1. How do the disposal devices be processed?
LTG provides total solution from secure logistics to data erasure/destruction and recycling. Customer’s assets will be collected securely with GPS and serial locks by our own trucks or certified 3PLs and deliver to our facilities.
We also provide different types of recycling and asset recovery solutions to satisfy our customers. Products which we process and recycle include desktop, server, workstation, tapes, printer, scanner, electronics parts and components, etc. Our highlighted services include the following:
Asset Audit and Value Evaluation
Receiving, Weighting, Sorting and Scanning
Data Erasure via Proprietary software or Physical Destruction/Degaussing
Customer’s Intellectual Properties Removal
Testing and Grading
Complete Destruction
Issuance of Certificate of Data Erasure
Issuance of Certificate of Destruction
Certificate of Physical Destruction
Consolidated Reporting
2. What type of devices is suitable for data sanitization?
Data sanitization is a method of software-based overwriting that destroys all electronic data on a hard disk drive or other digital media completely. It removes all information and no meaningful data can be recovered by laboratory while leaving the disk reusable, preserving assets and the environment. Type of devices suitable for data sanitization:
Desktop
Notebook
Server
Workstation
Internal /External Hard Drives
SSD
USB Portable Drives
3. What type of devices is suitable for degaussing?
Degaussing is applicable to all magnetic storage devices, which can permanently destroy data. During the degaussing process, the magnetic flux of the media is reduced to virtually zero by applying a reversing magnetizing field. Device cannot be reused after degauss. Type of devices suitable for degaussing:
Backup Tapes
ATA Hard Drives
SCSI Drives
USB Removable Media (Pen Drives, Thumb Drives, Flash Drives, Memory Sticks) with Hard Drives
Magnetic Bubble Memory
Magnetic Core Memory
Magnetic Cards
4. What Worldwide Ordinances are related to data protection?
Hong Kong
Personal Data (Privacy) Ordinance - Chapter 486
Computer Crimes Ordinance
OGCIO IT Guidelines
Disposal of Computer Equipment with Sensitive Information Guidelines
US and Europe
U.S. Department of Defense (DoD) 5220-22M
Health Insurance Portability and Accountability Act (HIPAA)
Sarbanes-Oxley Act (SOX)
Gramm-Leach-Bliley Acts
Basel II
U.K. Data Protection Act
FTC Disposal Rule
Patriot Act Identity Theft and Assumption Deterrence Act
National Industrial Security Program (NISP)
Freedom of information (FOI) and Personal Information Protection acts
European Union Directive on Data Protection (Directive 95/46/EC)