Retiring IT assets in Washington is a regulated event governed by the Washington Disposal of Personal Information Act, the Washington Data Breach Notification Act, the Washington My Health My Data Act, federal sector regimes, and the Washington State Department of Ecology E-Cycle Washington program. State law imposes destruction, breach-notification, and manufacturer-recycling duties that survive hardware retirement. Federal regimes establish a baseline that Washington law extends. Enterprises operating in Washington carry continuing custody, documentation, and destruction obligations across the full asset lifecycle.
Washington treats retired data-bearing hardware as a continuing legal exposure, not a logistics problem. Statutory duties under RCW 19.215.020, RCW 19.255.010, and Chapter 70A.500 RCW attach to enterprises until destruction and lawful diversion are complete and documented.
The compliance posture required of Washington enterprises rests on three layered obligations. First, personal financial and health information and government-issued personal identification numbers must be destroyed by shredding, erasing, or otherwise modifying records to render the information unreadable or undecipherable under RCW 19.215.020. Second, breaches affecting Washington residents must be reported to affected residents and, for breaches affecting more than 500 Washington residents, to the Washington Attorney General’s Office within 30 days of discovery. Third, manufacturers of covered electronic products must register with the Washington State Department of Ecology and finance recycling through E-Cycle Washington under Chapter 173-900 WAC.
Retiring IT assets in Washington therefore operates as a layered compliance event: data-disposal law, breach-notification law, manufacturer-responsibility e-waste law, and Dangerous Waste Regulations each apply concurrently. Enterprises retain liability across that full chain. The controls below are enumerated for compliance leadership accountable for that liability.
Washington’s compliance regime layers directly on top of federal baselines for data security, financial information, healthcare, and hazardous waste. The state extends federal duties through a prescriptive disposal-method statute, a 30-day breach-notification window, a sector-specific consumer-health-data privacy framework, a manufacturer-funded e-waste program, and dedicated state enforcement authority through the Washington State Office of the Attorney General.
Three federal regimes establish the floor that Washington law extends:
Washington overlays each of these. The Disposal of Personal Information Act reaches every entity engaged in trade, occupation, enterprise, or governmental function in Washington, with no revenue threshold. RCW 19.215.020 imposes a prescriptive disposal duty: shred, erase, or otherwise modify records to make the personal information unreadable or undecipherable. RCW 19.215.030 provides a federal-compliance safe harbor: an entity in compliance with the GLBA Interagency Guidelines or the HIPAA Privacy Rule is deemed in compliance with Chapter 19.215. The breach-notification statute imposes 30-day notification to residents and to the AG when the breach affects more than 500 residents. The Washington My Health My Data Act, effective March 31, 2024, adds consumer-health-data privacy, consent, and deletion duties.
Federal sufficiency is partial in Washington. RCW 19.215.030 provides a safe harbor for Chapter 19.215 disposal duties, but the breach-notification, My Health My Data, and Dangerous Waste regimes operate independently of any federal-compliance assertion.
Washington imposes direct destruction, breach-notification, and consumer-health-data duties on enterprises that retain personal information of Washington residents. Authority rests with the Washington Attorney General under RCW 19.215.020(6), Chapter 19.255 RCW, and Chapter 19.373 RCW enforcement. These duties extend to retired hardware and storage media until destruction is complete and documented.
RCW 19.215.020 requires every entity to take all reasonable steps to destroy, or arrange for the destruction of, personal financial and health information and personal identification numbers issued by government entities in records within its custody or control when disposing of records that the entity will no longer retain.
RCW 19.215.010 defines “destroy personal information” as “shredding, erasing, or otherwise modifying personal information in records to make the personal information unreadable or undecipherable through any reasonable means.” The definition covers personal financial and health information (account numbers, access codes, credit card numbers, medical history) and government-issued personal identification numbers (Social Security number, driver license number, state identification card number, tax identification number).
For retired data-bearing media, this duty extends through transit, storage, sanitization, destruction, and final disposition. A program that loses chain-of-custody control between the production environment and the destruction event does not satisfy RCW 19.215.020. An entity that arranges for destruction by a third-party service provider remains accountable for the destruction outcome.
RCW 19.255.010 requires any person or business that conducts business in Washington and owns or licenses data including personal information to disclose any breach of the security of the system to any Washington resident whose personal information was, or is reasonably believed to have been, acquired by an unauthorized person and was not secured. Notice is not required if the breach is not reasonably likely to subject consumers to risk of harm.
Notification must be made “in the most expedient time possible” and within 30 days after the breach was discovered. For breaches affecting more than 500 Washington residents, notification must also be provided to the Washington Attorney General’s Office within 30 days, via the Data Breach Notification Web Form. Loss of unencrypted storage media, including drives or arrays released into a non-compliant disposal channel, can constitute the unauthorized acquisition that triggers this duty.
The Washington My Health My Data Act, enacted by Chapter 191, Laws of 2023, became effective for regulated entities on March 31, 2024, and for small businesses on June 30, 2024. The Act applies to any legal entity that conducts business in Washington or produces or provides products or services targeted to Washington consumers, and that determines the purpose and means of collecting, processing, sharing, or selling consumer health data.
RCW 19.373.040 grants consumers the right to confirm whether a regulated entity is collecting, sharing, or selling consumer health data, the right to withdraw consent, and the right to have consumer health data deleted, including from archived or backup systems. RCW 19.373.020 requires regulated entities to maintain a consumer health data privacy policy. RCW 19.373.070 prohibits the sale of consumer health data without valid authorization.
For retired hardware, the My Health My Data Act reinforces the RCW 19.215.020 disposal duty: deletion requests must be honored across all parts of a regulated entity’s network, including archived or backup systems. Storage media retired through a non-compliant channel that retains consumer health data exposes the entity to enforcement under Chapter 19.86 RCW and to private right of action under § 19.373.100.
RCW 19.215.030 provides that a bank, financial institution, health care organization, or other entity subject to and in compliance with the GLBA Interagency Guidelines (12 CFR 208 Appendix D-2; 12 CFR 364 Appendix B; 12 CFR 30 Appendix B; 12 CFR 570 Appendix B; 12 CFR 748 Appendix A) and the HIPAA Privacy Rule at 45 CFR 160 and 164 is in compliance with Chapter 19.215. The safe harbor is conditional on actual compliance with the named federal regimes; it does not extend to the breach-notification statute, the My Health My Data Act, or the Dangerous Waste Regulations.
Washington’s destruction expectations are anchored in RCW 19.215.010 and RCW 19.215.020 and operationalized through recognized technical standards. State authority prescribes the methods (shred, erase, or otherwise modify) and the outcome (unreadable or undecipherable). Technical implementation tracks federal media-sanitization standards.
The federal baseline standard cited in Washington audits and procurement specifications is NIST Special Publication 800-88 Revision 2, Guidelines for Media Sanitization, published by the National Institute of Standards and Technology on September 26, 2025. The revision supersedes SP 800-88 Rev. 1 (December 2014) and shifts emphasis from individual sanitization techniques to an enterprise media-sanitization program. SP 800-88r2 expands cryptographic-erase guidance, introduces logical sanitization for cloud and virtualized environments, and improves alignment with 16 CFR Part 314, NIST SP 800-53, and ISO/IEC 27040.
NIST SP 800-88r2 organizes sanitization into three categories. Clear applies logical techniques that protect data against simple non-invasive recovery. Purge applies physical or logical techniques that protect data against state-of-the-art laboratory recovery. Destroy renders the storage medium itself unusable through shredding, disintegration, pulverization, or incineration.
Defense, aerospace, and federal-contract environments operating in Washington (including Joint Base Lewis-McChord, Naval Base Kitsap, Naval Air Station Whidbey Island, Boeing Defense in Everett, Pacific Northwest National Laboratory in Richland, and the Hanford Site) reference 32 CFR Part 117, the National Industrial Security Program Operating Manual rule that replaced DoD 5220.22-M as the operative regulation in 2021. The DoD 5220.22-M overwrite specification remains in colloquial use as a legacy reference.
Healthcare-adjacent Washington enterprises (including UW Medicine, Providence Health and Services, MultiCare Health System, Virginia Mason Franciscan Health, and Seattle Children’s) follow 45 CFR § 164.310(d)(2)(i) and (ii) for device and media controls covering disposal and reuse. The U.S. Department of Health and Human Services directs covered entities and business associates to NIST SP 800-88 for practical sanitization guidance and recognizes clearing, purging, and physical destruction as appropriate methods.
The compliance distinction Washington audits draw is between defensible destruction and informal disposal. Defensible destruction produces a serialized record per asset, a documented method consistent with RCW 19.215.020, an attested operator, a witness or chain-of-custody record, and a Certificate of Destruction tied to the asset’s identifier. Informal disposal includes drive wipe without sector-level verification, scrap-yard transfer without certificates, and donation pipelines without documented sanitization. Only defensible destruction discharges the RCW 19.215.020 duty.
Washington operates a manufacturer-funded e-waste recycling program under Chapter 70A.500 RCW (recodified from Chapter 70.95N RCW) and Chapter 173-900 WAC. Hazardous-waste-classified electronic components fall within the Washington State Department of Ecology Dangerous Waste Regulations at Chapter 173-303 WAC, which is more stringent than the federal RCRA Subtitle C floor.
E-Cycle Washington, administered by the Washington State Department of Ecology, provides free recycling for households, small businesses (fewer than 50 employees), school districts, small governments, and charities. Covered electronic products (CEPs) include televisions, computers, monitors, laptops, tablets, and portable DVD players.
RCW 70A.500.030 requires manufacturers of CEPs offered for sale in Washington to participate in an independent plan or the standard plan operated by the Washington Materials Management and Financing Authority. Manufacturers are responsible for all administrative and operational costs. Chapter 173-900 WAC implements the program with detailed requirements:
Chapter 173-303 WAC governs the management of hazardous waste in Washington. The Dangerous Waste Regulations are more stringent than federal RCRA Subtitle C and include state-specific designation criteria.
WAC 173-303-077 adopts the universal-waste rule, covering batteries, mercury-containing equipment, lamps, and certain pesticides. WAC 173-303-071(3)(oo) provides a conditional exclusion for cathode ray tubes when storage, labeling, and transportation conditions are met.
The Washington Department of Ecology Interim Enforcement Policy for Conditional Exclusion for Electronic Wastes operates as a working compliance pathway: small quantity generators (fewer than 50 employees) use E-Cycle Washington for free; medium and large quantity generators follow the Interim Enforcement Policy. Properly recycled e-waste does not count as a dangerous waste, does not affect the generator’s category, and does not require a manifest when transported off-site.
Federal regimes operate concurrently with the Washington framework:
Washington’s compliance regime applies across the full enterprise asset stack. The same statutory and regulatory duties attach whether the retired equipment is one laptop or a multi-rack data-center decommission. Scale changes the magnitude of exposure, not the nature of the duty.
| Asset Type | Primary Compliance Driver | Operational Control |
|---|---|---|
| Servers and storage arrays | RCW 19.215.020; HIPAA Security Rule; FTC Safeguards Rule | Purge or Destroy per NIST SP 800-88r2; chain-of-custody; serialized Certificate of Destruction |
| Endpoints and laptops | RCW 19.215.020; Chapter 70A.500 RCW | Drive sanitization with sector-level verification or physical destruction; E-Cycle WA-compliant routing |
| Mobile devices and tablets | RCW 19.215.020; FACTA Disposal Rule | Cryptographic erase with verifiable key destruction; physical destruction for high-sensitivity classes |
| Networking equipment, switches, routers | RCW 19.215.020; configuration-data sensitivity | Configuration sanitization, firmware reset, controlled refurbishment, or destruction |
| CRT glass, mercury-containing displays | WAC 173-303-071(3)(oo); 40 CFR Part 261, Subpart E | Conditional-exclusion compliance; routing through E-Cycle WA processor |
| Lamps, batteries, mercury devices | WAC 173-303-077; 40 CFR Part 273 | Universal-waste handler controls; labeling and storage compliance |
| Consumer-health-data-bearing devices | Chapter 19.373 RCW | Deletion across archived and backup systems; documented destruction |
| Medical, telecom, defense, and aerospace equipment | HIPAA; 32 CFR Part 117; ITAR/EAR | Witnessed or on-site destruction; serialized records |
A program that operationalizes IT asset disposition at scale must address each asset class with method-appropriate controls and produce a uniform documentation set across the portfolio.
Three scenarios capture the most common Washington enterprise exposure profiles.
The first is data-center decommission. A multi-rack retirement event in Seattle, Bellevue, Redmond, Tacoma, the Eastside tech corridor, the Quincy and Moses Lake data-center clusters, or the broader Puget Sound technology base combines high-volume hard-drive sanitization, networking-gear lifecycle disposition, and chassis recycling. Compliance evidence required across the engagement includes a serialized asset list, witnessed destruction logs, environmental routing records, and a consolidated Certificate of Destruction package addressed to the enterprise’s compliance and legal teams.
The second is cyclical hardware refresh. Quarterly or semi-annual endpoint refresh cycles produce continuous flows of laptops and mobile devices. Compliance discipline requires the same documentation rigor at each cycle, with no thresholds below which controls relax.
The third is post-acquisition or branch-closure asset retirement. Inherited or surplus inventory carries unknown-state data risk. Conservative compliance posture treats the inventory as data-bearing until verified otherwise, with destruction or certified sanitization preceding any reuse, resale, or donation.
Washington’s enforcement posture is anchored in Chapter 19.215 civil-action and AG authority, Chapter 19.255 Consumer Protection Act treatment, Chapter 19.373 Consumer Protection Act treatment plus private right of action, and Department of Ecology enforcement under Chapters 173-303 and 173-900 WAC. The Washington Attorney General’s Data Breach Resource Center operates a public Data Breach Notification Web Form and maintains a public directory of data breach notices submitted since July 24, 2015.
The Washington penalty schedule is set by RCW 19.215.020, Chapter 19.86 RCW, Chapter 173-900 WAC, and RCW 70A.300.140:
| Date | Action | Resolution |
|---|---|---|
| 2015–present | Washington AG Data Breach Notifications Directory | Public directory of all breach notices submitted to the Office, demonstrating continuous enforcement activity |
| October 2024 | Marriott International multistate settlement | 50-AG settlement, $52 million for multi-year breach of Starwood guest-reservation database |
| October 2023 | Blackbaud multistate settlement | 49-AG settlement, $49.5 million for 2020 ransomware breach |
| July 2019 | Equifax multistate settlement | 50-AG settlement, $600 million, the largest data-breach enforcement action in U.S. history at the time |
Washington enterprises face audit-driven risk on three vectors: regulator-initiated investigation (Washington AG, Department of Ecology, federal sectoral regulators), insurance and reinsurance review, and customer or counterparty due diligence. Each vector requires the same evidence: serialized destruction records, certified sanitization attestations, environmental disposition documentation, and contractual safeguard terms with downstream service providers.
Washington audits and enforcement actions turn on documentation. The substance of compliance lives in the records that an enterprise can produce on request: who held the asset, when, in what condition, and how it was destroyed or diverted. A program that satisfies Washington requirements produces those records as a default operating output, not an after-the-fact reconstruction.
A defensible Washington IT asset disposition program produces the following documentation set per engagement:
Chain-of-custody records satisfy Washington audit expectations when they are continuous, tamper-evident, and time-stamped. Continuous means no time gap exists in which the asset’s location and custody are unknown. Tamper-evident means the record itself is protected against alteration. Time-stamped means each handoff is anchored to a verifiable system clock.
Sealed transport with tamper-evident containers and access-controlled handoffs supports the continuity standard. Real-time tracking systems support the time-stamping standard. Internal access-control logs support the tamper-evidence standard.
Enterprise compliance teams asked to produce IT-asset-retirement evidence in a Washington AG inquiry, a Department of Ecology inspection, an insurance-renewal review, or a customer due-diligence response are routinely asked for: a sample serialized destruction record, a sample chain-of-custody log, a representative Certificate of Destruction, the destruction-method specification consistent with RCW 19.215.010, the operator and witness identities, the environmental disposition record, and the contract or service-level agreement under which the disposition was performed. A program that cannot produce this packet in a single retrieval is operating below the Washington enterprise standard.
All Green Recycling, LLC operates as compliance infrastructure for Washington enterprises retiring IT assets, not as a recycler bidding for tonnage. The control set described below maps directly to the statutory and regulatory duties enumerated above. Each control is a measurable operating output, traceable to a serialized asset.
All Green Recycling’s IT asset disposition program provides comprehensive management of retired IT assets with secure removal, refurbishment, redeployment, resale, and remarketing under chain-of-custody control. Every asset is captured on a serialized list at collection. Data-bearing assets are sanitized or destroyed before any reuse decision is made. Asset value recovery is structured to maximize ROI without compromising data security or RCW 19.215.020 destruction obligations.
Secure data destruction is operationalized as the enterprise expression of the RCW 19.215.020 destruction duty and the My Health My Data deletion duty. The destruction program is aligned to NIST SP 800-88r2 Clear, Purge, and Destroy categories, with cryptographic erasure, sector-level verification, degaussing, shredding, and pulverization available as method choices. Destruction is documented per asset, with witnessed destruction available for high-sensitivity assets and on-site destruction available where transit risk is unacceptable.
Electronics recycling under All Green Recycling’s program routes covered electronic devices through a documented handler chain compliant with E-Cycle Washington routing requirements and the Department of Ecology Interim Enforcement Policy. Hazardous-waste-classified components are routed through a permitted handler chain. The downstream chain is documented for the enterprise’s environmental-compliance file.
All Green Recycling, LLC maintains operational alignment to:
The R2v3 Standard, NAID AAA, e-Stewards, and ISO 27001 are referenced in this document only as recognized industry frameworks. All Green Recycling, LLC does not claim certification under those programs.
Every Washington engagement produces a serialized asset list, chain-of-custody record, Certificate of Data Destruction, Certificate of Recycling, and environmental disposition record, packaged for the enterprise’s compliance file.
Washington IT asset disposition compliance is risk management. Each statutory duty enumerated above corresponds to a specific enterprise exposure: RCW 19.215.020 to data-disposal exposure, RCW 19.255.010 to breach-notification exposure, Chapter 19.373 RCW to consumer-health-data exposure, Chapter 70A.500 RCW to manufacturer-recycling exposure, Chapter 173-303 WAC to dangerous-waste exposure, and the federal regimes to sectoral exposure layered over the state baseline. A program that satisfies these duties does so as a permanent operating output: serialized records, witnessed destruction where required, documented chain-of-custody, environmental disposition records, and a single retrievable evidence packet per engagement.
All Green Recycling operates as compliance infrastructure for Washington enterprises retiring IT assets. Engagements are structured to produce evidence that satisfies a Washington AG inquiry, a Department of Ecology inspection, a HIPAA audit, a GLBA examination, a board-level compliance review, and an insurance-renewal review from a single documentation set. Enterprise compliance, legal, and security leadership in Washington coordinate engagements through (800) 780-0347 or the allgreenrecycling.com intake channel.