
When it comes to the responsible recycling of old or unwanted electronic devices, it is of course a priority to keep the devices (and the toxic materials they contain) out of landfills, for environmental and sustainability reasons.
Thanks to the increasing ubiquity of the “Internet of Things,” it is equally critical to be cognizant of the private and proprietary data contained on these devices. In fact, in 2025, data destruction should be considered an essential requirement, not an option. Multi-national corporations, schools, retailers, banks, government agencies, medical practices, and so many other organizations possess critical information that could cause financial or personal harm if it were to land in the wrong hands. Plus, organizations damage their reputation for being careless.
How you manage old, broken, or unused computers, printers, phones, scanners, etc., takes careful consideration. In many countries, there are strict laws you must follow, and failure to do so can lead to significant fines, legal fees, and damage to your organization’s reputation. All data must be destroyed properly.
Why Data Destruction Is a Requirement
Per IBM, the average cost of a data breach reached $4.9 million, a 10% increase from prior years. Data doesn’t have to be in one spot. Breaches of public clouds cost an average of $5.17 million.
No matter where your organization keeps personally identifiable information (PII) or sensitive personally identifiable information (SPII), data security is essential. That means you can’t shortcut data destruction.
Deleting Files and Restoring to Factory Settings Isn’t Enough
Despite what you may have been told or believe to be true, deleting files doesn’t rid your electronic device of items forever. Restoring an item to its factory settings also isn’t good enough.
When you delete a file or do a factory reset, you’re removing the path that connects your computer’s file name or icon and that file. If you put in the work to restore or find a new path, you will access those files again. You haven’t destroyed the data that was in your computer, tablet, phone, or other device.
You have two options for making data impossible to recover: shredding and degaussing. How can you tell which is best for your organization’s needs?
E-waste in 2025: Finding the Best Data Destruction Method
How do you know which is best? If you still have any magnetic media kicking around your office or storeroom, degaussing is a helpful process, but you might end up with devices that have to go through shredders anyway to get a certificate that provides proof of destruction.
Most organizations have newer technology that requires shredders, but you might possess older magnetic media in storage units or supply rooms. It’s time to destroy that data and meet legal regulations.
Know the data destruction standards for your industry. For example, medical offices in the US have to follow HIPAA laws mandating that healthcare related companies delete data from everything that stores it, including EKG machines, tablets, printers, and pagers.
When you no longer need an electronic device that stores data, it’s important to get a Certificate of Destruction (COD). This document is your proof that PII or SPII was properly destroyed. It’s what can keep you from being fined in cases where you did everything correctly, but a data destruction provider failed to follow the proper protocol.
A COD includes the following information:
- What sanitization method was used
- What verification steps were followed
- Who completed the processes to destroy data
- When the process was completed
- What was destroyed
Increased Threats Require Expert Data Destruction
We’re only a little more than halfway through the year, and already, the amount of data that’s been compromised is alarming.
When you’re keeping records that you no longer need, the amount you stand to lose in a breach is astounding. It’s important to follow laws regarding how long to retain PPI or SPPI. When you do need to delete data, do it correctly. Deleting files isn’t enough.
For comprehensive data security, a certified ITAD company is essential. Degaussing may work in situations, but it won’t work for everything. With a professional’s help, data is destroyed properly following the appropriate laws.
It is key to work with an ITAD company or e-waste recycler that is NAID AAA certified, SOC Type 2 and 3 certified, and ISO 27001 certified. This will conform that the organization handling your devices has been audited and vetted at the highest international standards for data security.
The bottom line is that data destruction must always be a critical and essential part of the electronic device recycling process.