How We Refurbish the Computers?
C2SDK understands the importance of security to our individual and corporate technology donors. Thoroughly deleting confidential data is essential and for businesses looking for ways to comply with the security requirements of legislation like the Sarbanes-Oxley Act and The Health Insurance Portability and Accountability Act of 1996, a sound policy on data control and destruction is crucial.
C2SDK receives computers systems and electronic devices from members of the community and from corporate donors. Often, many of the donated devices contain electronic data that is stored on the computer systems hard drive and electronic media. Much of this data consists of confidential and sensitive information, including student records, financial data, personnel records, and research information.
Protecting sensitive data.
STAGE 1: C2SDK uses a method of disk sanitation that involves overwriting all previously stored data with a predetermined pattern of meaningless information, such as a binary pattern, its complement, and an additional third pattern. This process is equivalent to the procedures detailed in the US Department of Defense National Industrial Security Program Operating Manual DoD 5220.22-M.
There are several commercially available software products that comply with this standard. C2SDK currently uses Darik's Boot and Nuke (DBAN), a Defense Security Service authorized software program, to sanitize all reusable hard drives. Hard drives that are not reusable are destroyed through a secure shredding process contracted with IMS Electronic Recycling. At no time do hard drives pass through C2SDK’s custody without either being sanitized or destroyed through a secure shredding process.
Upon completion of the D-BAN process all personal data as well as the Windows operating system and everything else on the hard drive is erased.
STAGE 2: As a Microsoft Registered Refurbisher, the next stage of the computer refurbishment process is to load a new Windows Professional operating system, Microsoft Office Suites, Microsoft Security Essential anti-virus software and various other useful software programs. Microsoft Certificates of Authenticity labels are then attached to each computer.
STAGE 3: The final stage involves checking the various components, such as memory chips, CD Rom drive, sound and video to make sure everything is in proper working order.
Continuous donations and pledges of other technology as it becomes available from our partners is the fundamental corner stone of our program. In an effort to obtain a steady and large supply of working, refurbished computers, we are constantly seeking new partnerships with corporations within our community to help achieve our growth goals.
Donate your computer or electronics and make the world a better place!