TechR2 Awarded Patent For Track-Contain-Destroy Onsite Media Security And Data Eradication Process
COLUMBUS, OHIO,: TechR2, LLC, the company behind Tear-A-Byte® onsite media security and data eradication process, announced today that it recently has been awarded U.S. Patent 9,430,654 for TechR2’s Track-Contain-Destroy process for securing media and eradicating data on storage devices and other units within the 4 walls of an organization when such units have failed or have been decommissioned.
This patent recognizes the unique process that TechR2 has developed to protect fully its business partners from data breaches that can easily result from mismanaged data-bearing devices. More specifically, the Tear-A-Byte® solution begins with the implementation of an intricate RFID system that tags each device and communicates with TechR2’s proprietary software to “track” the device’s every move via the TechR2 client-access web portal. No device (or data contained on the device) can leave the client’s facility without real-time, immediate alert. The Tear-A-Byte® appliance is then utilized securely to house and “contain” all applicable devices, along with the data on each device. Once the Tear-A-Byte® appliance fills to capacity, TechR2 dispatches its certified engineers to reconcile the block of devices with the data contained on each, after which the data is completely and irretrievably eradicated – that is, “destroyed” – utilizing NSA certified degaussers. Then and only then, are the resulting “technology corpses” removed from the client’s facility and disposed of in a manner consistent with all EPA and R2 standards in accordance with TechR2’s Zero Landfill Policy. TechR2 then issues a Certificate of Destruction that actually means something.
As Charles Robbins, TechR2’s Director of Research and Development, describes it, “There are other companies that provide bits and pieces of what we do, but nobody in the industry offers the A to Z, full compliance process of TechR2’s Tear-A-Byte® process.”
Along with its patent, TechR2 has earned and currently maintains multiple global ISO and industry certifications, including ISO27001, ISO14001, ISO9001, OHSAS18001 and R2. Tear-A-Byte® is fully compliant with all standards which encompass many underlying industry specifications, such as those regulating health care, banking and data center organizations. TechR2’s Tear-A-Byte® process is not limited to any one particular industry but adequately serves them all.
“By adopting a completely transparent process of data eradication on-site within the 4-walls of the organization, TechR2 ensures – and guarantees – compliance with all industry regulations,” says Sepp Rajaie, TechR2’s President and the man with the Tear-A-Byte® vision. “We are proud to say that TechR2 has been able to eliminate completely all client risk in connection with data under our control; we have yet to permit a single data breach and we are committed to keeping it that way,” exclaims Rajaie.
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power