How to Securely Wipe Data from a Mobile Device

How to Securely Wipe Data from a Mobile Device

Recently, I was reading the HIPAA COW POLICY/PROCEDURE WORKGROUP, DEVICE, MEDIA, AND PAPER RECORD SANITIZATION FOR DISPOSAL OR REUSE whitepaper from their website and found that they want the cell phones, smart phones, PDAs, tablets and similar devices wiped using a software solution.

At TechR2, we agree. We use software that wipes mobile devices that meet DoD 5220.22-M sanitizing standard and is also HIPAA compliant. We create an audit trail, we contain, we wipe and we reconcile to meet standards in our ISO 27001 approved process. Then the device can be safely reused by the organization or processed for disassembly by TechR2. At no time do we just take the whole unit and shred it in one piece – allowing for the cross contamination of e-waste materials.

Thanks to the HIPAACOW organization that recommends good data destruction practices that include environmental friendliness.

[vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

Tags

What do you think?

Related articles

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Read more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Read more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Read more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation