Keeping the information contained in the company's ITequipment secure is an obvious priority. But as technology becomesoutdated and is recycled, replaced or repurposed, keeping the datasecure is still a vital part of the process.

“Confidential information has a lifecycle: it is created; it isstored; it is transferred; it is deleted or destroyed,” advisesMark Lobel, a partner in security, privacy and risk practice atPricewaterhouseCoopers. “Each part of that lifecycle should beimportant to companies.”

The security issues involved in IT disposal gained prominencefrom a 2010 CBS News investigation into data stored on digitalphotocopiers. But with new technologies come new challenges.

Continue Reading for Free

Register and gain access to:

  • Thought leadership on regulatory changes, economic trends, corporate success stories, and tactical solutions for treasurers, CFOs, risk managers, controllers, and other finance professionals
  • Informative weekly newsletter featuring news, analysis, real-world cas studies, and other critical content
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical coverage of the employee benefits and financial advisory markets on our other ALM sites, PropertyCasualty360 and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.