← Back to Resources

IT Logistics Glossary

Plain-language definitions for the certifications, standards, regulations, and technical terms you will encounter when planning a data center migration, decommission, or IT asset disposition project.

Compliance & Regulatory

CCPACalifornia Consumer Privacy Act
California state law giving consumers rights over their personal data, including the right to have it deleted. For IT asset disposal, CCPA requires that personal information stored on hardware be disposed of in a way that renders it unreadable and unrecoverable.
CFRCode of Federal Regulations
The official body of rules published by US federal agencies. When you see a citation like "45 CFR § 164.310," it references a specific rule in the Code of Federal Regulations. HIPAA's security requirements, for example, live at 45 CFR Part 164.
CPRACalifornia Privacy Rights Act
The 2023 expansion of CCPA that strengthened consumer data rights and created the California Privacy Protection Agency (CPPA) as an enforcement body. It raised the bar for how businesses must handle — and dispose of — personal data.
FedRAMPFederal Risk and Authorization Management Program
A US government program that standardizes security requirements for cloud services used by federal agencies. Vendors serving government clients often need FedRAMP authorization, which includes strict data handling and disposal controls.
GDPRGeneral Data Protection Regulation
European Union privacy law requiring organizations to protect personal data and document how it is stored, processed, and destroyed. US companies that handle data from EU residents must comply. For IT disposal, GDPR requires verifiable data destruction and records of that destruction.
HIPAAHealth Insurance Portability and Accountability Act
US federal law that governs the protection of patients' medical information (PHI). For IT logistics, HIPAA requires that any hardware storing protected health information be handled, transported, and disposed of with documented chain-of-custody and certified data destruction.
PCI-DSSPayment Card Industry Data Security Standard
A global security standard that any organization handling credit or debit card data must follow. Requirement 9.8 specifically covers the destruction of storage media containing cardholder data — physical shredding or secure electronic wiping, with documentation.
SOXSarbanes-Oxley Act
US federal law requiring publicly traded companies to maintain accurate financial records and implement strong internal controls. For IT asset disposal, SOX mandates that records — including those stored on electronic media — are retained according to schedule and destroyed only with documented evidence.

Certifications

BICSIBuilding Industry Consulting Service International
A professional organization that provides education and credentials for information and communications technology (ICT) professionals. BICSI credentials (such as RCDD) indicate expertise in structured cabling, data center design, and infrastructure installation — relevant when evaluating rack-and-stack technical teams.
CTPATCustoms-Trade Partnership Against Terrorism
A US Customs and Border Protection (CBP) voluntary partnership program designed to strengthen international supply chain security. CTPAT certified companies have reviewed and improved their supply chain security practices against CBP standards. More relevant for import/export logistics than purely domestic transport.
DCCAData Center Certified Associate
An entry-level certification for data center professionals, typically covering physical infrastructure, power, cooling, cabling, and safety. It indicates foundational knowledge of data center operations — a useful credential to look for in rack-and-stack technicians.
ISOInternational Organization for Standardization
The global body that publishes internationally recognized standards across industries. In IT logistics, the most relevant ISO standards are ISO 27001 (information security) and ISO 9001 (quality management). Certification means an organization's processes have been independently audited against that standard.
ISO 27001ISO/IEC 27001 — Information Security Management
An international standard that defines requirements for an information security management system (ISMS). ISO 27001 certified vendors have had their information security processes independently audited. Relevant for any logistics or ITAD vendor handling your data-bearing assets.
NAIDNational Association for Information Destruction
The trade organization that sets standards for the secure destruction of information in all its forms. NAID AAA Certification is the industry's highest credential for data destruction vendors — it requires unannounced audits of the vendor's actual destruction process, not just self-reporting.
R2Responsible Recycling (R2 Certification)
An internationally recognized certification for electronics recyclers. R2-certified facilities meet documented standards for data security, environmental compliance, and worker safety when processing end-of-life IT equipment. If your vendor recycles equipment, R2 (or e-Stewards) certification is the minimum standard to require.
SOC 2Service Organization Control 2
An auditing standard developed by the AICPA that evaluates how a service organization manages customer data across five trust principles: security, availability, processing integrity, confidentiality, and privacy. SOC 2 Type II reports indicate that controls were tested over a period of time (typically 6-12 months), not just at a single point.
TAPATransported Asset Protection Association
A global trade association that develops security standards for the supply chain transport of high-value goods. TAPA certification (including TSR for trucking) is widely recognized as the benchmark for secure cargo transport — particularly for IT hardware and electronics.
TSRTrucking Security Requirements (TAPA TSR)
TAPA's specific certification standard for road transport of high-value cargo. TSR Level A is the highest level, requiring GPS real-time tracking, tamper detection, defined driver security protocols, and third-party audits. It is increasingly required by enterprise and hyperscale clients for IT equipment shipments.

Industry Standards

NISTNational Institute of Standards and Technology
A US federal agency that develops technology standards and guidelines. For IT asset disposal, NIST Special Publication 800-88 ("Guidelines for Media Sanitization") is the most referenced standard — it defines three levels of data destruction (Clear, Purge, Destroy) and specifies which method applies to each type of storage media.
NIST 800-88NIST Special Publication 800-88 — Guidelines for Media Sanitization
The definitive federal standard for securely sanitizing (wiping or destroying) storage media. It defines three sanitization levels: Clear (software overwrite), Purge (degaussing, cryptographic erase, or secure erase commands), and Destroy (physical destruction). Referenced by HIPAA, PCI-DSS, SOX, FedRAMP, and most enterprise security frameworks.

Security & Data

ESDElectrostatic Discharge
The sudden flow of electricity between two objects at different electrical potentials — like static electricity. ESD can permanently damage sensitive electronics, including server components, memory modules, and SSDs. Professional IT logistics providers use anti-static packaging, wrist straps, and ESD-safe work surfaces when handling equipment.
PHIProtected Health Information
Any health information that can identify a patient — medical records, diagnoses, treatment data, billing information — that is created, received, stored, or transmitted by a HIPAA-covered entity. Storage media containing PHI must be disposed of with NIST 800-88 Purge or Destroy-level sanitization and a documented certificate of destruction.
PIIPersonally Identifiable Information
Any data that can be used to identify a specific individual — names, Social Security numbers, addresses, email addresses, financial account numbers, and more. Storage media containing PII is subject to data disposal requirements under CCPA, GDPR, HIPAA, and most state privacy laws.
QSAQualified Security Assessor
A cybersecurity company or individual certified by the PCI Security Standards Council to assess merchant and service provider compliance with PCI-DSS. QSAs conduct the formal audits that result in PCI-DSS compliance certifications. If your organization handles cardholder data, your QSA will likely review your IT asset disposal process.

Equipment & Technology

HDDHard Disk Drive
A traditional mechanical storage device that stores data on spinning magnetic platters. HDDs can be sanitized via degaussing (destroying the magnetic field) or physical shredding. Unlike SSDs, degaussing an HDD renders it permanently inoperable — which is fine for disposal but means degaussed drives cannot be reused.
KVMKeyboard, Video, Mouse (Switch)
A hardware device that allows a single keyboard, monitor, and mouse to control multiple computers or servers. KVM switches are commonly found in data center rack environments and are included in rack inventories during decommissioning. Some KVM switches store configuration data that should be wiped before disposal.
NVMeNon-Volatile Memory Express
A high-speed storage protocol and form factor used in modern enterprise and consumer SSDs. NVMe drives connect directly to a server's CPU via PCIe lanes, making them significantly faster than traditional SSDs. From a data security standpoint, NVMe drives require the same sanitization approach as SSDs — cryptographic erase or physical destruction.
PBXPrivate Branch Exchange
A telephone switching system used within a business to route internal and external phone calls. PBX systems are common in office environments and are typically decommissioned as part of office IT teardowns. Modern IP-PBX systems may store call logs and voicemail data that require secure wiping before disposal.
SSDSolid-State Drive
A storage device that uses flash memory chips instead of spinning magnetic platters. SSDs cannot be sanitized by degaussing — there is no magnetic field to destroy. Proper sanitization requires cryptographic erase (for self-encrypting drives), manufacturer-specific secure erase commands, or physical shredding/destruction.
UPSUninterruptible Power Supply
A battery backup system that provides emergency power to connected equipment when the main power source fails. UPS units are standard in data centers and server rooms. They contain large batteries that require specialized disposal due to environmental regulations — they should not be included in standard IT equipment recycling.

Logistics

DNSDomain Name System
The internet's "phone book" — it translates human-readable domain names (like powerroute.com) into the IP addresses computers use to communicate. During a data center migration, DNS records for affected systems must be updated as part of the cutover process. Reducing DNS TTL (Time to Live) before a migration speeds up propagation of those changes globally.
DRDisaster Recovery
The set of policies, tools, and procedures to enable recovery of critical IT infrastructure after a disruption — hardware failure, natural disaster, cyberattack, or facility loss. DR planning often involves establishing a secondary data center site, which requires the same specialist logistics capabilities as a primary deployment.
GPSGlobal Positioning System
Satellite-based navigation technology that provides real-time location tracking. In IT logistics, GPS tracking on transport vehicles is a security baseline — it enables real-time monitoring of equipment in transit, geofence alerting for route deviations, and documentation of chain-of-custody during transport. TAPA TSR requires GPS tracking on vehicles moving high-value cargo.
ITADIT Asset Disposition
The business of managing end-of-life IT equipment responsibly — including data destruction, value recovery through remarketing, and certified recycling. A legitimate ITAD provider issues serialized certificates of destruction and holds recognized certifications like NAID AAA, R2, and e-Stewards. ITAD is not the same as "throwing old hardware away."
SLAService Level Agreement
A formal commitment between a service provider and a client that defines the expected level of service — response times, uptime guarantees, on-time delivery rates, and remedies if those standards are not met. Always get SLA terms in writing before engaging a logistics or ITAD vendor for critical equipment.

Ready to Move Beyond the Research?

We match you with certified, vetted IT logistics providers in under 2 hours. Free, no obligation.

Get Your Free Match