TechR2 RFID Tags Will Enable Full Verification of Any Disk Drive Destruction

The tracking of removable or portable media has become critical due to the large amount of sensitive, confidential, personal and identifiable information contained in any such media.

Loss and theft ranks high as the primary means by which sensitive data is inadvertently disclosed to sources of ill will. In the case of portable media, any kind of information release could occur while storage hardware is taken off-line and / or retired without proper erasure. In some cases, attempted conventional means to overwrite data on drives not conducted by credible and certified means can lead to improper overwrite of all sectors on the drive.

Existing reporting laws and regulations such as; GLBA, HIPAA, SB1386 and US Safe Harbor, EU Data Protection Directives emphasize the need for compliance of their requirements for tracking the location of sensitive information and the ability to maintain control of it. In essence, when media that potentially contains sensitive information goes unaccounted for, the costs that are associated with remediation and reporting losses can amount to hundreds of thousands of dollars or more. As an example, based on actual case history, a lost laptop drive can easily cost over $95 million dollars in lost labor and out-of-pocket expenses, not to mention the cost of reputation damage and the cost of governmental fines, audit requirements and civil litigation.

HELP IS HERE

TechR2 RFID tags can be placed on any metal mobile equipment and disk drives, providing a unique identifier and near perfect read as disk drives are destroyed. The TechR2 RFID tag is also destroyed in the destruction process, thereby providing complete verification in the disk drive destruction cycle.

EXPECTED RESULTS AND BENEFITS

The support to management’s intent for appropriate control of sensitive information is demonstrable by the TechR2 RFID program and the verification of disk destruction. Return on investment is in the cost savings realized in the event of any investigation or query into management business practices initiated by any entity and /or governmental scrutiny.
Contact our Client Relations team to schedule an assessment today.

case studies

See More Case Studies

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Learn more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Learn more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Learn more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation