TechR2 Awarded Patent For Track-Contain-Destroy Onsite Media Security And Data Eradication Process
COLUMBUS, OHIO,: TechR2, LLC, the company behind Tear-A-Byte® onsite media security and data eradication process, announced today that it recently has been awarded U.S. Patent 9,430,654 for TechR2’s Track-Contain-Destroy process for securing media and eradicating data on storage devices and other units within the 4 walls of an organization when such units have failed or have been decommissioned.
This patent recognizes the unique process that TechR2 has developed to protect fully its business partners from data breaches that can easily result from mismanaged data-bearing devices. More specifically, the Tear-A-Byte® solution begins with the implementation of an intricate RFID system that tags each device and communicates with TechR2’s proprietary software to “track” the device’s every move via the TechR2 client-access web portal. No device (or data contained on the device) can leave the client’s facility without real-time, immediate alert. The Tear-A-Byte® appliance is then utilized securely to house and “contain” all applicable devices, along with the data on each device. Once the Tear-A-Byte® appliance fills to capacity, TechR2 dispatches its certified engineers to reconcile the block of devices with the data contained on each, after which the data is completely and irretrievably eradicated – that is, “destroyed” – utilizing NSA certified degaussers. Then and only then, are the resulting “technology corpses” removed from the client’s facility and disposed of in a manner consistent with all EPA and R2 standards in accordance with TechR2’s Zero Landfill Policy. TechR2 then issues a Certificate of Destruction that actually means something.
As Charles Robbins, TechR2’s Director of Research and Development, describes it, “There are other companies that provide bits and pieces of what we do, but nobody in the industry offers the A to Z, full compliance process of TechR2’s Tear-A-Byte® process.”
Along with its patent, TechR2 has earned and currently maintains multiple global ISO and industry certifications, including ISO27001, ISO14001, ISO9001, OHSAS18001 and R2. Tear-A-Byte® is fully compliant with all standards which encompass many underlying industry specifications, such as those regulating health care, banking and data center organizations. TechR2’s Tear-A-Byte® process is not limited to any one particular industry but adequately serves them all.
“By adopting a completely transparent process of data eradication on-site within the 4-walls of the organization, TechR2 ensures – and guarantees – compliance with all industry regulations,” says Sepp Rajaie, TechR2’s President and the man with the Tear-A-Byte® vision. “We are proud to say that TechR2 has been able to eliminate completely all client risk in connection with data under our control; we have yet to permit a single data breach and we are committed to keeping it that way,” exclaims Rajaie.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....