Skip to content

Secure disposal/recycling of a defective hardware

To prevent security issues in erasing software for hardware reuse or disposal/recycling of a device, customer must perform disposal in such a fashion to ensure that stored data is neither readable nor restorable.

For concrete guidelines follow the steps described in the documentation of the corresponding devices (IEDs, Hardware the IEM Pro&V / IEVD is running on) and the documentation of the underlying software (IEM Pro / IEMV / IEVD).

General steps for Secure disposal

  • The following organizational regulations must be implemented by the operator of the production plant:
    • Responsibilities, company guidelines and disposal procedures are defined as part of a risk analysis.
    • The topic of "disposal" is integrated into the security management process.
    • Based on the risk analysis, employees are sensitized and specialized service providers are selected.
  • Steps for the secure disposal of components and media to be considered:
    • Collect devices and media intended for destruction by a disposal service provider in a secure place, e.g. in a lockable container.
    • Installed storage media (e.g. hard disks, SSDs)
      Destroy the storage media and dispose of them in accordance with local regulations.
    • CPUs
      Reset the CPU components to the factory settings and delete the flash memory.
    • Reset all components that can be reset to the factory settings.
    • Mobile storage media (e.g. CDs, DVDs, USB flash memory, memory cards)
      Physically destroy and dispose of mobile storage media.
    • Device components and parts
      Dispose of device components and parts in an environmentally friendly manner.
    • Hazardous substances (batteries and rechargeable batteries)
      Dispose of hazardous substances in an environmentally friendly manner.
    • Certificates, keys and passwords
      Revoke certificates. Overwrite or change keys and passwords.
    • TPM (Trusted Platform Module)
      Reset or delete the TPM in the BIOS before disposing of a computer. You can find the exact procedure in the manufacturer's documentation.
  • Steps for removing software
    • Uninstallation
    • Removal of the configuration
    • Removal of log files
    • Removal of other runtime data
    • Reminder of data from existing backups
    • Removal of users/groups/file shares that are no longer required
    • Possible reset of secure boot configurations on PCs
    • Possible restore of the original secure boot key which was originally installed ex factory on the PC (usually Microsoft Windows key)
  • Legally and environmentally compliant disposal
    Have the old device recycled or disposed of by a certified disposal company for electronic waste in accordance with local regulations.