Skip to main content

Protecting Data Security

Security is the number one concern for our clients, and we protect their interests with our NAID certified security programs.

Data Security means more than protecting key information, it’s about protecting a client’s reputation. Cascade’s Safe & Sound process further promotes our clients’ trust by minimizing data security risks.

Learn more about data security risks impacting our industry and what you can do to protect yourself.

Cascade uses a layered approach to protecting our clients' security.


Cascade employees (not subcontractors) can remove equipment from your site and prepare it for transport to our facilities. Before becoming part of our well-trained and specialized staff, each candidate must pass a criminal background check and drug testing. Our employees provide more than 250 years of combined industry experience, and are directly accountable to you.


Cascade utilizes the best available independently certified wiping technology to thoroughly overwrite your data on reusable hard drives. Physical shredding is performed at Cascade’s sites for all media and for items requiring absolute destruction.


Cascade’s proven methods for secure data destruction are certified by the National Association for Information Destruction. Our Errors & Omissions Insurance provides additional peace of mind, as does our record of zero data compromises. Our procedures for destroying customer data extends to dozens of different products - See How


Our state-of-the-art facilities are equipped with proactive intrusion detection systems, complete with 24/7 streaming video surveillance and rigorous internal barriers. All inventory is held within our secure walls with a verifiable chain of custody from the customer to final destruction.


Resources for You

Institutions need to also take control of data security on their IT assets. Significant investments are typically made to protect data storage devices while on the network, using malware protection programs and firewalls. But as soon as assets are removed from this secure environment and left loose in hallways and storerooms, data theft is more likely.


Over the years, Cascade has conducted research and put together tools to help institutions manage their data security through disposition. Please use these tools to assist your own firm and let us know if we can provide more assistance.

  1. Best practices in protecting security during IT asset disposition
  2. White Paper: Closing the Back Door, Managing Data Security During Disposition
  3. Data Security Regulations - a brief overview
  4. IT Asset Disposition Trends and Best Practices - 2015
  5. Toolkit: Sample IT Asset Control and Disposal Policy
  6. Toolkit: HIPAA/HITECH Business Associate Agreement Template
  7. Sample IT Asset Retirement Request for Proposal Toolkit (with Data Security Requirements)