2. Securis Enterprise Customers
▪ US Airways
▪ Cerner Corporation
▪ Amtrak
▪ Boeing
▪ Airbus
▪ C.B. Richard Ellis
▪ Jones Lang LaSalle
▪ General Dynamics
▪ Navy Federal Credit Union
▪ Federal Department of Transportation
2
3. Core Strengths
Data Shredding
Mobile industrial shredder destroys computer hard drives, cell phones, back-up
tapes, DLT, LTO, and other data storage devices onsite with staff witness or off-
3site at our secure processing facility
Data Degaussing
Mobile State-of-the-art LM-4 degausser is specially designed to destroy large
quantities of magnetically-stored electronic media onsite at your facility with a
staff witness or off-site at our secure processing facility
Responsible E-waste Recycling & End of Life Disposition
Onsite removal service for recycling and resale of retired IT assets in compliance
with our Zero-Export, Zero-Landfill Policy
Chain of Custody Auditing & Reporting
Final documentation includes auditable inventory list of all IT assets that were
recycled or destroyed as well as a notarized Certificate of E-waste Recycling and
Destruction for your records
Development of Written Policies and Procedures
Ability to develop a professional corporate policy and procedure to protect from
liability and serve as a guideline when handling and destroying media
3
4. Chain of Custody Components
Ensure a Comprehensive, End-to-End Process to Ensure Zero Data Loss or Exposure
Components:
1. On-site inventory by serial number and corporate
identifying information stripped from equipment (i.e.
logos and company stickers)
2. Degaussing of magnetic data storage devices*
3. Shredding of data for security redundancy*
4. Resale of appropriate equipment
5. Domestic recycling of e-waste and shredded particles*
6. Delivery of nationally-recognized documentation of the
entire process
*As necessary per customer engagement
5. The Securis Mission
Improve the Environment & the Security of Our Clients’ Data by
Promoting Appropriate, Responsible and Secure IT Asset
Recycling & Destruction
Our IT Asset Auditing, Recycling & Destruction Services are:
✓ Leak-Proof. Data devices and IT assets are destroyed and recycled using a closed-loop
process.
✓ Certified. Certified by Defense Logistics Information Service to store and transport military
critical technical data, R2 Certified
✓ Reliable. Services meet or exceed industry standards set by NSA, NAID and DLA Logistics
Information Service
✓ Responsible. Compliant with NIST, NISP, HIPAA, FACTA, Gramm-Leach-Bliley and various
other state and federal compliance measures
✓ Flexible. Onsite or off-site e-waste recycling and data destruction services available
✓ Environmentally-friendly. 100% Zero-Export, Zero-Landfill policy
7. Securis Compliance Profile
All of Securis’ processes and methods are in compliance with:
✓ Department of Defense (DOD)
✓ National Security Agency (NSA)
✓ National Institute of Standards and Technology (NIST) Special Publication Series 800-88
✓ National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M)
✓ Health Insurance Portability and Accountability Act (HIPAA)
✓ Health Information Technology for Economic and Clinical Health (HITECH)
✓ Sarbanes-Oxley Act of 2002
✓ Fair and Accurate Credit Transactions Act (FACTA)
✓ Gramm-Leach-Bliley Act
✓ Bank Secrecy Act
✓ Patriot Act of 2002
✓ Identity Theft and Assumption Deterrence Act
✓ US Safe Harbor Provisions
✓ FDA Security Regulations (21 C.F.R. part 11)
✓ PCI Data Security Standard
✓ Various state laws
7
8. Inventory and Reporting
Securis provides each client a detailed inventory list and Certificate of E-waste
Recycling and Data Destruction following the completion of the project.
8