A Basic standard practice of Data Destruction consists of either wiping or dismantling for precious metals based on the type and value of the drive. Many customers however prefer optional on/off site services that are are inventoried for their records. We assist with hospital data destruction, bank tape degaussing, fortune 500 hard drive shredding, telecom hard drive wiping, IT companies and more with their Data Destruction Needs.
We recognize that data security is an equally critical part of Responsible Recycling as zero land filling and preventing toxic scrap from illegal export. E-Waste Solutions also offers customers (on request for a small fee) an onsite hard drive perforating or “punching” service and the drives are shredded once returned to the facility. Finally, upon processing your data/media storage equipment your company will receive by mail a ‘Certificate of Destruction’ which applies to the hard drives and other storage media as well as the equipment itself.
*The DoD 5220.22-M sanitization method was originally defined by the US National Industrial Security Program (NISP) in the National Industrial Security Program Operating Manual (NISPOM)
- We wipe all HD's as a standard Data Destruction procedure. HD's that are too old or cannot me wiped get prepped for dismantling and refining for precious metals.
- This process is guarantees your data is completely destroyed and cannot be accesed.
- When ordering any of our data destruction services you will need to fall under some kind of Compliance measure. We can full itemize your items serial numbers on the certificates for your records.
- We can also itemize every single item picked up for yours records.
- This Process involves using equipment and punching through the outer core of the drive into the actual discs which destroys the drive!
- Hard Drives that are properly punched get prepped for dismantling and ultimately refining for precious metals.
- Hipaa & Facta Compliant Data Destruction Service when completed on facility location.
- When the degausser is applied to magnetic domains the information is scrambled into random patterns, making the data stored in the magnetic domain unreadable.