TechR2 Awarded Patent For Track-Contain-Destroy Onsite Media Security And Data Eradication Process
COLUMBUS, OHIO,: TechR2, LLC, the company behind Tear-A-Byte® onsite media security and data eradication process, announced today that it recently has been awarded U.S. Patent 9,430,654 for TechR2’s Track-Contain-Destroy process for securing media and eradicating data on storage devices and other units within the 4 walls of an organization when such units have failed or have been decommissioned.
This patent recognizes the unique process that TechR2 has developed to protect fully its business partners from data breaches that can easily result from mismanaged data-bearing devices. More specifically, the Tear-A-Byte® solution begins with the implementation of an intricate RFID system that tags each device and communicates with TechR2’s proprietary software to “track” the device’s every move via the TechR2 client-access web portal. No device (or data contained on the device) can leave the client’s facility without real-time, immediate alert. The Tear-A-Byte® appliance is then utilized securely to house and “contain” all applicable devices, along with the data on each device. Once the Tear-A-Byte® appliance fills to capacity, TechR2 dispatches its certified engineers to reconcile the block of devices with the data contained on each, after which the data is completely and irretrievably eradicated – that is, “destroyed” – utilizing NSA certified degaussers. Then and only then, are the resulting “technology corpses” removed from the client’s facility and disposed of in a manner consistent with all EPA and R2 standards in accordance with TechR2’s Zero Landfill Policy. TechR2 then issues a Certificate of Destruction that actually means something.
As Charles Robbins, TechR2’s Director of Research and Development, describes it, “There are other companies that provide bits and pieces of what we do, but nobody in the industry offers the A to Z, full compliance process of TechR2’s Tear-A-Byte® process.”
Along with its patent, TechR2 has earned and currently maintains multiple global ISO and industry certifications, including ISO27001, ISO14001, ISO9001, OHSAS18001 and R2. Tear-A-Byte® is fully compliant with all standards which encompass many underlying industry specifications, such as those regulating health care, banking and data center organizations. TechR2’s Tear-A-Byte® process is not limited to any one particular industry but adequately serves them all.
“By adopting a completely transparent process of data eradication on-site within the 4-walls of the organization, TechR2 ensures – and guarantees – compliance with all industry regulations,” says Sepp Rajaie, TechR2’s President and the man with the Tear-A-Byte® vision. “We are proud to say that TechR2 has been able to eliminate completely all client risk in connection with data under our control; we have yet to permit a single data breach and we are committed to keeping it that way,” exclaims Rajaie.
By Tom Conophy, CIO, Staples Inc.
By Joe Touey, SVP, GSK North America Pharmaceuticals IT
By Eric Tamblyn, Global VP-Guru Managed Services, Genesys
By Charlie Isaacs, CTO, IoT, Salesforce
By Jonathan Rosenberg, VP & CTO, Collaboration, Cisco
By Dave Doyle, CIO & SVP, IT, Regal Entertainment Group
By Jeffrey Keisling, CIO and SVP, Pfizer
By Colin Boyd, VP & CIO, Joy Global Inc
By George Hines, CIO, Massage Envy
By Mark Jacobsohn, SVP, Booz Allen Hamilton
By Mike Gioja, CIO and SVP of IT, Product Management and...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By Darrell Edwards, SVP and Chief Supply Chain Officer,...
By Hannah Datz, VP Retail North America, SAP Hybris
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Robert Garrison, CIO, DTCC
By Mike Sakamoto, CTO, California Department of Health Care...
By Bradley Peterson, EVP & CIO, NASDAQ
By Steve Betts, SVP and CIO, Blue Cross and Blue Shield and...
By Kathryn Kai-ling (Ho) Frederick, EVP, Growth & Insights,...