array(8) { ["eyebrow"]=> string(10) "Contact us" ["footer_logo"]=> array(24) { ["ID"]=> int(266) ["id"]=> int(266) ["title"]=> string(11) "footer-logo" ["filename"]=> string(15) "footer-logo.png" ["filesize"]=> int(3659) ["url"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["link"]=> string(42) "https://globalassetonline.com/footer-logo/" ["alt"]=> string(0) "" ["author"]=> string(1) "1" ["description"]=> string(0) "" ["caption"]=> string(0) "" ["name"]=> string(11) "footer-logo" ["status"]=> string(7) "inherit" ["uploaded_to"]=> int(0) ["date"]=> string(19) "2024-01-16 15:48:07" ["modified"]=> string(19) "2024-01-16 15:48:07" ["menu_order"]=> int(0) ["mime_type"]=> string(9) "image/png" ["type"]=> string(5) "image" ["subtype"]=> string(3) "png" ["icon"]=> string(66) "https://globalassetonline.com/wp-includes/images/media/default.png" ["width"]=> int(67) ["height"]=> int(46) ["sizes"]=> array(30) { ["thumbnail"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["thumbnail-width"]=> int(67) ["thumbnail-height"]=> int(46) ["medium"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["medium-width"]=> int(67) ["medium-height"]=> int(46) ["medium_large"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["medium_large-width"]=> int(67) ["medium_large-height"]=> int(46) ["large"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["large-width"]=> int(67) ["large-height"]=> int(46) ["1536x1536"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["1536x1536-width"]=> int(67) ["1536x1536-height"]=> int(46) ["2048x2048"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["2048x2048-width"]=> int(67) ["2048x2048-height"]=> int(46) ["page-masthead"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["page-masthead-width"]=> int(67) ["page-masthead-height"]=> int(46) ["listing-img"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["listing-img-width"]=> int(67) ["listing-img-height"]=> int(46) ["featured-listing-img"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["featured-listing-img-width"]=> int(67) ["featured-listing-img-height"]=> int(46) ["team-listing"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/footer-logo.png" ["team-listing-width"]=> int(67) ["team-listing-height"]=> int(46) } } ["link1"]=> object(WP_Post)#13303 (24) { ["ID"]=> int(3) ["post_author"]=> string(1) "1" ["post_date"]=> string(19) "2023-12-29 15:45:10" ["post_date_gmt"]=> string(19) "2023-12-29 15:45:10" ["post_content"]=> string(39847) "

Technology Assets, LLC (“Global Asset,” “we” or “us”) wants you to be familiar with how we collect, use, and disclose information.  This Privacy Policy describes our practices in connection with information that we collect through:

Collectively, we refer to the websites, social media pages, Apps, communications, and offline business interactions as the “Services.”

If you are a resident of California, Colorado, Connecticut, Utah, or Virginia, please see “Additional Information for Residents of California, Colorado, Connecticut, Utah, and Virginia,” below, for more information about our privacy practices and your rights.

Personal Information

Personal Information” is information that identifies you as an individual or relates to an identifiable individual.  We collect Personal Information through or in connection with the Services, such as:

Collection of Personal Information

We and our service providers collect Personal Information in a variety of ways, including: 

If you disclose any Personal Information relating to other people to us or to our service providers in connection with the Services, you represent that you have the authority to do so and to permit us to use the information in accordance with this Privacy Policy.

Use of Personal Information

We and our service providers use Personal Information for the following purposes:

Disclosure of Personal Information

We disclose Personal Information:

Other Uses and Disclosures

We may also use and disclose Personal Information as we believe to be necessary or appropriate:  (a) to comply with applicable law, to respond to requests from public and government authorities, to cooperate with law enforcement, and for other legal reasons; (b) to enforce our terms and conditions; and (c) to protect our rights, privacy, safety, or property, and/or that of you or others.  We may use, disclose, or transfer Personal Information to a third party in connection with any proposed or actual reorganization, bankruptcy, merger, sale, joint venture, assignment, transfer, or other disposition of all or any portion of our assets or stock.

OTHER Information

Other Information” is information that does not reveal your specific identity or directly relate to an identifiable individual.  We and our service providers may collect and use Other Information in a variety of ways, including:

Uses and Disclosures of Other Information

We may use and disclose Other Information for any purpose, except where we are required to do otherwise under applicable law.  If we are required to treat Other Information as Personal Information under applicable law, we may use and disclose it for the purposes for which we use and disclose Personal Information, as detailed in this Privacy Policy.  In some instances, we may combine Other Information with Personal Information.  If we do, we will treat the combined information as Personal Information as long as it is combined.

security

We seek to use reasonable organizational, technical, and administrative measures to protect Personal Information within our organization.  Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure.  If you have reason to believe that your interaction with us is no longer secure, please immediately notify us in accordance with the “Contact Us” section below.

RETENTION PERIOD

We retain Personal Information for as long as needed or permitted to fulfill the purpose(s) for which it was obtained, including to satisfy any legal, compliance, accounting, or reporting requirements, and consistent with applicable law.  The criteria used to determine our retention periods include:

THIRD-PARTY SERVICES

This Privacy Policy does not address, and we are not responsible for, the privacy, information, or other practices of any third parties, including any third party operating a website or service to which the Services link.  The inclusion of a link on the Services does not imply our endorsement of the linked site or service.  In addition, we are not responsible for the information collection, use, disclosure, or security policies or practices of other organizations, such as Facebook, Twitter, Instagram, YouTube, Pinterest, LinkedIn, Apple, Google, Microsoft, RIM, or any other social media platform, operating system provider, app provider, wireless service provider, or device manufacturer, including with respect to any Personal Information you disclose to other organizations through or in connection with our Apps or our Social Media Pages.

YOUR CHOICES

If you no longer want to receive marketing related emails from us on a going-forward basis, you may opt out by using the unsubscribe link provided at the bottom of each such email.  If you opt out, we may still send you important administrative messages, from which you cannot opt out.

If you prefer that we discontinue sharing your Personal Information on a going-forward basis with third parties for their direct marketing purposes, you may opt out of the sharing by contacting us at info@globalassetonline.com.

You can update your Personal Information by contacting customer service at info@globalassetonline.com.

For California, Colorado, Connecticut, Utah, and Virginia residents:  Please see “Additional Information for Residents of California, Colorado, Connecticut, Utah, and Virginia,” below, for additional information about your rights.

For Nevada residents:  To opt out of the sale of your Personal Information, if applicable, please email us at info@globalassetonline.com.

use of THE Services by MINORS

The Services are not directed to individuals under the age of thirteen (13), and we do not knowingly collect Personal Information from such individuals.

Jurisdiction and CROSS-BORDER TRANSFER

We are located in the United States.  We may store and process your Personal Information in any country where we have facilities or in which we engage service providers.  By using the Services, you understand that your information will be transferred to countries outside of your country of residence, including the United States, which may have data protection rules that are different from those of your country. 

SENSITIVE INFORMATION

Unless we request it, we ask that you not send us, and you not disclose, any sensitive Personal Information (e.g., Social Security numbers, information related to racial or ethnic origin, political opinions, religion or other beliefs, health, biometrics or genetic characteristics, or criminal background) on or through the Services or otherwise to us.

THIRD-PARTY PAYMENT SERVICE

The Services may provide functionality allowing you to make payments using a third-party payment service with which you have created your own account.  When you use such a service to make a payment to us, your Personal Information will be collected by such third party and not by us and will be subject to the third party’s privacy policy, rather than this Privacy Policy.  We have no control over, and are not responsible for, any such third party’s collection, use, or disclosure of your Personal Information.

UPDATES TO THIS PRIVACY POLICY

The “UPDATED” or “Last Updated” legend at the top of this Privacy Policy indicates when this Privacy Policy was last revised.  Any changes will become effective when we post the revised Privacy Policy on the Services. 

CONTACT US

If you have any questions about this Privacy Policy, please contact us at info@globalassetonline.com or at

Technology Assets, LLC

Attention: CFO

1815 Monetary Ln Ste 100

Carrollton, TX 75006

Telephone: (972) 695-8600

Because email communications are not always secure, please do not include credit card or other sensitive information in your emails to us.

ADDITIONAL INFORMATION FOR RESIDENTS OF CALIFORNIA, COLORADO, CONNECTICUT, UTAH, AND VIRGINIA

This section supplements the above Privacy Policy and provides additional details regarding our collection, use, and disclosure of Personal Information relating to residents of California, Colorado, Connecticut, Utah, and Virginia.

Collection, Disclosure, Sale, Sharing, and Processing of Personal Information

The following chart details which categories of Personal Information we collect, process, and disclose, including for purposes of targeted advertising. 

Categories of Personal InformationDisclosed to Which Categories of Third Parties for Operational Business PurposesSold to Which Categories of Third PartiesShared with Which Categories of Third Parties for Cross-Context Behavioral or Targeted AdvertisingProcessing Purposes (see “Use of Personal Information” above for a detailed description of each Processing Purpose)
Identifiers, such as name, contact information, online identifiers, and account credentials  Our service providersNone  Ad networks and social media platforms• Providing the functionality of our Services and fulfilling your requests • Providing you with our marketing materials and facilitating social sharing • Analyzing Personal Information for business reporting and providing personalized services • Aggregating and/or anonymizing Personal Information • Accomplishing our business purposes
Personal information as defined in the California customer records law, such as name, contact information, and payment information  Our service providersNoneAd networks and social media platforms• Providing the functionality of our Services and fulfilling your requests • Providing you with our marketing materials and facilitating social sharing • Analyzing Personal Information for business reporting and providing personalized services • Aggregating and/or anonymizing Personal Information • Accomplishing our business purposes
Commercial information, such as transaction information and purchase historyOur service providersNoneAd networks and social media platforms• Providing the functionality of our Services and fulfilling your requests • Providing you with our marketing materials and facilitating social sharing • Analyzing Personal Information for business reporting and providing personalized services • Aggregating and/or anonymizing Personal Information • Accomplishing our business purposes
Internet or network activity information, such as browsing history and interactions with our websiteOur service providersNoneAd networks and social media platforms• Providing the functionality of our Services and fulfilling your requests • Providing you with our marketing materials and facilitating social sharing • Analyzing Personal Information for business reporting and providing personalized services • Aggregating and/or anonymizing Personal Information • Accomplishing our business purposes
Inferences drawn from any of the Personal Information listed above to create a profile or summary about, for example, an individual’s preferences and characteristicsOur service providersNoneAd networks and social media platforms• Providing the functionality of our Services and fulfilling your requests • Providing you with our marketing materials and facilitating social sharing • Analyzing Personal Information for business reporting and providing personalized services • Aggregating and/or anonymizing Personal Information • Accomplishing our business purposes

Individual Rights and Requests

Subject to applicable law, you may make the following requests:

  1. You may request to know whether we process your Personal Information and to access such Personal Information.
    • a. If you are a California resident, you may request the following information:
      • i. The categories of Personal Information we collected about you and the categories of sources from which we collected such Personal Information;
      • ii. The business or commercial purpose for collecting, selling, or sharing Personal Information about you;
      • iii. The categories of Personal Information about you that we sold or shared and the categories of third parties to whom we sold or shared such Personal Information; and
      • iv. The categories of Personal Information about you that we otherwise disclosed and the categories of third parties to whom we disclosed such Personal Information.
  2. The categories of Personal Information about you that we otherwise disclosed and the categories of third parties to whom we disclosed such Personal Information.
  3. You may request to correct inaccuracies in your Personal Information.
  4. You may request to have your Personal Information deleted.
  5. You may request to receive a copy of your Personal Information, including, where applicable, in a portable format.
  6. You may request to opt out of the “sale” of your Personal Information.
  7. You may request to opt out of targeted advertising, including the “sharing” of your Personal Information for purposes of cross-context behavioral advertising.

We will not unlawfully discriminate against you for exercising your rights under applicable privacy law.  To make a privacy request, please contact us at info@globalassetonline.com stating your specific request. We will verify and respond to your request consistent with applicable law, taking into account the type and sensitivity of the Personal Information subject to the request.  We may need to request additional Personal Information from you, such as name, email address, or phone number, in order to verify your identity and protect against fraudulent requests.  If you make a request to delete, we may ask you to confirm your request before we delete your Personal Information.

To request to opt out of any future “sales” of your Personal Information and/or “sharing” of your Personal Information for purposes of cross-context behavioral advertising or any future processing for purposes of targeted advertising, please contact us at info@globalassetonline.com.

Appeal Process

If you are a resident of Colorado, Connecticut, or Virginia and we refuse to take action on your request, you may appeal our refusal within a reasonable period after you have received notice of the refusal.  You may file an appeal by contacting us at info@globalassetonline.com.

Authorized Agents

If an agent would like to make a request on your behalf as permitted under applicable law, they may use the submission methods outlined above.  As part of our verification process, we may request that the agent provide proof concerning their status as an authorized agent.  In addition, we may require that you verify your identity as described above or confirm that you provided the agent permission to submit the request.

De-Identified Information

If we maintain or use de-identified information, we will continue to maintain and use it only in a de-identified fashion and will not attempt to re-identify the information.

Global Asset LLC Cookie Policy

This cookie policy ("Cookie Policy") describes the use of Cookies (as defined below) by Technology Assets, LLC (“Global Asset," "we," "us," or "our," if not explicitly referring to one company”), on its website located at globalassetonline.com) (“Sites”).

Please remember that your use of the Sites is at all times subject to the Website Terms and Conditions and Privacy Policies located at each respective website. Any terms we use in this Cookie Policy without defining them have the definitions given to them in the Website Terms and Conditions and the Global Asset Privacy Policy.

HOW GLOBAL ASSET USES COOKIES

The Sites use cookies and similar technologies such as pixel tags, web beacons, clear GIFs, JavaScript, and local storage. Cookies are small files -- usually consisting of letters and numbers -- placed on Your Device, when you use that device to visit a Site. We will refer to cookies and similar technologies simply as "Cookies" for the remainder of this Cookie Policy. We use Cookies to enable our servers to recognize your web browser and tell us how and when you visit and otherwise use the Sites through the internet, to analyze trends, and to learn about our user base.

We may combine non-personally identifiable information collected through Cookies with other Personal Information that we have about you, for example, to tell us who you are or whether you have an account. We may also supplement the information we collect from you with information received from third parties in order to enhance our Sites, or to offer you information that we believe may be of interest to you. Where we use Cookies to collect information that is personally identifiable, or that can become personally identifiable if we combine it with other information, the applicable Privacy Policy will apply in addition to this Cookie Policy.

You can control and/or delete Cookies as you wish -- for details, see www.aboutcookies.org. Most browsers have an option for turning off the Cookie feature, which will prevent your browser from accepting new Cookies, as well as (depending on the sophistication of your browser software) allowing you to decide on acceptance of each new cookie in a variety of ways. You can delete all Cookies that are already on your computer and you can set most browsers to prevent them from being placed. If you do this, however, you may have to manually adjust some preferences every time you visit a site and some services and functionalities may not work. We strongly recommend that you leave Cookies active, because they enable you to take advantage of the most attractive features of the Sites.

Please reference the chart and general description below to learn more about the kinds of cookies we use and for what purpose.

SHARING OF INFORMATION

Essential Cookies are Cookies that are required to provide you with features or services that you have requested. For example, Cookies that enable you to log into secure areas of our Site or use a shopping cart. Disabling these Cookies will encumber the Sites' performance and may make certain features and services unavailable.

Functionality Cookies are used to recognize you when you return to our Sites. This enables us to personalize our content for you, greet you by name, and remember your preferences (for example, your choice of language or region).

Analytical Cookies allow us to understand how visitors use our Site. This includes information about the number of visitors to the site, what pages visitors view on our site and how long visitors are viewing pages on the site. Analytical Cookies also help us measure the performance of our advertising campaigns in order to help us improve our advertising campaigns and to optimize our Sites' content for those who engage with our advertising.

Third Party Cookies are Cookies placed by a third party on Your Device and may provide information to those third parties about browsing habits (including your visits to our Sites, the pages you have visited, and the links and advertisements you have clicked) that may help identify if certain services that such third parties provide are being used, identify your interests, retarget you, and serve advertisements that are relevant to you. We do not have control or access to such Cookies. If you look at one page on our Sites, an advertisement may be delivered to you on our Services or on other sites, for products referenced on that page or for similar products and services. We do not engage in retargeted advertising for children users of our Sites.

Session Cookies and Persistent Cookies

The types of Cookies described above may be "Session Cookies" which are temporary Cookies that are only stored on Your Device while you are visiting our site or "Persistent Cookies" which are Cookies that are stored on Your Device for a period of time after you leave our site. The length of time a Persistent Cookie stays on your Device varies from Cookie to Cookie. We use Persistent Cookies to store your preferences so that they are available for the next visit, and to keep a more accurate account of how often you visit our Sites, how often you return, how your use of the Sites may vary over time, and measure the effectiveness of advertising efforts. Your browser may offer you a "Do Not Track" option, which allows you to signal to operators of websites and web applications and services (including behavioral advertising services) that you do not wish such operators to track certain of your online activities over time and across different websites. Our Sites do not support Do Not Track requests at this time.

WHAT IS GOOGLE ANALYTICS AND HOW IS IT USED?

Our Sites use Google Analytics, a web analysis service provided by Google Inc. ("Google") which is based on Cookie technology. The information generated by the Cookie is usually sent to a Google server in the USA, where it is stored. On behalf of Global Asset, Google will use the generated information to evaluate your use of the website, to compile reports on website activities, and to provide the website operator with additional services connected with website and Internet use. The IP address transmitted by your browser in connection with Google Analytics is not collated with other data by Google. To opt out of being tracked by Google Analytics across all websites visit http://tools.google.com/dlpage/gaoptout.

MANAGING COOKIE SETTINGS

You can decide whether or not to accept Cookies. One way you can do this is through your internet browser's settings. To find out more information about Cookies, including information about how to manage and delete Cookies, please visit: www.aboutcookies.com .

To explore what Cookie setting are available to you, look in the "preferences" or "options" section of your browser's menu.

If you have any queries regarding this Cookie Policy please contact us at info@globalassetonline.com.

" ["post_title"]=> string(14) "Privacy Policy" ["post_excerpt"]=> string(0) "" ["post_status"]=> string(7) "publish" ["comment_status"]=> string(6) "closed" ["ping_status"]=> string(4) "open" ["post_password"]=> string(0) "" ["post_name"]=> string(14) "privacy-policy" ["to_ping"]=> string(0) "" ["pinged"]=> string(0) "" ["post_modified"]=> string(19) "2024-04-25 07:56:03" ["post_modified_gmt"]=> string(19) "2024-04-25 12:56:03" ["post_content_filtered"]=> string(0) "" ["post_parent"]=> int(0) ["guid"]=> string(40) "https://globalassetonline.com/?page_id=3" ["menu_order"]=> int(0) ["post_type"]=> string(4) "page" ["post_mime_type"]=> string(0) "" ["comment_count"]=> string(1) "0" ["filter"]=> string(3) "raw" } ["links"]=> array(3) { [0]=> array(1) { ["link"]=> array(3) { ["title"]=> string(7) "Call Us" ["url"]=> string(14) "tel:9726958600" ["target"]=> string(6) "_blank" } } [1]=> array(1) { ["link"]=> array(3) { ["title"]=> string(8) "Email Us" ["url"]=> string(34) "mailto:sales@globalassetonline.com" ["target"]=> string(0) "" } } [2]=> array(1) { ["link"]=> array(3) { ["title"]=> string(8) "Linkedin" ["url"]=> string(50) "https://www.linkedin.com/company/global-asset-llc/" ["target"]=> string(6) "_blank" } } } ["logo"]=> array(24) { ["ID"]=> int(264) ["id"]=> int(264) ["title"]=> string(4) "logo" ["filename"]=> string(8) "logo.png" ["filesize"]=> int(4552) ["url"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["link"]=> string(35) "https://globalassetonline.com/logo/" ["alt"]=> string(0) "" ["author"]=> string(1) "1" ["description"]=> string(0) "" ["caption"]=> string(0) "" ["name"]=> string(4) "logo" ["status"]=> string(7) "inherit" ["uploaded_to"]=> int(0) ["date"]=> string(19) "2024-01-16 15:47:20" ["modified"]=> string(19) "2024-01-16 15:47:20" ["menu_order"]=> int(0) ["mime_type"]=> string(9) "image/png" ["type"]=> string(5) "image" ["subtype"]=> string(3) "png" ["icon"]=> string(66) "https://globalassetonline.com/wp-includes/images/media/default.png" ["width"]=> int(170) ["height"]=> int(24) ["sizes"]=> array(30) { ["thumbnail"]=> string(72) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-150x24.png" ["thumbnail-width"]=> int(150) ["thumbnail-height"]=> int(24) ["medium"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["medium-width"]=> int(170) ["medium-height"]=> int(24) ["medium_large"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["medium_large-width"]=> int(170) ["medium_large-height"]=> int(24) ["large"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["large-width"]=> int(170) ["large-height"]=> int(24) ["1536x1536"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["1536x1536-width"]=> int(170) ["1536x1536-height"]=> int(24) ["2048x2048"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["2048x2048-width"]=> int(170) ["2048x2048-height"]=> int(24) ["page-masthead"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["page-masthead-width"]=> int(170) ["page-masthead-height"]=> int(24) ["listing-img"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["listing-img-width"]=> int(170) ["listing-img-height"]=> int(24) ["featured-listing-img"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["featured-listing-img-width"]=> int(170) ["featured-listing-img-height"]=> int(24) ["team-listing"]=> string(65) "https://globalassetonline.com/wp-content/uploads/2024/01/logo.png" ["team-listing-width"]=> int(170) ["team-listing-height"]=> int(24) } } ["logo_dark"]=> array(24) { ["ID"]=> int(262) ["id"]=> int(262) ["title"]=> string(10) "logo-black" ["filename"]=> string(14) "logo-black.png" ["filesize"]=> int(5821) ["url"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["link"]=> string(41) "https://globalassetonline.com/logo-black/" ["alt"]=> string(0) "" ["author"]=> string(1) "1" ["description"]=> string(0) "" ["caption"]=> string(0) "" ["name"]=> string(10) "logo-black" ["status"]=> string(7) "inherit" ["uploaded_to"]=> int(0) ["date"]=> string(19) "2024-01-16 15:46:19" ["modified"]=> string(19) "2024-01-16 15:46:19" ["menu_order"]=> int(0) ["mime_type"]=> string(9) "image/png" ["type"]=> string(5) "image" ["subtype"]=> string(3) "png" ["icon"]=> string(66) "https://globalassetonline.com/wp-includes/images/media/default.png" ["width"]=> int(170) ["height"]=> int(24) ["sizes"]=> array(30) { ["thumbnail"]=> string(78) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black-150x24.png" ["thumbnail-width"]=> int(150) ["thumbnail-height"]=> int(24) ["medium"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["medium-width"]=> int(170) ["medium-height"]=> int(24) ["medium_large"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["medium_large-width"]=> int(170) ["medium_large-height"]=> int(24) ["large"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["large-width"]=> int(170) ["large-height"]=> int(24) ["1536x1536"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["1536x1536-width"]=> int(170) ["1536x1536-height"]=> int(24) ["2048x2048"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["2048x2048-width"]=> int(170) ["2048x2048-height"]=> int(24) ["page-masthead"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["page-masthead-width"]=> int(170) ["page-masthead-height"]=> int(24) ["listing-img"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["listing-img-width"]=> int(170) ["listing-img-height"]=> int(24) ["featured-listing-img"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["featured-listing-img-width"]=> int(170) ["featured-listing-img-height"]=> int(24) ["team-listing"]=> string(71) "https://globalassetonline.com/wp-content/uploads/2024/01/logo-black.png" ["team-listing-width"]=> int(170) ["team-listing-height"]=> int(24) } } ["text"]=> string(76) "Take the first step to realizing a custom IT solution for your organization." ["title"]=> string(25) "Let's get
started" }
Secure Data Destruction: Protecting Your Organization from Data Breaches Scroll down arrow
Global Asset

Secure Data Destruction: Protecting Your Organization from Data Breaches

Data breaches cost organizations an average of $4.45 million per incident, making secure data destruction a critical component of comprehensive cybersecurity strategies. Every retired hard drive, decommissioned server, and obsolete mobile device represents a potential security vulnerability that could expose sensitive corporate information, customer data, and intellectual property to unauthorized access.

Implementing robust data destruction services ensures that confidential information remains protected throughout the entire asset lifecycle. Understanding the fundamentals of secure data destruction enables organizations to make informed decisions that protect their reputation, maintain regulatory compliance, and minimize the risk of costly data breaches.

Understanding Secure Data Destruction

What Is Secure Data Destruction?

Secure data destruction refers to the process of permanently eliminating data from storage devices to prevent unauthorized recovery using any available methods or technologies. Unlike simple file deletion or basic formatting, which only removes file references while leaving actual data intact, secure data destruction ensures that information cannot be retrieved through advanced recovery techniques or forensic analysis.

The importance of proper data destruction extends beyond obvious storage devices like hard drives and solid-state drives. Modern organization equipment including copiers, printers, network devices, and mobile phones often contain internal storage that caches sensitive information during normal operations.

Why Standard Deletion Methods Are Insufficient

Traditional file deletion and formatting operations create a false sense of security by making data appear inaccessible through normal operating system functions. However, sophisticated data recovery tools can easily retrieve this information because the underlying data remains physically present on storage media until overwritten by new information.

Professional data destruction services address this vulnerability by implementing proven methodologies that ensure complete data elimination. These services follow established industry standards and provide documented verification of the destruction process, creating an auditable trail that demonstrates due diligence in data protection.

Critical Business Implications

Regulatory Compliance Requirements

Multiple regulatory frameworks mandate specific data destruction practices for organizations handling sensitive information. Healthcare organizations must comply with HIPAA requirements for protecting patient information, while financial institutions face stringent regulations under SOX and other financial privacy laws. Educational institutions managing student records must address FERPA requirements throughout the data lifecycle.

Non-compliance with data destruction requirements can result in significant financial penalties, legal liability, and regulatory sanctions. Recent enforcement actions have demonstrated that regulators take data protection seriously, with organizations facing substantial fines for inadequate data destruction practices.

Business Risk Assessment

The risks associated with improper data destruction extend far beyond regulatory compliance. Data breaches resulting from inadequate destruction practices can damage customer relationships, erode competitive advantages, and create long-term reputational challenges that impact business performance for years after the initial incident.

Organizations implementing comprehensive data destruction programs demonstrate proactive risk management that protects stakeholder interests while supporting broader cybersecurity objectives. This approach creates measurable value by reducing exposure to data breach costs, regulatory penalties, and operational disruptions.

Data Destruction Methods and Standards

Global Asset: Secure Data Destruction: Protecting Your Business from Data Breaches

NIST 800-88 Guidelines

The National Institute of Standards and Technology (NIST) Special Publication 800-88 provides the definitive framework for media sanitization and serves as the industry standard for secure data destruction. This framework defines three primary sanitization methods: Clear, Purge, and Destroy.

Clear Methods Clear sanitization involves logical techniques that remove data from user-addressable storage locations while maintaining the functionality of the storage device. These methods include cryptographic erase functions and logical overwriting techniques that meet security requirements for many business applications.

Purge Methods Purge sanitization employs physical or logical techniques that make data recovery infeasible using state-of-the-art laboratory techniques and equipment. These methods include degaussing for magnetic media and secure erase commands for solid-state devices.

Destroy Methods Destroy sanitization renders both the data and storage device unusable through physical destruction techniques including shredding, crushing, and incineration. This method provides the highest level of security assurance but eliminates any possibility of device reuse.

Industry-Specific Considerations

Different industries face varying data sensitivity requirements that influence appropriate destruction methods. Healthcare organizations handling protected health information typically require purge or destroy methods to ensure HIPAA compliance. Financial institutions managing customer financial data often implement destroy methods for devices containing highly sensitive information.

Technology companies protecting intellectual property and trade secrets frequently employ destroy methods for research and development equipment, while general business applications may accept clear methods for devices containing less sensitive operational data.

Why Professional Data Destruction Services Are Essential

Professional Service Advantages

Certified data destruction providers offer specialized expertise, equipment, and processes that ensure complete data elimination while maintaining documented compliance with industry standards. Data destruction services provide detailed certificates of destruction that serve as legal evidence of proper data handling practices.

Professional services also address the logistical challenges of data destruction by providing secure transportation, chain of custody documentation, and on-site destruction options that minimize security risks during the disposal process.

Certification Standards to Evaluate

R2 (Responsible Recycling) Certification R2 certification demonstrates adherence to comprehensive environmental and data security standards through regular third-party audits. Certified providers must maintain documented processes for data destruction, employee background checks, and facility security measures.

NAID AAA Certification The National Association for Information Destruction (NAID) AAA certification specifically focuses on data destruction services and requires annual compliance audits covering operational security, employee screening, and destruction process verification.

ISO 27001 Information Security Management ISO 27001 certification indicates systematic information security management practices that support secure data handling throughout the destruction process.

Chain of Custody and Documentation

Professional data destruction services maintain detailed chain of custody documentation from device pickup through final destruction. This documentation includes asset identification, transportation records, destruction methodology, and completion certification.

Comprehensive reporting provides the audit trail necessary for regulatory compliance while demonstrating due diligence in data protection practices. Many services also offer real-time tracking and photographic documentation of destruction processes for enhanced security assurance.

Planning Your Data Destruction Strategy

Risk Assessment and Device Prioritization

Successful data destruction programs start with comprehensive risk assessments that identify devices containing sensitive information and prioritize destruction activities based on data classification levels. This approach ensures that highest-risk devices receive appropriate attention while optimizing resource allocation.

Device prioritization should consider factors including data sensitivity, storage capacity, device age, and regulatory requirements. Organizations often discover that seemingly innocuous devices like printers and copiers contain significant amounts of cached sensitive information.

Service Model Selection

Organizations can choose between on-site destruction services that eliminate transportation risks and off-site destruction facilities that offer specialized equipment and cost efficiencies. The optimal approach depends on security requirements, volume considerations, and operational constraints.

On-site destruction provides maximum security control but may be cost-prohibitive for smaller volumes. Off-site destruction offers economies of scale while requiring robust chain of custody protocols to maintain security during transportation.

Integration with IT Asset Management

Data destruction activities should integrate seamlessly with broader IT asset management processes to ensure consistent handling throughout technology lifecycles. This integration includes coordinating with procurement, inventory management, and disposal scheduling systems.

Effective integration prevents devices from being overlooked during refresh cycles while ensuring that destruction activities align with business operational requirements and minimize disruption to ongoing operations.

Common Data Destruction Challenges and Solutions

Addressing Complex Device Types

Modern business environments contain increasingly diverse storage technologies that present unique destruction challenges. Network-attached storage systems, cloud-connected devices, and IoT equipment often require specialized handling procedures to ensure complete data elimination.

Organizations must develop protocols for handling devices with embedded storage, encrypted drives, and proprietary systems that may not respond to standard destruction methods. Working with experienced providers helps navigate these complexities while maintaining security standards.

Managing Multi-Location Operations

Companies with distributed operations face logistical challenges in coordinating secure data destruction across multiple facilities. Establishing consistent procedures, training local personnel, and maintaining centralized oversight ensures uniform security standards regardless of location.

Effective multi-site programs require standardized asset identification, secure transportation protocols, and consolidated reporting systems that provide visibility into destruction activities across all business locations.

Cost-Benefit Analysis of Data Destruction Programs

Direct Cost Considerations

Data destruction program costs include service fees, transportation expenses, and internal administrative overhead. However, these costs must be evaluated against the potential financial impact of data breaches, regulatory penalties, and operational disruptions resulting from inadequate data protection.

Most organizations find that professional data destruction services cost significantly less than the average cost of a single data breach incident, making these programs highly cost-effective risk mitigation investments.

Hidden Value Creation

Beyond direct security benefits, comprehensive data destruction programs often reveal opportunities for process optimization, asset management improvements, and vendor consolidation that create additional business value.

Many organizations discover that structured destruction programs help identify inefficient technology refresh cycles, redundant equipment purchases, and opportunities for better inventory management throughout the technology lifecycle.

Building Comprehensive Data Protection

Secure data destruction represents a fundamental component of effective data protection strategies that safeguard business interests while ensuring regulatory compliance. By implementing professional data destruction services and following established industry standards, organizations can confidently manage technology disposal while protecting sensitive information from unauthorized access.

Professional data destruction services provide measurable returns through reduced security risks, regulatory compliance assurance, and enhanced stakeholder confidence in data protection practices.

Ready to secure your sensitive data? 

Contact Global Asset to discover how our certified data destruction services provide complete protection and regulatory compliance for your business-critical information.