Recycling IT equipment is the right thing to do. But before the equipment leaves your building, the data on it needs to be irreversibly destroyed. This guide explains the standards, the documentation you need, and what actually works.
Deleting files, reformatting a drive, or resetting a device to factory settings does not destroy the data. With freely available tools, deleted data on an untouched drive can be recovered in minutes. Proper data destruction requires overwriting, degaussing, or physical destruction.
NIST Special Publication 800-88 (Guidelines for Media Sanitization) is the federal standard for data destruction and the one most auditors reference — for HIPAA, SOX, and FedRAMP compliance alike. It defines three levels of sanitization:
Solid-state drives (SSDs) cannot be reliably purged by overwriting alone due to wear-leveling and spare sectors. NIST 800-88 recommends cryptographic erasure (if the drive supports it) or physical destruction for SSDs. If you're not sure, shred it.
A Certificate of Destruction (CoD) is a document issued by the recycler or data destruction service confirming that specific assets were destroyed to a defined standard on a specific date. It typically includes:
Always request a CoD before engaging any recycler. If they can't provide one, they're not the right vendor for a regulated business.
| Framework | Retention period for destruction records |
|---|---|
| Massachusetts 201 CMR 17.00 | Minimum 3 years (standard guidance) |
| HIPAA | 6 years from date of creation or last effective date |
| SOX | 7 years |
| GxP (FDA) | Varies by record type; typically life of product plus 2 years minimum |
When in doubt, keep longer. Storage is cheap. A missing audit trail is not.
Drives that have failed, SSDs without cryptographic erase support, and devices with sensitive data that cannot be confirmed erased should be physically destroyed. Most of the certified recyclers in our directory offer on-site shredding — a truck-mounted shredder comes to your facility and destroys drives in front of your staff, then issues the CoD on the spot. This is the preferred method for healthcare organizations and regulated businesses with strict chain-of-custody requirements.
Modern multifunction printers, copiers, and fax machines have internal hard drives that store images of every document processed. This is one of the most overlooked data security risks in small and mid-sized businesses. Before returning a leased copier or disposing of owned equipment:
For regulated businesses in Massachusetts, an ad-hoc disposal process isn't enough. Your Written Information Security Program (WISP) — required under 201 CMR 17.00 — must include documented procedures for how equipment is decommissioned and data destroyed. Auditors will ask for it.
A complete IT disposal policy covers:
If you need help building or reviewing your WISP and disposal policy, that's a consulting engagement. Talk to Jaime Pauline →
Every recycler in our directory can provide a Certificate of Destruction and holds at least one third-party certification.
View the Directory →