Protect your data.
Protecting your data is essential. Data security is not only important while the equipment is in use, it is also important once it has been removed. Improper data cleaning can expose your company to legal, financial and public relations risks. How should you protect information from obsolete equipment? Simply deleting is not enough.
When you lease with CSI, you have a built-in data security program for all equipment that is no longer in use. Our strict processes help you meet the highest standards and regulations, and best of all, give you peace of mind.
The following steps serve to summarize our data security program:
STEP 1: Lock hard drives for transport using our free software DriveProtector SM .
STEP 2: Upon arrival, the returned equipment is transferred directly to a security cage with limited access for employees.
STEP 3: Inside the security cage, the hard drives of all Intel-based PCs, laptops and servers are cleaned following the standards of the National Institute of Standers and Technology. All disks that cannot be cleaned completely are destroyed.
STEP 4: A verification certificate for each serial number is delivered to the customer.
Read IDC technology analysts’ recommendations on verifying your leasing company’s equipment disposal procedures.