Data Destruction Best Practices
Secure and Compliant Process
Our Secure Data Destruction Process
Data protection is the most critical issue to address when planning your IT decommissioning process. Therefore, we have designed information destruction solutions to comply with best practices detailed by NAID, NIST 800-88 and SOC auditors.
On-Site Data Destruction
Hard drives, SSDs and/or backup tapes are moved from your data center to our shredding truck for processing. This practice allows you to witness and verify that drives have been recorded and truly been destroyed.
Hard drives pulled from servers, storage arrays and computers are staged into our scanning area. Once collected, drives are scanned and inventoried for a detailed Certificate of Destruction report.
NIST 800-88 requirements go a step beyond capturing the hard drive serial number. Compliance with NIST requires linking the hard drive to the associated computer. See details below in the Certificate of Destruction Report.
Physically Destroy Drives
Hard drives are then destroyed at a rate of 1,000 PC drives per hour. Physically destroying hard drives for data destruction satisfies NIST 800-88 and all other data privacy laws such as HIPAA.
Certificate of Destruction
ur Certificate of Destruction details quantity and type of digital destroyed, serial number, location, and company personnel that witness the process.
NIST 800-88 Certificate of Destruction report requires, among other details, a link between the hard drive being destroyed and the computer from which is resided. This information includes the make and model of the hard drive as well as the source computer.
Our secure processes help organizations limit liability by complying with