Retiring IT assets in Alaska is a regulated event governed by the Alaska Personal Information Protection Act, federal sector regimes, and the Alaska DEC Hazardous Waste Program. State law imposes safeguarding, disposal, and notification duties that survive hardware retirement. Federal regimes establish the operative compliance baseline pending EPA authorization of state RCRA Subtitle C administration. Enterprises operating in Alaska carry continuing custody, documentation, and destruction obligations across the full asset lifecycle.
Alaska treats retired data-bearing hardware as a continuing legal exposure, not a logistics problem. Statutory duties under AS 45.48.010 et seq. and the DEC hazardous-waste regulations at 18 AAC 62 attach to enterprises until destruction and lawful diversion are complete and documented.
The compliance posture required of Alaska enterprises rests on three layered obligations. First, personal information about Alaska residents must be safeguarded and rendered unreadable on disposal under AS 45.48.500. Second, breach of personal information triggers notification duties to affected residents and, where 1,000 or more residents are affected, to nationwide consumer reporting agencies under AS 45.48.040. Third, hazardous-waste-classified electronic components are governed by the DEC hazardous-waste program under federal RCRA Subtitle C, with 18 AAC 62 effective June 1, 2025 pending EPA authorization.
Retiring IT assets in Alaska therefore operates as a layered compliance event: data-protection law, disposal law, and hazardous-waste law each apply concurrently. Enterprises retain liability across that full chain. The controls below are enumerated for compliance leadership accountable for that liability.
Alaska’s compliance regime layers on top of federal baselines for data security, financial information, healthcare, and hazardous waste. The state extends federal duties through an explicit reasonable-disposal duty, an Alaska-specific risk-of-harm-determination protocol, and dedicated state enforcement authority through the Alaska Department of Law Consumer Protection Unit.
Three federal regimes establish the floor that Alaska law extends:
Alaska overlays each of these. The Alaska Personal Information Protection Act reaches any covered person doing business in Alaska, governmental agencies, or persons with more than 10 employees. AS 45.48.500 imposes an explicit disposal duty on any business that owns or licenses records containing personal information. AS 45.48.010 requires disclosure in the most expeditious time possible and without unreasonable delay, with documentation of any risk-of-harm determination maintained for 5 years.
Federal sufficiency does not exist for Alaska compliance. An enterprise audited solely against HIPAA, GLBA, or FACTA without addressing Alaska’s overlay carries unmitigated exposure under state Unfair Trade Practices and Consumer Protection Act civil-penalty authority and DEC hazardous-waste enforcement.
Alaska imposes direct safeguarding, breach-notification, and disposal duties on enterprises that retain personal information about Alaska residents. Authority rests with the Alaska Attorney General through Unfair Trade Practices and Consumer Protection Act enforcement. These duties extend to retired hardware and storage media until destruction is complete and documented.
AS 45.48.090 defines personal information as an Alaska resident’s first name (or first initial) and last name in combination with one of: Social Security number; driver’s license or state ID number; account number, credit-card, or debit-card number with required security code, access code, or PIN; or financial-account access credentials. The definition applies to records in electronic and paper form.
AS 45.48.010 requires a covered person that owns or licenses personal information of an Alaska resident to disclose any breach of that information to the affected resident in the most expeditious time possible and without unreasonable delay, subject to the legitimate needs of law enforcement and to determinations of breach scope and integrity restoration. Alaska does not impose a fixed numeric outer limit on the notification window, distinguishing it from the 30-day or 45-day windows imposed by other states.
AS 45.48.020 provides a risk-of-harm exception. Disclosure is not required if, after appropriate investigation and after written notification to the Alaska Attorney General, the covered person determines that there is no reasonable likelihood that harm to consumers has resulted or will result. The determination must be documented in writing and maintained for 5 years.
AS 45.48.040 requires notice to all nationwide consumer credit reporting agencies if a breach affects more than 1,000 Alaska residents. Loss of unencrypted storage media, including drives released into a non-compliant disposal channel, can constitute the unauthorized acquisition that triggers these duties.
AS 45.48.500 requires any business that owns or licenses records containing personal information to take reasonable measures to dispose of records by shredding, erasing, or otherwise modifying the personal information to make it unreadable or undecipherable. The civil penalty for a violation under AS 45.48.510 is up to $3,000 per violation.
For retired data-bearing media, this duty is satisfied only when the media is rendered unreadable through documented destruction, certified erasure, or cryptographic erasure with verifiable key destruction. Drive transfer to an unverified scrap channel does not satisfy AS 45.48.500. For Alaska enterprises retiring data-bearing media, secure data destruction is the operational expression of this statutory obligation.
Alaska’s destruction expectations are anchored in AS 45.48.500 and operationalized through recognized technical standards. State authority does not prescribe a specific destruction method by name. Authority instead requires destruction sufficient to render personal information unreadable and undecipherable.
The federal baseline standard cited in Alaska audits and procurement specifications is NIST Special Publication 800-88 Revision 2, Guidelines for Media Sanitization, published by the National Institute of Standards and Technology on September 26, 2025. The revision supersedes SP 800-88 Rev. 1 (December 2014) and shifts emphasis from individual sanitization techniques to an enterprise media-sanitization program. SP 800-88r2 expands cryptographic-erase guidance, introduces logical sanitization for cloud and virtualized environments, and improves alignment with 16 CFR Part 314, NIST SP 800-53, and ISO/IEC 27040.
NIST SP 800-88r2 organizes sanitization into three categories. Clear applies logical techniques that protect data against simple non-invasive recovery. Purge applies physical or logical techniques that protect data against state-of-the-art laboratory recovery. Destroy renders the storage medium itself unusable through shredding, disintegration, pulverization, or incineration.
Defense, aerospace, and federal-contract environments operating in Alaska also reference 32 CFR Part 117, the National Industrial Security Program Operating Manual rule that replaced DoD 5220.22-M as the operative regulation in 2021. The DoD 5220.22-M overwrite specification remains in colloquial use as a legacy reference.
Healthcare-adjacent Alaska enterprises also follow 45 CFR §164.310(d)(2)(i) and (ii) for device and media controls covering disposal and reuse. The U.S. Department of Health and Human Services directs covered entities and business associates to NIST SP 800-88 for practical sanitization guidance.
The compliance distinction Alaska audits draw is between defensible destruction and informal disposal. Defensible destruction produces a serialized record per asset, a documented method, an attested operator, a witness or chain-of-custody record, and a Certificate of Destruction tied to the asset’s identifier. Informal disposal includes drive wipe without sector-level verification, scrap-yard transfer without certificates, and donation pipelines without documented sanitization. Only defensible destruction discharges the AS 45.48.500 duty.
Alaska has not enacted a comprehensive state e-waste recycling law. Hazardous-waste-classified electronic components, including CRT glass, lead-bearing circuit boards, and mercury-containing displays, fall within the DEC Hazardous Waste Program under the Alaska Hazardous Waste Management regulations at 18 AAC 62, as amended through Register 254 (June 1, 2025).
Senate Bill 61, An Act relating to an electronic product stewardship program, is pending in the 34th Alaska Legislature (2025–2026). The bill, if enacted, would establish a manufacturer-funded electronic-product stewardship program and an electronics recycling advisory council under DEC oversight. As of the most recent legislative reading the bill is in the Senate Finance Committee and has not been enacted. Alaska compliance posture must therefore assume the federal-baseline plus state-hazardous-waste regime as the operative standard, not a state e-waste mandate.
The Alaska Department of Environmental Conservation, Environmental Health Division, Hazardous Waste Program, administers state hazardous-waste regulations adopted at 18 AAC 62. Alaska is one of two states not currently authorized by EPA to administer RCRA Subtitle C in lieu of EPA. State regulations took effect June 1, 2025; until EPA authorization is granted, hazardous-waste handlers in Alaska continue to comply with federal regulations at 40 CFR Parts 260–273, with the state regulations operating as a parallel framework.
The federal Universal Waste Rule at 40 CFR Part 273 is the operative rule for batteries, mercury-containing equipment, lamps, pesticides, and aerosol cans handled in Alaska. Hazardous-waste-classified electronic components remain subject to full Subtitle C handling unless they qualify under a universal-waste category.
18 AAC 60 governs solid-waste landfill disposal in Alaska. The state does not impose a statutory landfill ban on covered electronic devices.
Federal regimes operate as the operative regulatory regime for hazardous-waste-classified electronics in Alaska:
Alaska’s compliance regime applies across the full enterprise asset stack. The same statutory and regulatory duties attach whether the retired equipment is one laptop or a multi-rack data-center decommission. Scale changes the magnitude of exposure, not the nature of the duty.
| Asset Type | Primary Compliance Driver | Operational Control |
|---|---|---|
| Servers and storage arrays | AS 45.48.500; HIPAA Security Rule; FTC Safeguards Rule | Purge or Destroy per NIST SP 800-88r2; chain-of-custody; serialized Certificate of Destruction |
| Endpoints and laptops | AS 45.48.500; APIPA | Drive sanitization with sector-level verification or physical destruction; refurbishment only after verified sanitization |
| Mobile devices and tablets | APIPA; FACTA Disposal Rule | Cryptographic erase with verifiable key destruction; physical destruction for high-sensitivity classes |
| Networking equipment, switches, routers | AS 45.48.500; configuration data sensitivity | Configuration sanitization, firmware reset, controlled refurbishment, or destruction |
| CRT glass, mercury-containing displays | 40 CFR Part 261, Subpart E; 18 AAC 62 | Routing through permitted hazardous-waste handler chain; federal Subtitle C compliance |
| Medical, telecom, defense, and aerospace equipment | HIPAA; 32 CFR Part 117; ITAR/EAR | Witnessed or on-site destruction; serialized records |
A program that operationalizes IT asset disposition at scale must address each asset class with method-appropriate controls and produce a uniform documentation set across the portfolio.
Three scenarios capture the most common Alaska enterprise exposure profiles.
The first is data-center decommission. A multi-rack retirement event combines high-volume hard-drive sanitization, networking-gear lifecycle disposition, and chassis recycling. Compliance evidence required across the engagement includes a serialized asset list, witnessed destruction logs, environmental routing records, and a consolidated Certificate of Destruction package addressed to the enterprise’s compliance and legal teams.
The second is cyclical hardware refresh. Quarterly or semi-annual endpoint refresh cycles produce continuous flows of laptops and mobile devices. Compliance discipline requires the same documentation rigor at each cycle, with no thresholds below which controls relax.
The third is post-acquisition or branch-closure asset retirement. Inherited or surplus inventory carries unknown-state data risk. Conservative compliance posture treats the inventory as data-bearing until verified otherwise, with destruction or certified sanitization preceding any reuse, resale, or donation.
Alaska’s enforcement posture is anchored in the Unfair Trade Practices and Consumer Protection Act and DEC hazardous-waste enforcement. The Alaska Department of Law Consumer Protection Unit administers APIPA enforcement.
The Alaska penalty schedule is set by AS 45.48.080, AS 45.48.510, and AS 45.50.551:
Alaska enterprises face audit-driven risk on three vectors: regulator-initiated investigation, insurance and reinsurance review, and customer or counterparty due diligence. Each vector requires the same evidence: serialized destruction records, certified sanitization attestations, environmental disposition documentation, and contractual safeguard terms with downstream service providers. Multistate AG settlements affecting Alaska residents include Marriott (October 2024), Blackbaud (October 2023), and Equifax (July 2019).
Alaska audits and enforcement actions turn on documentation. The substance of compliance lives in the records that an enterprise can produce on request: who held the asset, when, in what condition, and how it was destroyed or diverted. A program that satisfies Alaska requirements produces those records as a default operating output, not an after-the-fact reconstruction.
A defensible Alaska IT asset disposition program produces the following documentation set per engagement:
Chain-of-custody records satisfy Alaska audit expectations when they are continuous, tamper-evident, and time-stamped. Continuous means no time gap exists in which the asset’s location and custody are unknown. Tamper-evident means the record itself is protected against alteration. Time-stamped means each handoff is anchored to a verifiable system clock.
Sealed transport with tamper-evident containers and access-controlled handoffs supports the continuity standard. Real-time tracking systems support the time-stamping standard. Internal access-control logs support the tamper-evidence standard.
Enterprise compliance teams asked to produce IT-asset-retirement evidence in an Alaska AG inquiry, an insurance-renewal review, or a customer due-diligence response are routinely asked for: a sample serialized destruction record, a sample chain-of-custody log, a representative Certificate of Destruction, the destruction-method specification, the operator and witness identities, the environmental disposition record, and the contract or service-level agreement under which the disposition was performed. A program that cannot produce this packet in a single retrieval is operating below the Alaska enterprise standard.
All Green Recycling, LLC operates as compliance infrastructure for Alaska enterprises retiring IT assets, not as a recycler bidding for tonnage. The control set described below maps directly to the statutory and regulatory duties enumerated above. Each control is a measurable operating output, traceable to a serialized asset.
All Green Recycling’s IT asset disposition program provides comprehensive management of retired IT assets with secure removal, refurbishment, redeployment, resale, and remarketing under chain-of-custody control. Every asset is captured on a serialized list at collection. Data-bearing assets are sanitized or destroyed before any reuse decision is made. Asset value recovery is structured to maximize ROI without compromising data security.
All Green Recycling’s secure data destruction program operates four destruction methods aligned to NIST SP 800-88r2: hard-drive shredding, degaussing, crushing, and certified secure erasure. On-site and off-site destruction options are available with full audit trails. The program complies with NIST 800-88, DoD 5220.22-M, HIPAA, and GDPR standards. Every destruction event produces a serialized Certificate of Data Destruction tied to the asset’s serial number.
All Green Recycling operates a zero-landfill policy and routes hazardous-waste-classified electronic components through Alaska’s federal-baseline hazardous-waste handler chain. The program operates under a comprehensive environmental management framework. R2v3 is the recognized industry framework for responsible recycling; All Green Recycling references R2v3 as the framework that defines the responsible-recycling standard, while certifications and registrations actually held are confirmed in writing on request to compliance leadership.
For medical, telecom, defense, and aerospace equipment, All Green Recycling provides complete physical destruction to prevent reuse or data leakage. Witnessed destruction is available where contractually required. Destruction documentation aligns to the customer’s compliance regime, including HIPAA, ITAR, EAR, and 32 CFR Part 117 environments.
Nationwide secure transport supports Alaska enterprises, including remote-location and out-of-state collection points consolidating to the lower 48 for processing. The Green Pulse tracking system records movement from pickup through final disposition. Tamper-evident containers and sealed transport satisfy the chain-of-custody continuity standard.
All engagements produce a uniform documentation package: serialized asset list, chain-of-custody log, Certificate of Data Destruction, Certificate of Recycling, and environmental disposition record. The documentation package is structured for direct delivery to compliance, legal, audit, and regulator teams without reformatting.
Alaska IT asset retirement is a layered risk-management discipline, not a recycling transaction. APIPA civil penalties, DEC hazardous-waste enforcement, and audit-driven counterparty review converge on the same set of records: serialized destruction logs, chain-of-custody continuity, environmental disposition evidence, and contracted-service safeguard terms. Enterprises that operationalize that record set carry defensible compliance posture across regulator inquiry, audit cycle, and incident response.
All Green Recycling, LLC operationalizes that posture for Alaska enterprises through IT asset disposition, secure data destruction, electronics recycling, equipment destruction, reverse logistics, and audit-ready reporting. To engage on an Alaska asset-retirement program, contact the All Green Recycling compliance response desk at (800) 780-0347 or open an engagement through your existing account team.