Trade-in
07
Feb
2025
4
min read

Most organizations struggle to enforce data sanitization policies

A recent study by Blancco, a global supplier of data erasure and diagnostics solutions, helping organizations securely remove data from IT assets and devices, among 1,850 large enterprises worldwide reveals a significant gap between data sanitization policies and their actual implementation. While 96% of organizations have a policy in place, only 44% feel that it is fully implemented and communicated across the company. Incomplete data sanitization policies create security risks, as sensitive data can fall into the wrong hands. Many organizations struggle due to insufficient employee training on secure data removal when devices reach the end of their lifecycle.

Responsibility is often unclear

The study shows that IT departments are usually responsible for managing end-of-life equipment, but this varies by region. In Japan, 54% of organizations assign this task to IT, while globally, the figure is below half. In many cases, departing employees or their managers (each 22%) are accountable, leading to inconsistencies.

Offsite sanitization increases risks

One-third (34%) of companies perform data sanitization offsite, introducing potential security issues. Lack of control over asset storage during transport and uncertainty about successful data removal are key concerns.

Delays in equipment processing

Only 13% of organizations sanitize devices immediately after their lifecycle ends. Meanwhile, 31% take more than a month, increasing the risk of data breaches due to unsecured storage.

Ownership and communication gaps

While 68% of respondents state that policy ownership is clearly defined, implementation roles are often scattered across functions. Additionally, 31% of organizations have not communicated their data sanitization policy internally, and 20% admit the policy is incomplete.

Policies are often outdated

Despite 89% of organizations having policies less than a year old, they may not cover all critical aspects, leaving gaps in security.

Best practices for better enforcement

Organizations should ensure that data sanitization policies cover all IT assets, including smartphones, tablets, PCs, servers, and virtual machines. Devices should be sanitized immediately after their lifecycle ends, ideally within 24 hours. Preventing the departure of sensitive data from company premises and obtaining tamper-proof destruction certificates is crucial. Regular training and policy communication, along with assigning clear responsibilities and conducting internal audits, will strengthen compliance. The "Guidelines for Media Sanitization" from NIST Special Publication 800.88 Rev. 1 can serve as a valuable reference.

Conclusion: bridging the policy-practice gap

The findings highlight the need for organizations to reassess their data sanitization policies to address security risks. Stronger communication, clearer ownership, and strict adherence to best practices are essential to closing the gap between policy and implementation.

Interested in the global market for used electronics?

From now on, you'll never miss a thing and can easily stay up to date with the latest developments in the secondary market. Sign up today for the newsletter from secondarymarket.news. It's filled with the latest news, trends, developments, and gossip. Stay informed and don't miss out on anything!

Daily (except on Sundays), you'll receive the latest news from the global secondary market straight to your inbox after registering. This way, you'll always stay up to date with the latest secondary market developments and trends.

Sign up for our newsletter

Thank you for registering for the newsletter

From now on, you'll always stay informed and won't miss out on the latest trends and developments in the global secondary market for used electronics.
Oops! Something went wrong while submitting the form.
© 2024 Secondary Market News. All rights reserved.
Privacy & Cookies