Information Security & Data Protection

Our highly certified information security & data protection process safeguards your company “DNA”

a thumbprint serves as a data protection device on a digital deviceYour company’s DNA is stored within your hardware – from confidential client and employee information to private contracts, invoices, financial plans, business plans, intellectual property and tax records. The importance of destroying that data pre-disposition is critical.

If you’re not trusting Synetic with your data destruction, then you could be exposing your company and your customers to the legal, financial and PR consequences of a breach. Losing data can damage reputations and cost millions of dollars. In addition, a data breach could possibly violate compliance regulations on the federal and state level, including:

  • HIPAA (Health Insurance Portability and Accountability Act)
  • GLBA (Gramm-Leach-Bliley Act)
  • FISMA (Federal Information Security Management Act)
  • FACTA (Fair and Accurate Credit Transactions Act)
  • OMB Memo (M06-16)
  • Sarbanes-Oxley Act Section 404
  • HITEC (Health Information Technology for Economic and Clinical Health Act)
  • PHI (Protected Health Information)
  • PCI (Payment Card Industry)
  • NERC (North American Electric Reliability Corporation)

Our industry certifications support our processes

Before making any promises that our data destruction processes are secure, we put them under the scrutiny of industry organizations’ stringent certification criteria. Synetic is one of the highest certified IT asset disposal firms in the United States. Our certifications are a deciding factor for Fortune-listed corporations in the finance, healthcare, technology, legal, education, government and energy sectors, and educational industries.

Data security: we reduce your liability risks. Significantly.

From your laptops, computers, printers, scanners, servers and phone systems to mobile devices, Synetic ensures that when we remove your decommissioned assets – we remove your data too. We have multiple options available for data destruction, ranging from NIST 800-88 drive overwriting to physical destruction of the storage medium.

Following NIST Special Publication 800-88 Revision 1, Guidelines for Media Sanitization

Did you know that in 2006 the DoD 5220.22-m standard was updated, and removed references to the number of hard drive overwrite passes required for data sanitization?  Don’t worry if you didn’t know.  There are many firms in the data destruction space who aren’t aware either.

The modern data destruction standard can be found in NIST Special Publication 800-88 Revision 1, Guidelines for Media Sanitization.  The NIST 800-88 standard is the result of work sponsored by the Department of Homeland Security.  Its purpose is to provide an effective framework and processes to handle media that ultimately will be reused or disposed.

The truth is that today’s media can be cleared by one overwrite, and not the three pass overwrite which was common under the DoD standard prior to 2006. A single pass overwrite saves time and money, while delivering greater value to clients without sacrificing security.

Any media that can’t be cleared with one overwrite, isn’t modern enough to reuse or resell anyway, which means it is heading straight to the shredder.  That being said, Synetic still offers the 3-pass standard as an option for client’s whose security policy still calls for it.

As your assets travel through our detailed processing channels, we remove any and all identifying marks like asset tags, BIOS naming, and other residual markers using our patented data sanitization system known as the Virtual Data Annihilator (Virtual DAN.)

Virtual DAN is our way of delivering positive proof that data was destroyed. It verifies the successful “clearing/clear” of data through an itemized reporting system that records detailed data for each device, time/date stamp and pass/fail. Synetic has internal and external quality controls in place for measuring quality effectiveness of the Virtual DAN system through quality control checks. We sample sanitization effectiveness through both internal and external audit sampling for data recovery.

Destroy electronic data on-site.

Synetic is one of a few ITAD firms that can both wipe and shred drives onsite by destroying the data on each drive either virtually or physically.  The data destruction process includes an individual audited match of hard drives, data tapes and other data related media.  And both methods can be used regardless of drive size, format or type.

Whether you get drives wiped by the Virtual Data Annihilator (Virtual DAN) or shredded by the Physical Data Annihilator (Physical DAN), you can be assured all data will be eliminated and all risk mitigated.

Destroy data securely from pick up to finish.

Your on-site representative can watch all assets be taken away in heavy-duty locked containers then transported to our secure facility where they’re sorted and either wiped or shredded then safely recycled.

Audit reporting: results in a detailed map of the path your decommissioned assets travel

Our reports help you track your asset disposition so you can report those assets to your fixed asset management program or within your financials.

Your decommissioned technology travels a fully documented and unbroken chain of custody – from packaging to pickup to data destruction to remarketing or recycling–which ensures that your electronics travel a path that’s in full compliance with National Institute of Standards and Technology data security and EPA standards. The end result is a detailed downstream trail that means peace of mind for even the most security conscious corporations.

As much as 60% of corporate data resides unprotected on desktop and laptop computers, according to analyst firm IDC.

Reconciliation reports confirm the downstream audit, and they are completely customizable to your needs. These detailed reports provide full accounting of data we destroyed, the hardware we recycled, and the assets we recovered. Audit report will include the following:

    Cost Center
    Synetic Identification Number
    Equipment Manufacturer (OEM)
    Asset Type

    Asset Model Number
    Asset Serial Number
    Asset Tag (If Applicable)
    Recovery Date

    Recovery Location
    Disposition Result
    Audit Fee