Jump to main content
NY.gov Portal State Agency Listing
DOS, Consumer Protection logo DOS Home | About Us | Contact Us | Site Index | En Español | FOIL
Andrew M. Cuomo - Governor          
Consumer Topics A-Z Accessibility Disclaimer Privacy Policy
Reducing the Risk of Identity Theft in the Disposal of Computers and Digital Copiers (May 2010)

Would you leave a readable copy of your tax return in your trash can? Would you discard business records that prominently display your customers’ or fellow employees’ Social Security numbers (SSNs), credit card information or other sensitive personal details in your company’s dumpster? Of course not, you say. You would shred all of the above so that any personally identifying information was indecipherable. But what about the disposal of computers and digital copiers1 which may contain the same information? You cannot say with certainty what types of information may be contained on the hard drive of a computer or on a digital copier which stores all the documents you print.2 It is safe to assume, however, that there is at least some personally identifying information (PII) on that hard drive. Thus, the hard drive must be erased or destroyed when disposing of the computer or copier. If you fail to do so, you may be increasing the risk of identity theft for anyone whose PII is on the drive. If you run a for-profit business, you may also be violating New York State law.

Understand the Risks

As seen in the examples below, improper hardware disposal is a widespread problem triggering the risk of identity theft and other personal and business concerns:

Consumers who fail to properly dispose of their own personal computers may increase their own risk of identity theft. Businesses that fail to properly dispose of their computers and digital copiers risk not only the identities of their customers and employees but also expose themselves to negative public attention, the loss of goodwill and trust and possible legal liability. While consumers are not liable under New York law, for-profit businesses are. Therefore, it is critical that businesses also know and understand the relevant legal requirements.

Know the New York State Law

In New York State, the disposal of records containing PII is governed by General Business Law 399-h (GBL 399-h). 7 Only for-profit businesses are required to comply with this law. Under GBL 399-h, PII may include a Social Security number, a driver’s license or non-driver ID card number, a mother’s maiden name or a wide range of financial services account numbers or other “personal identification numbers” (PINs). A PIN means any number or code which may be used alone or in conjunction with any other information to assume the identity of another person or to access the financial resources of another person.

When your business disposes of records (paper and digital) containing PII you must:

A violation of this statute may result in a fine of up to $5,000 as well as an injunction against any continuing violations.

Take Action

The next time you are preparing to discard an old computer or digital photocopier, you should first consider your options for mitigating the risk of identity theft represented by any PII, which may still reside on the hard drive:

1.       Erase

Before you discard or donate your hardware, you can erase all data including PII from the hard drive of your computer or digital printer with overwrite software. These are utility programs that use a special application to write patterns of meaningless data onto the hard drive. These programs, priced at about $50 for individual licenses and $500-2000 for professional licenses, offer reasonable assurance that the erased data, including PII, will not be recoverable. Also, overwrite software does not destroy the hard drive so it may be reused.

2.       Destroy

The most effective method for the average person to ensure that all hard drive data including PII is safe is to physically destroy the drive. You should wear protective gear if you plan on destroying the hard drive on your own and wrap the hard drive in a towel so the parts don't fly off and do damage. Whether its smashing the hard drive with a sledgehammer, drilling holes into the drive, tearing the drive apart and destroying the platters, the drive will be destroyed but the PII will be safe.

3.       Recycle

If your computer is more than five years old or is no longer in working condition, you may want to recycle it. Before recycling, you must securely erase all data including PII on the hard drive. See Step 1 above for details. Next, you will want to learn about recycling events and centers in your area. For further details in New York City, please visit the official website of the City of New York for recycling issues at http://www.nyc.gov/html/nycwasteless/html/recycling/electronicsrecycling.shtml. For all other areas, visit the New York State Department of Environmental Conservation at http://www.dec.ny.gov.

Consumers and businesses store a staggering amount of PII on hard drives in computers and digital copiers. Because this information is not visible, it is often a surprise to the hardware owner to learn what and how much PII is actually accessible. Even with the periodic deletion of files and purging of active databases, this information and the risk of identity theft it represents are still serious matters. Once the computer or copier is out of your control, you will have forgotten about all of the information on the hard drive and you will no longer be able to mitigate the risk of identity theft. Therefore, before you discard that old computer or copier, consider your options - Erase/Destroy/Recycle – and then exercise the option that works best for you. 9

Businesses should also review their document retention and destruction policies and procedures to ensure that they: (i) require that purchased or leased copiers utilize overwrite protection and encryption; (ii) require the removal of hard drives (for destruction) when digital copiers are removed or replaced; (iii) require the training of employees on possible data leakage from digital copiers; and (iv) include digital copiers in their periodic risk assessments. For further information on document retention and destruction policies, please review the New York State Department of State Division of Consumer Protection checklist.


  1. For a detailed discussion on the differences between digital copiers and other types of copiers, see http://www.infopackets.com/news/security/2010/20100507_digital_photocopiers_store_everything_they_scan_report.htm 
  2. The risk to digital copiers relates mainly to copiers made prior to 2007 because manufacturers were not yet building in security measures. For more details, see
    http://www.walletpop.com/blog/2010/05/07/older-digital-copiers-can-pose-identity-theft-risks/ 
  3. Information included names, addresses and SSNs and personal medical records. For more details, see
    http://www.cbsnews.com/8301-31727_162-20002992-10391695.html?tag=contentMain;contentBody;
    http://www.cbsnews.com/8300-31727_162-10391695.html?keyword=affinity+health+plan 
  4. http://www.cbsnews.com/stories/2010/04/19/eveningnews/main6412439.shtml 
  5. http://www.dailymail.co.uk/news/article-1178239/Computer-hard-drive-sold-eBay-details-secret-U-S-missile-defence-system.html 
  6. http://www.pcworld.com/article/110012/hard_drives_exposed.html 
  7. New York State businesses whose records include consumer credit reports must also comply with the Federal Trade Commission’s Disposal Rule, 16 CFR (Code of Federal Regulations) part 682. This rule requires any business or individual using a consumer report, such as a credit check, for a business purpose to take appropriate disposal measures to protect against the “unauthorized access to or use of the information.” Companies licensed to do business by the City of New York must also comply with New York City Administrative Code section 20-117(g) which requires that all disposal of individual PII must be done in a manner intended to prevent the retrieval of the information.”
  8. It should be noted that deleting files on a computer is unlikely to satisfy the requirements of GBL 399-h. Deleting files involves rendering selected information unreadable by changing its format with some utility in the computer’s operating system. Simply changing format does not completely delete the information, which can be recovered using a readily available software program like the one in the recent New York investigation discussed above. In addition, “deleting” selected information does not delete the operating system and any other PII, which may be contained in cookies and temporary files.
  9. Larger businesses with more substantial IT resources may also want to consider two other options – cryptographic sanitation and degaussing – which are explained in detail in the Seagate Technology paper “Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal” which is available at http://www.seagate.com/docs/pdf/whitepaper/Disposal_TP582-1-0710US.pdf.

 

Last Modified: June 22, 2011