO.

Another major factor for improving collaboration is for each side to recognize the sea change in IT management that has resulted from the maturing cloud and shared service environment.

IT managers, especially the CIO, must jettison the idea that the IT department has control of IT equipment, facilities and programs, and is the sole owner, provider and guardian of those assets.

Especially in the procurement function, where CIOs and CFOs are most likely to tangle, managers need to “move IT procurement away from systems purchasing and management and toward IT services management,” McCarthy said.

This approach is based on a realization that IT departments don’t have to own and operate IT resources to be effective. Instead, IT departments need to act as internal advisors and facilitators to provide guidance to agencies in how best to utilize available technologies to meet agency goals and citizen requirements.

Sometimes that might involve actual on-site resources, but increasingly it will involve the IT staff acting as an expert intermediate to match up agency needs with appropriate capabilities, such as private sector cloud providers.

Similarly, CFOs must shed any behavior in which they purport to “know it all” when it comes to cost-effective IT. They may have a good knowledge of IT costs from their own exploration of vendor offering pricing points and from reviewing budget data.

However, they most likely don’t know it all in terms of what is effective in the application of IT resources. That expertise resides, and still should reside, with the CIO staff.

“Often the IT team doesn’t understand the agency’s budgeting process, while the finance team doesn’t understand the agency’s IT systems,” McCarthy said.

A good starting point for collaboration is for both departments to buy into the process of jointly developing a business approach for deploying IT resources, McCarthy suggested. CFOs who seek to logically influence IT planning should require the development of strong business plans to justify new IT expenditures. The objective of the process is for both teams to agree on the purpose for which the IT spending is required, and then to work out the procurement approach to implementing the plan.

“The business-focused collaboration that is needed today includes protecting the interests of each other and supporting the business needs of the other. The discussion should not be about fixing failures, it should be about how technology can be leveraged to meet the organization’s strategic objectives,” McCarthy said.

The CFO can be instrumental in establishing a business context.

“Often the IT people are reluctant to give up control, so it’s the CFO who becomes the driver here to introduce budget realities and ask, for example, about what older machines are costing us money,” McCarthy told the E-Commerce Times.

The CFO can directly or indirectly begin the consideration about using newer technologies, he said, by “initiating the conversation on what alternatives are available.”

Slipping the Yoke of Legacy Systems

IT managers should establish an innovation budget to formally facilitate digital experimentation and to build strong working relationships with other digital leaders, within and outside an agency, recommends the Gartner report.

As with military planning, IT managers need to be wary of making investments designed to win the last war while failing to anticipate the conditions of the next one, it suggests.

“There is a risk that circumstances such as deferred infrastructure investments are forcing government CIOs to ‘renovate the core’ of IT at the expense of deploying new user-centric systems and services, such as CRM, industry-specific applications and enterprise applications, all of which rank low on the priority list,” Howard noted.

The next challenge is to achieve full exploitation of both cloud technology and mobile platforms, he said, noting that the cloud has matured to the point that it should be the first option of any potential IT investment.

“Gartner believes that IT vendors are moving fast in the direction of cloud-based service models, and government agencies are becoming more comfortable with cloud-based solutions for reasons of subscription pricing and increased business agility,” Howard wrote in the report.

“We recently predicted that by 2015, 50 percent of all new independent software vendors will be pure SaaS providers. This trend will challenge traditional procurement practices and expose government procurement channels to a more diverse array of small and midsize businesses than has been the case in the past,” he pointed out.

“Government CIOs should begin with the default assumption that a public cloud option will be selected when re-engineering current business processes or designing new mobile services that are augmented by context-aware interactions,” Howard advised.

In principle, every new investment or service, on every dimension — including infrastructure — should “incorporate the most advanced position,” rather than rely on what has worked in the past, he added.

“With cost, value and security as top considerations, the most advanced position available to government CIOs is delivering services on public cloud, unless there is a reason not to,” Howard said.

So too with the mobile world, which has moved from an interesting IT option to a nearly essential requirement. The Gartner study makes the following recommendations government IT managers:

  • Make mobile the foundation of your digital government channel strategy;
  • Increase mobile access to more business applications;
  • Focus on mobile user experience design and the effectiveness of end-to-end processes involving a device and its context;
  • Build a “Have we maximized contextualization opportunities?” step into all planning.

One major objective is to make sure that the value proposition of any investment fully recognizes the benefits of advanced technologies.

“The challenge is less about developing adequate cost-benefit and return-on-investment tools for IT investments and more about the discipline required to apply them consistently when measuring project performance or benefits realization,” Howard told the E-Commerce Times.

Standard methods, including ROI, key performance indicators and similar tools, are still workable. However, the changing landscape of technology also introduces modifications in value analysis.

For example, by using digital and mobile technologies, an agency could significantly improve the number of online queries it could handle from citizens. That improvement is a transactional benefit with a measurable cost — and benefit.

On the other hand, the value of improved technologies that lead to more accurate government weather reports through improved analytics is not easily captured in conventional budget terms but is still significant.

“In the digital/mobile age,” said Howard, “both are integral to creating measurable value.”

See original article…

Optical Care Chain Loses a Server, Again

December 5, 2014

Missing Computer Contained PHI for 48,000 Customers

By , December 2, 2014. Follow Marianne @HealthInfoSec

For the second time in recent weeks, Visionworks Inc., has revealed that one of its stores misplaced a database server, apparently due to improper disposal.

In a Nov. 21 statement, Visionworks, a unit of Pittsburgh, Pa.-based healthcare insurer Highmark Inc., revealed that a database server at a store in Jacksonville, Fla., containing “partially unencrypted protected health information” belonging to approximately 48,000 customers had been mistakenly discarded after it was replaced on June 2 during scheduled computer upgrades.

Last month, the chain announced that a store in Annapolis, Md., lost a database server containing patient information in June while it was being replaced during a store renovation (see Lost Server: What Went Wrong?). The lost Maryland computer, which contained data on 75,000 customers of that store location, is believed by Visionworks to have been discarded by mistake in a landfill.

Preventive Steps

The Highmark spokesman declined to comment on steps the company is taking to prevent the loss of more servers from its stores. “Visionworks is in the process of fully encrypting all servers. The process should be complete within the next six months,” he says.

While encrypting all data on the lost computer could have potentially prevented the breach at both store locations, “Server hard-drive encryption in an optometrist store is very rare,” notes Kerry McConnell, a senior consultant at security services firm, Tom Walsh Consulting.

Security experts say the back-to-back incidents spotlight the need for organizations to have solid inventory management and data disposal practices, and to ensure that staff are aware of those policies.

“In our experience doing HIPAA risk assessments, we often see storerooms or locked ‘cages’ of older used equipment,” says Dan Berger, CEO of security services firm Redspin. “We often point this out as a vulnerability for precisely the reason that occurred at Visionworks. Once taken out of service, it is very easy to forget what is on each server or workstation,” he says. “That sets the stage for an inadvertent discarding of a device that contains lots of confidential data.”

Berger stresses that having policies safeguarding PHI even when it’s no longer needed is mandated under HIPAA.

“We cite the HIPAA Security Rule, which requires that covered entities and business associates implement policies and procedures to address the final disposition of electronic PHI and/or the hardware or electronic media on which it is stored,” he says.

Read full article…

A Lost Server: What Went Wrong?

Inventory Management, Data Disposal Practices in the Spotlight

By , November 14, 2014. Follow Marianne @HealthInfoSec

The loss of a server at an optical wear retail store in Maryland offers a reminder not only of the importance of encryption but also the value of good inventory management and data disposal practices.See Also: Healthcare Data Breaches: Have We Learned Anything?Visionworks Inc., a unit of Pittsburgh, Pa.-based healthcare insurer Highmark Inc., says the problems began when the server was being replaced in June during a remodeling project at its store in Annapolis, Md. “We believe that the server was accidentally removed with trash from recent renovations and taken to a local landfill” along with other materials, a Highmark spokesman tells Information Security Media Group.

The server held protected health information for as many as 75,000 of the store’s customers, according to a Visionworks statement. “All credit card information housed on the server was encrypted, and therefore should not be at risk,” the company says.

Besides the encrypted credit card data, however, the server also contained unencrypted data, including customer names and addresses and some information related to optometrist visits and lens prescriptions, the spokesman explains.

Server Security

While lost and stolen unencrypted computers and storage media, especially mobile devices, are the most common culprits in breaches that appear on HHS’ “wall of shame”, which lists breaches affecting 500 or more individuals, some security experts say the Visionworks server incident is somewhat unusual.

“It’s highly unlikely to lose a server since they typically don’t move around once they get ‘racked and stacked’ in a data center,” says Brian Evans, senior managing consultant at IBM Security Services.

Also, while encryption of all data contained on the lost server would have protected against a data breach, “it’s not commonplace in healthcare to encrypt servers for a variety of reasons,” he says. “Most organizations think they’re safe because their data is secure within a data center environment where access is physically restricted,” he says – unlike the retail setting where the Visionworks server was located.

“Visionworks could have benefitted from a formal media disposal and asset inventory process,” Evans says. “As a result, the server operating system could’ve been wiped or destroyed while tracking and accounting for this asset.”

Lessons Learned

All healthcare organizations should have policies that spell out how computing devices need to be handled if moved or relocated, says Tom Walsh, president of the independent security consultancy Tom Walsh Consulting.

He suggests that such a policy should state: “Any media, equipment, or device containing memory and possibly storing confidential information needs to be sanitized or erased before the media or equipment is reused, sent to a vendor for repair, sold, or prepared for donation or disposal.”

Additionally, he says relocation policies often prescribe that, “hard disk drives are removed from servers, workstations, laptops and other devices – including multifunction printers – and kept temporarily in a secure holding area, such as a locked office/cage/room/cabinet, until the hard drives are physically destroyed by the IT department staff or electronics recycling vendor. The inventory tracking database also needs to be updated when equipment is removed from service.”

Read full article…

Maxxum’s New CTO Eyes Healthcare and Other Markets

August 4, 2014

Plans to expand the company’s Secure IT Asset Disposal expertise

Minneapolis, MN — October 3, 2013 — Maxxum, Inc., a regional leader in Secure IT Asset Disposal services, today announced that Ray Davey has joined the company as its Chief Technology Officer. Davey’s charter is to further develop the company’s product and service capabilities, define technology strategies, and provide technical oversight for company operations.

Rich Woodward, Maxxum’s CEO, explains, “Ray’s IT leadership experience and deep understanding of business strategy are great assets to the company. We’ve grown nicely over the past 16 years; with Ray’s focus on new product and service development, aimed at strategic vertical markets, we expect to increase our value to clients.”

Davey has spent more than 20 years with technology and professional services companies like Hewlett-Packard, EDS, Cap Gemini, ESP, and Lorton Data. During his recent tenure at Lorton Data, the company deployed a first-to-market cloud-based product suite that garnered industry recognition for technology innovation.

“Maxxum is the last link in a chain of custody for sensitive data such as Protected Health Information (PHI) and other equipment-bound proprietary material. The number of devices storing information using non-volatile technology is growing at an alarming rate” states Davey. “Responsible entities must implement strategies to prevent unintentional data breaches when devices and equipment reach end-of-life. It’s my job to help Maxxum’s clients manage this risk by providing best-in-class secure data disposal services,” he continued.