Keeping the information contained in the company's ITequipment secure is an obvious priority. But as technology becomesoutdated and is recycled, replaced or repurposed, keeping the datasecure is still a vital part of the process.

“Confidential information has a lifecycle: it is created; it isstored; it is transferred; it is deleted or destroyed,” advisesMark Lobel, a partner in security, privacy and risk practice atPricewaterhouseCoopers. “Each part of that lifecycle should beimportant to companies.”

The security issues involved in IT disposal gained prominencefrom a 2010 CBS News investigation into data stored on digitalphotocopiers. But with new technologies come new challenges.

Complete your profile to continue reading and get FREE access to Treasury & Risk, part of your ALM digital membership.

  • Critical Treasury & Risk information including in-depth analysis of treasury and finance best practices, case studies with corporate innovators, informative newsletters, educational webcasts and videos, and resources from industry leaders.
  • Exclusive discounts on ALM and Treasury & Risk events.
  • Access to other award-winning ALM websites including and

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.