Securing the Network: The Imperative of Data Erasure in IT Asset Disposal