The data on the failed of decommissioned data bearing devices and systems is very accessible to any insider threat.
In the Zero Trust Security Model (ZTSM), organizations learn to create system polices that have multi-layered and monitored approaches. When you do, you have the TechR2 Tear-A-Byte® and Tear-A-Vault® systems. The only ZTSM system in the EoL industry.