According to the Privacy Rights Clearinghouse, since January 2005 there have been more than 252 millions records containing sensitive personal information compromised because of security breaches in the U.S.
Most of these breaches were because of the loss of computer equipment, more specifically the hard drive. When a laptop is stolen, chances are the information contained on its hard drive is worth a lot more than the value of the computer itself. And thousands of laptops are stolen each year.
The Opal specification outlines minimum requirements for storage devices used in the PC client and enterprise markets. It outlines for vendors the required and optional TCG capabilities and specifies how to activate and customize the trusted storage device.
The Enterprise Security Subsystem Class Specification focuses on storage devices used in data centers and high-volume applications, where high performance is required. The specification defines encryption of data on media and enables support for strong access control to support organizational security.
Finally, the Storage Interface Interactions Specification specifies how the TCG's existing Storage Core Specifications interact with other specifications and standards for storage interfaces and transports. In short, it enables interoperability of trusted drives with existing hardware.
This is especially important as currently storage hardware vendors have already been using proprietary self-encrypting methods on hard drives. For example, Seagate useswhile Hitachi uses .
According to TCG, so far, most major storage vendors have announced their support, either fully or in part, to the group's new set of specification. These vendors include: Hitachi, Seagate, Toshiba, and Fujitsu.