Each year a growing number of established and well-known companies find themselves in the headlines for embarrassing – and costly – failures to protect data. Many of these cases can be attributed to the actions of third-party service providers and the failure of organizations to adequately assess the risks when looking for partners to manage returns, trade-ins, and IT Asset disposition. Similar risks are inherent in auctioning used electronics to the highest bidder without doing the proper due diligence on the buyer.
A study on Third-Party Data Risk conducted by Ponemon Institute, a leading research organization dedicated to data privacy and protection, surveyed more than 1000 CIOs and security professionals. Almost 60% of respondents experienced a data breach caused by a third-party service provider – with forty-two percent reporting such a breach had occurred in the previous 12 months. One reason that so many organizations do not have adequate safeguards in place is simply “out of sight, out of mind.”
Data security may be front and center for organizations as long as data-containing devices remain in their possession, but many organizations falsely assume their responsibility ends when the devices are sold or transferred to a third-party. However, many regulations involving data privacy hold organizations responsible for the actions of their third-party vendors – and with good reason. Several studies in the past two years analyzed electronics that were being marketed for reuse and found many of those devices contained residual data including social security numbers, passwords, corporate emails and projections, and other sensitive and proprietary information. Particularly alarming was that in most cases it was clear an ineffective attempt had been made to remove the data – which means the third-party responsible for data destruction and remarketing was either unskilled, had cut corners…or both!
Organizations that fail to adequately assess the risks of third-party vendors and exercise adequate due diligence in the selection and management process, are subject to significant fines. Last year, the U.S. Treasury Department levied a $60 million fine to one of the largest international investment banks for failing to exercise proper oversight in its management of decommissioned electronic equipment and the data it contained.
Separate studies conducted by Cone Communications and by James Rubin and Barie Carmichael (Published by Columbia Business School) find that consumers have extremely high expectations when it comes to corporate responsibility – and that how well companies measure up in meeting those expectations has tremendous impact on consumer loyalty and purchasing decisions.
Virtually all third-party vendors, buyers, or remarketers will claim to be a responsible vendor, but unfortunately, that is not always the case. Any vendor can print a “Certificate of Destruction,” but do the actions of the vendor match the words on the paper? When selecting partners to manage electronic returns, trade-ins, remarketing or disposition, thorough due diligence is essential for reducing risk in the reverse supply chain.
This includes verifying things such as:
If you do not know the answers to these questions, your organization could be at risk. The new R2v3 Standard (free to download) provides a great roadmap for evaluating your vendors. Core Section 7 outlines data security controls that every vendor involved in the handling or processing of your electronic equipment should be implementing. And additional measures and controls should be in place for vendors that perform the actual data sanitization. The requirements in Appendix B of the R2v3 Standard serve as a good benchmark to follow. The combination of Core 7 and Appendix B can provide a good guide for performing your own due diligence.
Self-made claims by vendors are not always reliable. Simply asking your vendor to fill out a questionnaire to self-report their compliance with these best practices, does not provide adequate assurance that data-containing devices will be securely managed and data effectively sanitized. Without verification, there can be little confidence in the vendor’s response. But verification can be challenging because data security is a complex topic and hard to evaluate.
Another way to verify that your vendors have implemented the best practices in Core 7 and Appendix B is to use the third-party certification model. Every facility certified to the R2v3 Standard is evaluated each year for conformance to the Core 7 data security requirements -- and every facility certified to Appendix B has met the additional requirements that apply specifically to data sanitization.
R2 addresses the full reverse supply chain, from first use through end-of-life. The latest version of the Standard, R2v3, has further raised the bar for data security as well as for practices that maximize responsible reuse and support a circular economy for electronics. And comprehensive annual audits of R2 Certified facilities provide oversight and accountability for increased confidence in R2 Certified vendors.
With nearly 950 R2 Certified facilities operating in 33 countries, partnering with R2 vendors can be a powerful way to help your organization avoid making headlines for the wrong reasons. You can search for an R2 Certified vendor at https://R2directory.org.
To learn more about R2 requirements and how R2 Certified Partners reduce risk in the reverse supply chain, visit the R2 website: https://seriR2.org