{"id":38258,"date":"2019-04-10T10:02:03","date_gmt":"2019-04-10T10:02:03","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=38258"},"modified":"2019-04-22T11:26:48","modified_gmt":"2019-04-22T11:26:48","slug":"data-privacy-risks-with-used-media","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/","title":{"rendered":"Data Privacy Risks with Used Media"},"content":{"rendered":"\n<p><em>Are you selling off, exchanging, donating, returning, or simply dumping your storage device. <\/em><br><\/p>\n\n\n\n<p><em>Well, your data might be at risk\u2026<\/em><\/p>\n\n\n\n<p align=\"justify\">Redundant print copies of documents are shredded to protect sensitive information from unauthorized access. But, the same level of discretion is not observed in the case of digitally stored information. Considering the widespread use of storage devices, it\u2019s surprising to see the lack of users\u2019 awareness (and indifference) towards using secure media disposal tools and practices. <\/p>\n\n\n\n<p>The following points outline some of the typical ways users dispose of their used devices\u2014 <\/p>\n\n\n\n<ol><li>Consumers avail lucrative deals to sell off or exchange their used smartphones and laptops for new. <\/li><li> Enterprises sell off their end-of-life hardware to resellers without proper sanitization (internally or through an IT asset disposition agency). <\/li><li> Companies procure storage hardware on lease for a certain duration and return it afterwards without proper sanitization.<\/li><li> A consumer or company may dump their used storage hardware with e-scrap dealers, after simply deleting the data and\/or formatting the storage media.<\/li><\/ol>\n\n\n\n<p align=\"justify\">All these scenarios expose the residual data on used devices to unauthorized access and thereby pose risk of data breach and misuse.<\/p>\n\n\n\n<h2><strong>Second hand devices &#8211; what are the risks of data breach? <\/strong><\/h2>\n\n\n\n<p align=\"justify\">Residual data on used devices poses immense risks for both consumers and businesses. This <a href=\"https:\/\/www.stellarinfo.com\/ResidualDataStudy.php\">study  report<\/a> presents minute details of the risks posed by residual data in second hand devices. <\/p>\n\n\n\n<p>To summarize\u2014<\/p>\n\n\n\n<p align=\"justify\"><strong>For individuals,<\/strong> breach of residual data can lead to theft of sensitive information including personally identifiable information (PII) such as biometrics, medical reports, social security number, passport number, credit card details, and online banking credentials etc. This information can be misused for identity theft, fraudulent transactions, credit history manipulation, defamation, and misattribution.<\/p>\n\n\n\n<p align=\"justify\"><strong>Sensitive personal data<\/strong> such as geolocation, app &amp; browser data, private pictures, contacts, text messages, emails, addresses, chat history, browsing history, and date of birth etc. can be exploited for threats, harassment, extortion, and other kinds of physical and emotional threats. Further, a new owner of an improperly sanitized second hand device may end up in possession of \u2018illicit information\u2019 which is owned by the previous device user, leading to various problems.<\/p>\n\n\n\n<p align=\"justify\"><strong>For businesses<\/strong>, residual data in outgoing devices may include intellectual property, financial reports, business intelligence, and trade arrangements and secrets, and strategic documents, etc. Breach of this information can lead to financial loss, brand damage, litigation, and also non-compliance with data protection laws such as GDPR with hefty fines. <\/p>\n\n\n\n<p>The following case outlines a few implications of data breach on a business entity\u2014<\/p>\n\n\n\n<p align=\"justify\"><em>NCIX, a premiere Canadian PC hardware retailer, declared bankruptcy in December 2017. As a part of the process, operations were closed and assets were sold to pay investors and creditors. However, the assets were sold off without securely destroying the residual data. Later, in the following year, the data containing personal information of customers including their credit details were being sold on Craigslist for a few bucks. This includes every customer record NCIX created over the past 15 years in business.<\/em><\/p>\n\n\n\n<p><strong>Data Privacy &#8211; the onus is on you<\/strong><\/p>\n\n\n\n<p align=\"justify\"><strong>As an organization or individual, it\u2019s crucial to be aware that simply deleting files, formatting drive, or resetting smartphone does not sanitize the media.<\/strong> The deleted and formatted data can be easily recovered with the help of a basic data recovery software. <\/p>\n\n\n\n<p align=\"justify\">Further, lab data recovery techniques may even recover the data from physically crashed or failed hard drives, including media damage caused by natural disasters like storms, floods, or fire<\/p>\n\n\n\n<p align=\"justify\">So, before you sell off, donate, exchange, return, or simply throw away your used or legacy computer system, server, storage drive, or smartphone, it\u2019s critically important that you securely wipe all the residual data from such devices. <\/p>\n\n\n\n<p><strong>Data Erasure &#8211; the ideal solution for data privacy<\/strong><\/p>\n\n\n\n<p align=\"justify\">Data erasure software provides a fast, scalable, and effective solution for media sanitization, and thereby nullifies any chances of data leakage from second hand (or any) devices. <\/p>\n\n\n\n<p align=\"justify\">Data erasure technique is based on \u2018overwriting\u2019 the data inside a media with binary information, which permanently sanitizes the media beyond recovery.  However, a great thing about data erasure software is that you can reuse the media, unlike techniques like degaussing which render the device useless and further cause e-waste generation.<\/p>\n\n\n\n<p align=\"justify\">A certified data erasure software such as <a href=\"https:\/\/www.stellarinfo.com\/data-erasure\/data-eraser-windows.php\"><strong>BitRaser<\/strong><\/a>  is the best solution for secure media sanitization, as it can permanently erase virtually any kind of storage media including hard disk drives, solid state drives, servers, and rack-mounted devices. <\/p>\n\n\n\n<p align=\"justify\">BitRaser supports 27 international data erasure algorithms including NIST Clear &amp; ATA, and DoD 5220, etc. to make sure that the media is permanently erased as per the prevalent regulatory standards for data privacy. To this end, it generates certificate of erasure with tamper-proof audit trails that can help you meet compliance with standards such as SOX, GLB, HIPAA, ISO27001, EU-GDPR, and PCI-DSS.<\/p>\n\n\n\n<p align=\"justify\">BitRaser for Mobile  is another specialized data erasure software that permanently erases data from iOS and Android smartphones to ensure that the media is completely sanitized with no threat of data breach of leakage.<\/p>\n\n\n\n<h3><strong>Media Sanitization for Data Privacy. It\u2019s your Call <\/strong><\/h3>\n\n\n\n<p align=\"justify\">Data privacy is essential from personal, commercial, &amp; legal aspects. That\u2019s clear. More importantly, it\u2019s a fundamental human right. Today the need to protect data privacy is more than ever; we are in the middle of big data revolution, have multiple devices to manage, and consume \u2018digital\u2019 like nothing that came before. Grasping the various data threats today, the need is to adopt a fool-proof solution that can sanitize your outgoing media to perfection. Certified data erasure software is your best bet to ensure absolute data privacy by permanently erasing the media. It\u2019s your call. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you selling off, exchanging, donating, returning, or simply dumping your storage&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/\">Continue reading <span class=\"screen-reader-text\">Data Privacy Risks with Used Media<\/span><\/a><\/p>\n","protected":false},"author":26,"featured_media":38297,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[168],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the Data Privacy Risks with Used Media ?<\/title>\n<meta name=\"description\" content=\"There are many data privacy risk with used media such as data theft, misuse of data, etc. Here you find way to wipe out your data securely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the Data Privacy Risks with Used Media ?\" \/>\n<meta property=\"og:description\" content=\"There are many data privacy risk with used media such as data theft, misuse of data, etc. Here you find way to wipe out your data securely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-10T10:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-22T11:26:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2019\/04\/Data-Privacy-Risks-with-Used-Media-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@arunaattri\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aruna Attri\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2019\/04\/Data-Privacy-Risks-with-Used-Media-1.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2019\/04\/Data-Privacy-Risks-with-Used-Media-1.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Data Privacy Risks with Used Media\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#webpage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/\",\"name\":\"What are the Data Privacy Risks with Used Media ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#primaryimage\"},\"datePublished\":\"2019-04-10T10:02:03+00:00\",\"dateModified\":\"2019-04-22T11:26:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/a7ada2c5e2b72f240b63d760e216dce5\"},\"description\":\"There are many data privacy risk with used media such as data theft, misuse of data, etc. Here you find way to wipe out your data securely.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Privacy Risks with Used Media\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/a7ada2c5e2b72f240b63d760e216dce5\",\"name\":\"Aruna Attri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f57f1652c8d74cb0598037736abb0712?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f57f1652c8d74cb0598037736abb0712?s=96&d=mm&r=g\",\"caption\":\"Aruna Attri\"},\"description\":\"Aruna Attri is a Senior Data Recovery Expert at Stellar\u00ae. She is a technology blogger and Windows expert. She has experience in Windows data recovery domain. She loves to troubleshoot Windows issue and write technical tips and tutorials.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/aruna-attri-525589a2\/\",\"https:\/\/twitter.com\/arunaattri\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/aruna\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the Data Privacy Risks with Used Media ?","description":"There are many data privacy risk with used media such as data theft, misuse of data, etc. Here you find way to wipe out your data securely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/","og_locale":"en_US","og_type":"article","og_title":"What are the Data Privacy Risks with Used Media ?","og_description":"There are many data privacy risk with used media such as data theft, misuse of data, etc. Here you find way to wipe out your data securely.","og_url":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/","og_site_name":"Stellar Data Recovery Blog","article_published_time":"2019-04-10T10:02:03+00:00","article_modified_time":"2019-04-22T11:26:48+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2019\/04\/Data-Privacy-Risks-with-Used-Media-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary","twitter_creator":"@arunaattri","twitter_misc":{"Written by":"Aruna Attri","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2019\/04\/Data-Privacy-Risks-with-Used-Media-1.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2019\/04\/Data-Privacy-Risks-with-Used-Media-1.jpg","width":1000,"height":600,"caption":"Data Privacy Risks with Used Media"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#webpage","url":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/","name":"What are the Data Privacy Risks with Used Media ?","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#primaryimage"},"datePublished":"2019-04-10T10:02:03+00:00","dateModified":"2019-04-22T11:26:48+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/a7ada2c5e2b72f240b63d760e216dce5"},"description":"There are many data privacy risk with used media such as data theft, misuse of data, etc. Here you find way to wipe out your data securely.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/data-privacy-risks-with-used-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Privacy Risks with Used Media"}]},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/a7ada2c5e2b72f240b63d760e216dce5","name":"Aruna Attri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f57f1652c8d74cb0598037736abb0712?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f57f1652c8d74cb0598037736abb0712?s=96&d=mm&r=g","caption":"Aruna Attri"},"description":"Aruna Attri is a Senior Data Recovery Expert at Stellar\u00ae. She is a technology blogger and Windows expert. She has experience in Windows data recovery domain. She loves to troubleshoot Windows issue and write technical tips and tutorials.","sameAs":["https:\/\/www.linkedin.com\/in\/aruna-attri-525589a2\/","https:\/\/twitter.com\/arunaattri"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/aruna\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/38258"}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=38258"}],"version-history":[{"count":2,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/38258\/revisions"}],"predecessor-version":[{"id":38972,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/38258\/revisions\/38972"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/38297"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=38258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=38258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=38258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}