In the News
Do you know what happens to your data when you dispose of an outdated device? In Consumers Donate Data with Recycled Electronics, Kacy Zurkus at InfoSecurity Magazine discusses how the majority of disposed devices contain personal information from the previous owner including Social Security Numbers (SSNs) and financial payment information. Zurkus elaborates that many individuals do not wipe their devices of previous data before they donate them and that many second-hand shops fail to wipe the devices before resale effectively. Zurkus explains that the only way to ensure that personal information does not remain on a device is to destroy the device.
Our Take
With more and more personal information being stored on electronic devices, the process of secure device disposal was bound to be a concern eventually. Although the majority of individuals buying second-hand devices are not going to go through the trouble of finding any remaining information from the previous owner, the reality that some malicious individuals might try to exploit this reality remains. Everyone could merely destroy all devices when they were finished using them. However, this would eliminate the market for used and often discounted products. To mitigate the risk for having your information discovered on a donated/discarded technological device, always wipe the device before you discard it. Taking the extra precaution will drastically reduce the potential for having your information exposed if the second-hand retailer fails to clean the device properly before it is resold.
Recommendations
How can you protect your personal and financial information when getting rid of a device?
- Understand the risks of putting your personal information into the world, and only share what you have to
- Use safe password practices, and take advantage of Multi-factor Authentication where possible
- Change your account passwords when you get a new device
- Refrain from storing large quantities of highly personal information on your devices
- Check your email, financial accounts, and credit reports regularly for abnormal activities