securis sales presentation-policy items for al
TRANSCRIPT
SECURIS SM
Secure IT Asset End of Life Solutions
Fall 2015
Securis Enterprise Customers
▪ US Airways
▪ Cerner Corporation
▪ Amtrak
▪ Boeing
▪ Airbus
▪ C.B. Richard Ellis
▪ Jones Lang LaSalle
▪ General Dynamics
▪ Navy Federal Credit Union
▪ Federal Department of Transportation
2
Core StrengthsData ShreddingMobile industrial shredder destroys computer hard drives, cell phones, back-up tapes, DLT, LTO, and other data storage devices onsite with staff witness or off-3site at our secure processing facility
Data DegaussingMobile State-of-the-art LM-4 degausser is specially designed to destroy large quantities of magnetically-stored electronic media onsite at your facility with a staff witness or off-site at our secure processing facility
Responsible E-waste Recycling & End of Life DispositionOnsite removal service for recycling and resale of retired IT assets in compliance with our Zero-Export, Zero-Landfill Policy
Chain of Custody Auditing & ReportingFinal documentation includes auditable inventory list of all IT assets that were recycled or destroyed as well as a notarized Certificate of E-waste Recycling and Destruction for your records
Development of Written Policies and ProceduresAbility to develop a professional corporate policy and procedure to protect from liability and serve as a guideline when handling and destroying media
3
Chain of Custody Components Ensure a Comprehensive, End-to-End Process to Ensure Zero Data Loss or Exposure
Components: 1. On-site inventory by serial number and corporate
identifying information stripped from equipment (i.e. logos and company stickers)
2. Degaussing of magnetic data storage devices*3. Shredding of data for security redundancy*4. Resale of appropriate equipment5. Domestic recycling of e-waste and shredded particles*6. Delivery of nationally-recognized documentation of the
entire process
*As necessary per customer engagement
The Securis MissionImprove the Environment & the Security of Our Clients’ Data by
Promoting Appropriate, Responsible and Secure IT Asset Recycling & Destruction
Our IT Asset Auditing, Recycling & Destruction Services are:
✓ Leak-Proof. Data devices and IT assets are destroyed and recycled using a closed-loop process.
✓ Certified. Certified by Defense Logistics Information Service to store and transport military critical technical data, R2 Certified
✓ Reliable. Services meet or exceed industry standards set by NSA, NAID and DLA Logistics Information Service
✓ Responsible. Compliant with NIST, NISP, HIPAA, FACTA, Gramm-Leach-Bliley and various other state and federal compliance measures
✓ Flexible. Onsite or off-site e-waste recycling and data destruction services available
✓ Environmentally-friendly. 100% Zero-Export, Zero-Landfill policy
SecurisData Destruction
Process
Secure Transport
Data DegaussingData Shredding
Domestic Processing
Inventory Scanning
Securis Compliance Profile
All of Securis’ processes and methods are in compliance with:✓ Department of Defense (DOD)
✓ National Security Agency (NSA)
✓ National Institute of Standards and Technology (NIST) Special Publication Series 800-88
✓ National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M)
✓ Health Insurance Portability and Accountability Act (HIPAA)
✓ Health Information Technology for Economic and Clinical Health (HITECH)
✓ Sarbanes-Oxley Act of 2002
✓ Fair and Accurate Credit Transactions Act (FACTA)
✓ Gramm-Leach-Bliley Act
✓ Bank Secrecy Act
✓ Patriot Act of 2002
✓ Identity Theft and Assumption Deterrence Act
✓ US Safe Harbor Provisions
✓ FDA Security Regulations (21 C.F.R. part 11)
✓ PCI Data Security Standard
✓ Various state laws
7
Inventory and ReportingSecuris provides each client a detailed inventory list and Certificate of E-waste Recycling and Data Destruction following the completion of the project.
8