About E-Waste Security: Data Security

Information security at the highest level.

E-Waste Security is an information security company specializing in digital media data destruction, IT Asset Disposal, ewaste and computer recycling.  Our primary focus is ensuring that sensitive and personal information is securely and permanently destroyed through the physical destruction of media.

We work with businesses, organizations, and governmental agencies to ensure their data is protected and secure from unauthorized access or misuse.

Our team of experts is trained in the latest data destruction and information security techniques and technologies, ensuring our clients can trust that their data is handled with the highest level of care and professionalism.

Clients and Qualifications

Most of E-Waste Security’s clients are in the healthcare, technology, and financial industries.  “These companies have much to lose if information is lost or stolen.  A data breach can be fatal to a company.  The costs can be calculated in financial loss, loss of reputation, employee time and resources, and fines.”

We also serve several organizations in the public sector, including the City of Los Angeles, the County of Los Angeles, NASA/JPL, and The Office of Inspector General of the Department of Health and Human Resources. E-Waste Security has been NAID Certified since its beginning in 2012.

The association for information destruction certified logo.
hard Drive destruction projects for the City of Los Angeles
Hard drive destruction projects NASA in Pasadena
City of Irvine
department of Health and Human Services
GE Healthcare

The Founder

Gary Scott, CPP, founded E-Waste Security in 2012.  He holds a CPP Certification, the highest level of certification from the American Institute of Industrial Security (ASIS), and a B.A. in business administration from USC.  https://www.asisonline.org/

Before founding E-Waste Security, Gary worked in the Financial Advisory practice at PricewaterhouseCoopers. While there, he worked in litigation support, calculating lost profits and damages for expert testimony for depositions and trials.

Gary Scott, CPP president and founder of E-Waste Security

Why E-Waste Security was Formed. 

While closing a consumer product business, Gary was responsible for securing multiple computers, laptops, and enterprise servers for disposal and recycling.  These servers held sensitive information, including financial data, employee records, personally identifiable information (PII), and thousands of credit cards (PCI/DSS).

The computer equipment stayed in a locked cabinet for months while the IT group researched where to recycle it.  The equipment was eventually brought to a local high school e-waste and computer recycling event.  “I immediately felt uncomfortable handing over the equipment with so much confidential information.”

The recycling company was not contracted, was uninsured for cybersecurity, and was not liable for any information lost or stolen.   Why would they spend hours erasing or wiping hard drives when they could easily reformat in only minutes?  “The book ‘The Gift of Fear’ by Gavin de Becker popped into my head.”

A large pile of computer equipment in a warehouse.

My lesson from Gavin de Becker.

Gavin de Becker, the author of “The Gift of Fear,” is a security specialist, primarily for governments, large corporations, and public figures.  His book draws on real-life examples and case studies, underscoring fear as a natural and adaptive response. He urges readers to pay attention to intuitive signals rather than dismiss them. De Becker provides practical insights on differentiating between irrational fears and genuine, life-preserving instincts, empowering individuals to make informed decisions.

The gift of fear survival signals that protect us from violence.

Why Clients Choose to Work with E-Waste Security

We understand security and the consequences of a data breach.

Z

NAID Certified

When your IT policies and procedures get audited – think SOC – the auditor will ask for two items for data destruction: Certificate of Destruction and due diligence on your provider.  NAID is the gold standard of third-party affirmation.

Z

Data Privacy Compliance

Compliance with data privacy laws requires secure data destruction and a solid chain of custody.  Allow digital media to be removed from your premises; control is a break in that chain.

Z

Data Destruction

What are your priorities when disposing of retired IT equipment?  The safe answer is, “Our number one goal is to secure our customer’s information.”  Recouping value from erased hard drives should be way down the list.

Information Security and Data Privacy Compliance