Secure disposal/recycling of a defective hardware¶
To prevent security issues in erasing software for hardware reuse or disposal/recycling of a device, customer must perform disposal in such a fashion to ensure that stored data is neither readable nor restorable.
For concrete guidelines follow the steps described in the documentation of the corresponding devices (IEDs, Hardware the IEM Pro&V / IEVD is running on) and the documentation of the underlying software (IEM Pro / IEMV / IEVD).
General steps for Secure disposal
- The following organizational regulations must be implemented by the operator of the production plant:
- Responsibilities, company guidelines and disposal procedures are defined as part of a risk analysis.
- The topic of "disposal" is integrated into the security management process.
- Based on the risk analysis, employees are sensitized and specialized service providers are selected.
- Steps for the secure disposal of components and media to be considered:
- Collect devices and media intended for destruction by a disposal service provider in a secure place, e.g. in a lockable container.
- Installed storage media (e.g. hard disks, SSDs)
Destroy the storage media and dispose of them in accordance with local regulations. - CPUs
Reset the CPU components to the factory settings and delete the flash memory. - Reset all components that can be reset to the factory settings.
- Mobile storage media (e.g. CDs, DVDs, USB flash memory, memory cards)
Physically destroy and dispose of mobile storage media. - Device components and parts
Dispose of device components and parts in an environmentally friendly manner. - Hazardous substances (batteries and rechargeable batteries)
Dispose of hazardous substances in an environmentally friendly manner. - Certificates, keys and passwords
Revoke certificates. Overwrite or change keys and passwords. - TPM (Trusted Platform Module)
Reset or delete the TPM in the BIOS before disposing of a computer. You can find the exact procedure in the manufacturer's documentation.
- Steps for removing software
- Uninstallation
- Removal of the configuration
- Removal of log files
- Removal of other runtime data
- Reminder of data from existing backups
- Removal of users/groups/file shares that are no longer required
- Possible reset of secure boot configurations on PCs
- Possible restore of the original secure boot key which was originally installed ex factory on the PC (usually Microsoft Windows key)
- Legally and environmentally compliant disposal
Have the old device recycled or disposed of by a certified disposal company for electronic waste in accordance with local regulations.