Wyoming’s emergence as a hyperscale data-center hub (Microsoft, Meta) sits on top of a regulatory regime built around the Wyoming Insurance Data Security Act (effective July 1, 2022, NAIC IDS Model Law adopter) and the Wyo. Stat. § 40-12-501 to 509 breach-notification statute, making hardware end-of-life destruction a recurring federal-contract and insurance-sector audit surface. The Enterprise Compliance Reference below is the Wyoming executive briefing; the sections that follow walk every duty, regulator, and penalty band with statute citation and recent enforcement context.

| Compliance Topic | What Wyoming Requires | Who Enforces | Penalty Band | What All Green Recycling Provides |
|---|---|---|---|---|
| 1. Breach Notification | Notice to affected Wyoming residents in the most expedient time possible under Wyo. Stat. § 40-12-502. | Wyoming AG | Consumer Protection Act civil penalties; injunctive relief under § 40-12-506 | Certified media shredding with serialized Certificate of Destruction. |
| 2. Records Disposal | Destruction or modification rendering personal information unreadable or undecipherable under Wyo. Stat. § 40-12-602. | Wyoming AG | Consumer Protection Act civil penalties | Certified data wiping aligned to NIST Clear / Purge. |
| 3. Consumer Protection Act | Wyo. Stat. § 40-12-101 UDAP carryover applies to disposal and breach failures. | Wyoming AG; private parties | Up to $5,000 per violation under § 40-12-113; private action under § 40-12-108 | Certified data destruction with documented chain of custody. |
| 4. Insurance Data Security Act | Written information security program; annual board certification under Wyo. Stat. § 26-49-101. | Wyoming Department of Insurance | Up to $1,000 per violation under § 26-49-208 | Certified data destruction with insurance-licensee attestation. |
| 5. Hazardous Waste & CRT Handling | RCRA-delegated state program under Wyoming DEQ Solid and Hazardous Waste Rules; universal-waste rules; CRT rules at 40 C.F.R. § 261.39. | Wyoming DEQ Solid and Hazardous Waste Division | Up to $10,000/day under Wyo. Stat. § 35-11-901 | Certified electronics recycling with environmental disposition record. |
| 6. Federal Overlay & Audit Posture | HIPAA, FTC Safeguards, FTC Disposal Rule, GLBA, FAR 52.204-21, DFARS 252.204-7012; documented Certificate of Destruction, chain-of-custody, environmental disposition. | HHS OCR, FTC, federal prime contractors | HIPAA up to $2.067M per identical violation per year (2025) | IT asset reporting packaged for compliance, legal, and audit teams. |
Wyoming’s compliance regime spans (1) the Wyoming breach-notification statute at Wyo. Stat. § 40-12-501 to 509 (notice in the most expedient time possible; 2015 amendments significantly expanded personal-information definition to include health-insurance information, medical information, and biometric data), (2) the records-disposal duty at Wyo. Stat. § 40-12-602, (3) the Consumer Protection Act at Wyo. Stat. § 40-12-101 (private right of action), (4) the Wyoming Insurance Data Security Act at Wyo. Stat. § 26-49-101 (effective July 1, 2022; adopted NAIC Insurance Data Security Model Law), and (5) the Wyoming DEQ Solid and Hazardous Waste Rules. Wyoming is a major data-center state; large operators often have federal-contractor and HIPAA business-associate exposure.
Wyoming’s hyperscale data-center growth, F.E. Warren AFB, energy, and insurance industries pull FAR 52.204-21, DFARS 252.204-7012, CMMC 2.0, HIPAA, GLBA, the FTC Safeguards Rule, FACTA, and the Wyoming Insurance Data Security Act over most in-state enterprises, with Wyo. Stat. § 40-12-501 layered on top. A regulated enterprise must satisfy the stricter of (1) Wyoming statutes including § 40-12-501 (breach), § 40-12-602 (disposal), § 40-12-101 (Consumer Protection Act), and § 26-49-101 (Insurance Data Security Act), (2) federal sector rules including HIPAA Security Rule, FTC Disposal Rule, FTC Safeguards Rule, GLBA, FAR 52.204-21, and DFARS 252.204-7012, and (3) customer or prime-contract clauses.
The preemption matrix below states, for each federal regime that touches enterprise IT asset disposition in Wyoming, whether Wyoming law is preempted by, equal to, or exceeds the federal floor, and where it exceeds, the specific stricter element.
| Federal Regime | Wyoming Posture | Stricter Element (if any) |
|---|---|---|
| HIPAA Security Rule (45 CFR Part 164 Subpart C) | equals | Federal regime controls; state law does not exceed the federal floor. |
| GLBA / FTC Safeguards Rule (16 CFR Part 314) | exceeds | Wyo. Stat. § 26-49-101 Insurance Data Security Act imposes written information security program with annual board certification on insurance licensees. |
| FACTA Disposal Rule (16 CFR § 682.3) | equals | Federal regime controls; state law does not exceed the federal floor. |
| DFARS 252.204-7012 / FAR 52.204-21 / CMMC 2.0 (32 CFR Part 170) | equals | Federal regime controls for federal contractors; CMMC 2.0 effective December 16, 2024 applies through prime-contractor flow-down. |
| RCRA Subtitle C (40 CFR Parts 260-279) | equals | Wyoming state hazardous-waste program implements RCRA Subtitle C at the federal floor. |
For federal contractors operating in Wyoming, the Defense Federal Acquisition Regulation Supplement at DFARS 252.204-7012, the Federal Acquisition Regulation at FAR 52.204-21, and the Cybersecurity Maturity Model Certification 2.0 program codified at 32 CFR Part 170 (effective December 16, 2024) impose media-sanitization, chain-of-custody, and incident-reporting duties that flow down through prime-contractor clauses. NIST SP 800-171 Revision 3 (final May 2024) is the operative control framework for covered defense information and controlled unclassified information; NIST SP 800-88 Revision 2 (operative September 26, 2025) is the operative sanitization standard for both DFARS and CMMC 2.0 audit defensibility.
Wyo. Stat. § 40-12-502 requires notice to affected Wyoming residents in the most expedient time possible. The 2015 amendments (SF 35 and SF 36) significantly expanded the personal-information definition to include health-insurance information, medical information, biometric data, and shared user names with security questions and answers.
Wyo. Stat. § 40-12-602 requires entities to take reasonable steps to destroy or arrange for the destruction of records containing personal identifying information by shredding, erasing, or otherwise modifying the personal identifying information to make it unreadable or undecipherable.
Wyoming’s Consumer Protection Act at Wyo. Stat. § 40-12-101 provides a private right of action under § 40-12-108 for actual damages. Civil penalties run up to $5,000 per violation under § 40-12-113. Disposal and breach failures are actionable as unfair or deceptive acts.
Wyoming has adopted the NAIC Insurance Data Security Model Law at Wyo. Stat. § 26-49-101 (effective July 1, 2022). The statute imposes a written information security program duty on insurance licensees, brokers, and third-party service providers; mandates annual board certification of the program; prescribes incident-notification windows to the state insurance commissioner; and requires risk-based assessment of third-party service-provider controls. Retired Electronic Assets in scope (workstations, servers, backup media, and any device storing nonpublic information of insureds) must be retired under documented chain of custody with verified sanitization, and the destruction certificate must be retained as part of the program’s audit trail.
Wyoming state agencies retire IT assets under Wyoming Enterprise Technology Services (ETS) policy. The operative controls include Wyoming ETS Information Security Policy (administered by the State CIO and CISO); State Records Center Records Retention Schedules; Surplus Property under Wyo. Stat. § 9-2-1015. Public-sector retirement requires permanent removal of data before transfer or surplus, documented chain of custody, records-retention-schedule alignment for any records-bearing media, and surplus-property routing through the state’s authorized disposal channel. Private-sector enterprises that contract with the state, that operate in regulated public-sector adjacent industries (higher education, K-12, state-funded healthcare), or that subcontract to state agencies inherit these duties through contract flow-down. See Wyoming ETS policy guidance.
Wyo. Stat. § 40-12-602 prescribes the “unreadable or undecipherable” outcome standard via shredding, erasing, or modifying personal identifying information. The operative method baseline is NIST Special Publication 800-88 Revision 2 (operative September 26, 2025), which categorizes media sanitization as Clear, Purge, and Destroy. Wyoming state agencies follow Wyoming ETS Security Policy.
Wyoming-resident PII on fixed media requires the NIST 800-88 Rev. 2 Destroy outcome through physical shredding because Wyo. Stat. § 40-12-502’s breach trigger reaches unencrypted media in enterprise custody. Hard drive shredding reduces magnetic and solid-state media to particles small enough that data reconstruction is forensically impossible.
Certified data wiping aligned to NIST 800-88 Clear or Purge is appropriate where the asset is being remarketed or redeployed.
Media degaussing is the appropriate Purge method for legacy magnetic media. SSDs, NVMe, and modern flash media require cryptographic erase (Purge) or physical destruction (Destroy).
Certified media shredding covers non-drive media including optical disks, tape cartridges, USB drives, memory cards, smart cards, and any printed material containing personal information.
Wyoming has not enacted an electronics-recycling extended producer responsibility program. Enterprise IT asset retirement routes through the federal RCRA-delegated state hazardous-waste program under Wyoming DEQ Solid and Hazardous Waste Rules.
Enterprise / commercial equipment covered by the Wyoming e-waste program: NO. Wyoming has not enacted an electronics-recycling extended producer responsibility program. Enterprise IT asset retirement routes through the federal RCRA-delegated state hazardous-waste program under Wyoming DEQ Solid and Hazardous Waste Rules. Wyoming is an EPA-authorized state administering its own RCRA Subtitle C hazardous-waste program through Wyoming DEQ Solid and Hazardous Waste Rules; the state program operates at the federal floor unless explicitly more stringent.
Hazardous-waste characterization follows the federal toxicity characteristic for lead, mercury, cadmium, and chromium. Universal-waste rules cover batteries, lamps, mercury-containing equipment, and pesticides. CRT rules at 40 C.F.R. § 261.39 apply. Civil penalties run up to $10,000 per day per violation under Wyo. Stat. § 35-11-901. Generator status follows the federal VSQG / SQG / LQG framework; cradle-to-grave generator liability applies. Enterprise IT asset retirement routes through certified electronics recycling with environmental disposition records.
Server hardware and enterprise storage arrays contain operating-system data, application data, log files, configuration files with credentials, and database content. Certified server recycling covers the full asset including drive bays, controller cards, and embedded firmware storage. Every drive in the chassis must be sanitized to the Destroy category under NIST 800-88 Rev. 2 before custody transfer when protected health information, financial-account information, biometric records, or covered defense information was processed.
Certified laptop recycling and certified computer recycling route through R2v3-aligned channels combined with NIST 800-88 Rev. 2 data sanitization. Asset remarketing recovers residual value while preserving chain of custody.
Certified cell phone recycling includes verified erase of internal flash, handling of embedded SIM and eSIM material, and destruction of biometric sensor data (face geometry, fingerprint).
Secure equipment destruction covers prototypes, defective products, and regulated equipment. Product recall management, defective product destruction, and classified equipment destruction cover specialized scenarios.
Wyoming enforcement is concentrated at the Wyoming AG (breach-notification § 40-12-501 with injunctive relief under § 40-12-506; Consumer Protection Act § 40-12-113 up to $5,000 per violation with private right of action under § 40-12-108), the Wyoming Department of Insurance (Insurance Data Security Act § 26-49-101 up to $1,000 per violation under § 26-49-208), Wyoming DEQ Solid and Hazardous Waste Division (Solid and Hazardous Waste Rules violations up to $10,000/day under § 35-11-901), and federal regulators with concurrent jurisdiction.
| Statute / Authority | Civil Penalty Band | Private Right of Action | Enforcer |
|---|---|---|---|
| § 40-12-501 (breach notice) | Consumer Protection Act carryover; injunctive relief under § 40-12-506 | NO (AG-only) | WY AG |
| § 40-12-602 (records disposal) | Consumer Protection Act carryover | NO (AG-only) | WY AG |
| § 40-12-101 (Consumer Protection Act) | Up to $5,000 per violation under § 40-12-113 | YES (private right of action under § 40-12-108) | WY AG; private parties |
| § 26-49-101 (Insurance Data Security Act) | Up to $1,000 per violation under § 26-49-208 | NO (Insurance Commissioner only) | WY Department of Insurance |
| Wyoming DEQ Solid and Hazardous Waste Rules | Up to $10,000 per day per violation under § 35-11-901 | NO (Wyoming DEQ enforcement) | Wyoming DEQ |
| HIPAA (federal overlay) | Up to $2,067,813 per identical violation per year (2025 adjusted) | LIMITED (HIPAA private actions) | HHS OCR |
In addition to the Wyoming Office of the Attorney General and the Wyoming Department of Environmental Quality (Wyoming DEQ), state-level sectoral regulators hold audit and inquiry authority over IT-asset-disposition-relevant controls within their regulated populations. The Wyoming Division of Banking examines banks and credit unions for GLBA-aligned information-security-program controls. The Wyoming Department of Insurance examines insurance licensees for the written information security program required by the NAIC Insurance Data Security Act or state-equivalent. The Wyoming Department of Health examines healthcare entities for HIPAA Security Rule compliance. The Wyoming Community College Commission oversees FERPA-overlapping records and student-data-privacy duties at state institutions of higher education. The Wyoming Public Service Commission examines investor-owned utilities for customer-data-protection controls. Each sectoral regulator can issue document requests, on-site examinations, or consent orders that probe the chain-of-custody, sanitization-certificate, and environmental-disposition records produced during IT asset retirement.
Wyoming Attorney General Consumer Protection Unit enforcement under Wyo. Stat. § 40-12-105 (Consumer Protection Act, private right of action) is built from documentary evidence, and a Retired Electronic Asset without serialized destruction records is treated as a presumptive Wyo. Stat. § 40-12-501 breach trigger.
All Green Recycling operates certified IT asset disposition structured around Wyoming’s statutory duty surface. Asset pickup is scheduled with a documented chain of custody, secured transport through IT equipment packaging and transportation, certified data destruction at the receiving facility, environmental disposition through Wyoming Department of Environmental Quality (Wyoming DEQ)-authorized channels, and audit-ready reporting.
All Green Recycling’s secure data destruction service line is structured to satisfy Wyoming’s outcome standard, align to NIST SP 800-88 Rev. 2, and produce attestation documentation appropriate for sensitive data categories.
Certified electronics recycling routes retired electronic assets through Wyoming Department of Environmental Quality (Wyoming DEQ)-authorized channels and R2v3-aligned recyclers. R2v3, NAID AAA, and e-Stewards frameworks are used as reference frameworks for downstream-handler accountability.
Secure equipment destruction covers product-recall management, defective-product destruction, and classified-equipment destruction.
Reverse logistics covers multi-site enterprise pickups, manufacturer return programs, and customer-driven returns.
Every engagement produces a uniform documentation package delivered through IT asset reporting: serialized asset list, chain-of-custody log, Certificate of Data Destruction per device, Certificate of Recycling, environmental disposition record, hazardous-waste manifest where applicable, and HIPAA / GLBA / FTC Safeguards documentation entries where the federal overlay applies.
The questions below are the questions enterprise compliance, security, audit, and procurement leaders ask during vendor evaluations, RFP reviews, and breach-response planning when a Retired Electronic Asset is moving through IT Asset Disposition in Wyoming.
In the most expedient time possible under Wyo. Stat. § 40-12-502. The 2015 amendments significantly expanded the personal-information definition to include health-insurance information, medical information, biometric data, and shared user names.
Yes. Wyo. Stat. § 40-12-602 requires shredding, erasing, or otherwise modifying personal identifying information to make it unreadable or undecipherable. Certified data destruction satisfies the method-and-outcome standard.
Yes. The Wyoming Insurance Data Security Act at Wyo. Stat. § 26-49-101, effective July 1, 2022, adopts the NAIC model. Insurance licensees must maintain a written information security program with annual board certification.
No. Wyoming has not enacted a comprehensive consumer data privacy act. Disposal and breach duties operate through § 40-12-501, § 40-12-602, the Consumer Protection Act, and the Insurance Data Security Act.
Yes. The Consumer Protection Act at Wyo. Stat. § 40-12-108 provides a private right of action for actual damages and reasonable attorney fees. Civil penalties under § 40-12-113 run up to $5,000 per violation.
No. Wyoming has not enacted an electronics-recycling extended producer responsibility program. Enterprise IT asset retirement routes through Wyoming DEQ-authorized hazardous-waste channels and certified electronics recycling.
Yes. Wyoming DEQ Solid and Hazardous Waste Rules implement federal RCRA with cradle-to-grave generator liability. Wyoming DEQ enforces civil penalties up to $10,000 per day per violation under Wyo. Stat. § 35-11-901.
NIST Special Publication 800-88 Revision 2 (operative September 26, 2025) is the federal civilian baseline. Wyoming ETS Information Security Policy references NIST guidance.
Consumer Protection Act civil penalties run up to $5,000 per violation under § 40-12-113, with private right of action under § 40-12-108. Insurance Data Security Act penalties under § 26-49-208 run up to $1,000 per violation. Wyoming DEQ hazardous-waste penalties under § 35-11-901 run up to $10,000 per day.
All Green Recycling holds ISO 14001:2015 and ISO 45001:2018 certifications and operates with alignment to R2v3, NAID AAA, and e-Stewards as reference frameworks for downstream-handler accountability and certified data destruction. NIST SP 800-88 Rev. 2, HIPAA, GLBA, FTC Safeguards, FAR 52.204-21, and DFARS 252.204-7012 are operative baselines that certified IT asset disposition engagements are structured to satisfy.
Every engagement produces a documentation packet delivered through IT asset reporting: serialized asset list, chain-of-custody log, Certificate of Data Destruction per device, Certificate of Recycling, environmental disposition record, hazardous-waste manifest where applicable, and contracted-service safeguard terms.
Yes. Wyo. Stat. § 40-12-501 defines breach as unauthorized acquisition of computerized data; physical loss of unencrypted media triggers the analysis.
Yes. § 40-12-501 excludes encrypted data from the breach definition. NIST SP 800-88 Revision 2 verified sanitization removes personal information from the breach trigger.
Wyoming IT asset retirement is a layered risk-management discipline. The 2015 amendments significantly expanded the personal-information definition to include health-insurance information, medical information, biometric data, and shared user names with security questions; the Wyoming Insurance Data Security Act effective July 1, 2022 implements the NAIC model. Compliant retirement proves data was rendered unreadable or undecipherable before custody transfer, breach notice surfaced in the most expedient time possible, insurance-licensee nonpublic information was handled under § 26-49-101 controls, and hazardous fractions were handled under Wyoming DEQ rules. CPA $5,000 per-violation penalties with private right of action, Insurance Department $1,000 per-violation penalties, Wyoming DEQ daily penalties (up to $10,000), HIPAA federal overlay, FTC Disposal and Safeguards Rules, and audit-driven counterparty review converge on the same set of records.
Wyoming compliance is best treated as a continuous control posture rather than a periodic disposal event. All Green Recycling, LLC operationalizes that posture through IT asset disposition, secure data destruction, certified electronics recycling, secure equipment destruction, reverse logistics, and audit-ready reporting. Compliance, security, and procurement teams that need a Wyoming-specific audit walkthrough or an RFP-ready compliance package reach the All Green Recycling response desk at (800) 780-0347.