Consumer Privacy & Data Wiping

At Foxway, we prioritize consumer privacy by implementing a thorough data wiping process for devices received by us. This article provides an overview of our data wiping procedures.

Process Overview

  1. Vendor requirements collection: During onboarding, we collect initial vendor specifications and requirements for the data wipe process
  2. Foxway systems configuration: The client's data wipe preferences, including the specific method of data erasure (manual or certified), are configured in our Foxway systems
  3. Device receipt and registration: Devices are logged into the Foxway systems upon their arrival
  4. Data wipe implementation: Data erasure is performed through a predetermined method, either manual or certified
    • Manual data wipe: Technicians manually erase all data following standardized procedures without automated software tools
    • Certified data wipe: Certified software automatically erases data, providing a verifiable certificate of erasure that complies with international standards
  5. Outcome:
    • Passed: Devices that pass the data wipe process proceed to warehouse storage
    • Failed: Devices that fail undergo an internal data destruction process and are then sent to approved partners for recycling and physical destruction
  6. Warehouse storage: Devices that have successfully passed the data wipe process are stored in the warehouse.
  7. Sales processing: Devices are prepared and listed for sale following their storage in the warehouse.

 

Data Sanitization Methods

Foxway enforces guidelines outlined in the NIST 800-88 standard, which includes the following data sanitization methods:

  • Purge: Makes data inaccessible through any means, including sophisticated laboratory techniques.
  • Clear: Makes data inaccessible through a drive's interface with an operating system, typically involving overwriting all user-accessible sectors with a known pattern.
  • Destroy: Renders data recovery infeasible by physically destroying the storage media (e.g., shredding).

Tools Used for Data Sanitization

Foxway uses industry-leading tools and software for conducting data sanitization procedures, as well as manual data wipe and physical destruction.

Erasure Methods by Device Type

  • Computers: Primary method is Purge, followed by Clear, manual data reset, and physical destruction
  • Drives: Primary method is Purge, followed by physical destruction
  • Android Devices: Primary method is Purge, followed by cryptographic sanitization, HMG infosec 5 Baseline overwrite, and physical destruction
  • iOS Devices: Primary method is Purge, followed by cryptographic sanitization, OS reset, OS reinstall, and physical destruction

Documentation and Compliance

Each step of the data wipe process is automatically timestamped to ensure a comprehensive and traceable record of all actions taken with each device. These timestamps can be provided to the customer upon request to verify the process and maintain an auditable trail.

By following these rigorous data wiping procedures, Foxway ensures that consumer privacy is protected, and data is securely erased from all traded-in devices.