Data Destruction Process

The Chain-of-Custody is critical

The Four Keys to a secure data destruction process

The Chain-of-Custody is critical to remain in compliance with data privacy laws.  Deciding which hard drive needs to be destroyed on-site vs off-site requires the organization to classify the data’s confidentiality status.  This is an almost  impossible task.  We suggest following the four keys steps in destroying all of your data.

On-site so you can Witness and Verify.

Hard drives, SSDs and/or backup tapes are moved from your data center to our shredding truck for processing.  This practice allows you to witness and verify that drives have been recorded and truly been destroyed.

Hard drive shredding in Pasadena, CA
Scanning serial numbers for NIST 800-88 Compliant Data Destruction

Inventory Media for Documentation

Hard drives pulled from servers, storage arrays and computers are staged into our scanning area.  Once collected, drives are scanned and inventoried for a detailed Certificate of Destruction report.

NIST 800-88 requirements go a step beyond capturing the hard drive serial number.  Compliance with NIST requires linking the hard drive to the associated computer.  See details below in the Certificate of Destruction Report.

Physcially Destroy drives

Hard drives are then destroyed at a rate of 1,000 PC drives per hour.  Physically destroying hard drives for data destruction satisfies NIST 800-88 and all other data privacy laws such as HIPAA

Shredded hard drives shown with shredding cutters

certificate of destruction

Our Certificate of Destruction details quantity  and type of digital destroyed, serial number, location,  and company personnel that witness the process.

NIST 800-88 Certificate of Destruction report requires, among other details, a link between the hard drive being destroyed and the computer from which is resided.  This information includes the make and model of the hard drive as well as the source computer.

request a quote from our experts in certified data destruction