DATA DESTRUCTION - INSURED - IL EPA REGISTERED - FULL SERVICE PICK UP
AVA Electronics Recycling is compliant with the following information and privacy regulation acts: HIPAA; Health Insurance Portability and Accountability Act HITECH Act; Health Information Technology for Economic and Clinical Health Act FACTA; Fair and Accurate Credit Transactions Act GLBA; Gramm-Leach-Bliley Act Sarbanes Oxley; Public Company Accounting Reform and Investor Protection Act
AVA assures all data is destroyed and your company’s information destruction is a top priority. We make sure that the information is not compromised or stolen. The hard drives / media are destroyed in a manner set by the Dept of Defense method also known as the DOD 5220.22-M or standard as well as the NIST (National Institute of Standards and Technology) Guidelines for Media Sanitization - as specified in Special Publication 800-88 and NAID (National Association for Information Destruction), standards for data destruction.* AVA has up to date wiping software that effectively over writes stored data. However, in many cases hard drives coming out of outdated equipment cannot be reformatted for reuse and are shredded.
At AVA we recognize that data security is an equally critical part of Responsible Recycling as zero landfilling and preventing toxic scrap from illegal export. AVA also offers customers (on request for a small fee) an onsite hard drive perforating or “punching” service and the drives are shredded once returned to the facility. Finally, upon processing your data/media storage equipment your company will receive by mail a ‘Certificate of Destruction’ which applies to the hard drives and other storage media as well as the equipment itself. AVA is pledged to utilizing R2 and eStewards certified downstream vendors for all materials that may be sensitive, toxic or may pose risks or hazard, as part of our ongoing environmental and data security commitments. For more on data security see AVA’s FAQ’s and Blog sections on this site.
*The DoD 5220.22-M sanitization method was originally defined by the US National Industrial Security Program (NISP) in the National Industrial Security Program Operating Manual (NISPOM)