Any organization that maintains confidential information has an obligation to ensure its security from the moment a file is created to the end of its functional purpose. This includes ensuring the security of data while it is in its care, custody, and control until its final destruction. Depending on the type of data, its security classification, and how it is stored, the methods used for destruction can vary greatly.
Unfortunately, despite the importance of the data destruction process, attempts to identify reliable guidance are often a challenge, as most available information is out-of-date or vendor- biased.
As experts in data destruction, 5-L provides the expertise necessary to develop effective policies that diminish the liability inherent to handling end-of-life technology assets in your environment.
5-L is the author of the guide for the Best Practices for the Destruction of Digital Data and understands the challenges that all public and private sector clients face in ensuring that their end-of-life data remains intact.