Every organization, business and effort is under tremendous pressure to protect personal or non-public information that may exist inside IT hardware. Federal regulations like Gramm-Leach Bliley Act (GLB), Sarbanes-Oxley Act (SOX), Fair & Accurate Credit Transaction Act (FACTA), and Health Insurance Portability & Accountability Act (HIPAA), make it absolutely critical that secure data destruction of corporate proprietary and clientele confidential information. This data needs to be properly removed from hard drives whenever disposal of surplus or end-of-life IT equipment takes place. The unfortunate fact is that a single data security breach has the potential to put your organization at serious risk for lawsuits, fines, horrific publicity, and diminished corporate revenues – even imprisonment for the individuals involved. It is absolutely critical that IT asset managers understand the issues involved and exercise due diligence in selecting outside vendors to participate in their organizations’ IT disposal process.