Every time a hardware upgrade cycle comes full-circle, a closet somewhere in the office gets more packed with retired phones and mobile devices. For many tech managers, trading those devices in can seem like more trouble than it’s worth.
In the past, there just wasn’t an easy enough way to trade enterprise mobile devices in. But now it’s easier than ever and there’s real value to gain from retired devices. Still, many tech managers resist.
There’s a stigma around device trade-ins that the process isn’t secure enough to meet strict enterprise standards. No amount of trade-in value is worth putting your sensitive data at risk.
That stigma exists for good reason; however, now is the time to break it with a more holistic approach to data sanitization.
Factory Resets Aren’t Enough for Data Sanitization
The security stigma with device trade-ins stems from problems with factory resets. Tech managers know that when they retire devices, factory resets can still leave data vulnerable.
This news broke when Cambridge University researchers found that they could recover master account tokens with 80% of used Android phones. Whether they recovered account tokens from Google apps, Facebook, WhatsApp, or any other service, the researchers found that they could restore data files from previous owners with a bit of hacking skill.
Flash storage presents problems when trying to wipe data and a factory reset just isn’t a reliable way to overcome the challenge. Especially when you’re subject to NIST or HIPAA compliance, you can’t trust simple resets with your enterprise data.
But rather than filling closets with retired devices, you can get peace of mind by trading in through a process fully-dedicated to data security.
6 Steps to Enterprise-Grade Data Sanitization
The only way to guarantee data security when trading devices in, is to work with a company that applies a rigorous, multi-step process that promises to remove and destroy all data on a device. This process has to go far beyond a simple factory reset.
And at HYLA we use the kind of data sanitization process that can put your mind at ease when trading in closets full of retired devices. Here are the 6 steps we use to ensure industry-leading data sanitization:
- Receiving: At the first touchpoint, SIM and memory cards are removed, secured, and shredded on-site. Devices are then checked against lost and stolen data and tagged for serialized tracking throughout the remaining steps.
- Data Sanitization: A large portion of trained trade-in staff is dedicated to this backend step. Leading-edge software is used to clear personal data from devices in a way that goes much deeper than factory resets.
- Inspection: Devices pass through quality control and some are audited to ensure all steps are properly executed before they’re prepared for reuse.
- Warehousing: When devices are deemed ready for distribution, they’re sorted and stored in a dedicated and secure area with staffed guards to ensure they don’t fall into the wrong hands.
- Resale: Only devices that are fully data-cleared and processed are approved for resale.
- Recycling: When devices are data-cleared but are too old or broken for resale, we recycle them for materials and guarantee completely green disposal.
If data security is your main trade-in concern, these data sanitization steps should be enough to break the stigma and put your mind at ease.
Don’t Let Data Security Block Trade-In Value
Stigmas are always hard to break, so it’s understandable for tech managers to still be hesitant to trade their retired devices. However, this data sanitization process has achieved compliance for:
- Environmental Protection Agency R2 Standard
- NIST (National Institute of Standards & Technology) 800-88 Guidelines for Media Sanitization
- HIPAA data clear requirements
- Zero Landfill policy
If you’re ready to find value in your aging, out-of-use devices, we’d love to help. Get in touch with us today to find out about the HYLA enterprise trade-in program.