Nationwide computer disposal. Secure data destruction and computer recycling
Commputer recycling Destroying your Data.....
Protecting the Environment    

Secure Data Destruction - Data Security

The High Cost Of Data Loss

As computers and other electronic devices become obsolete sooner due to new technology, disposal of sensitive information is of serious concern. Just one hard drive or CD can contain thousands of files, and when a digital file is “deleted,” the information actually remains on the computer’s hard drive, CD or diskette, as do deleted e-mail messages and records of all online activity.

  1. Ensure your (sensitive information) Data is correctly & effectively removed.

  2. Collection and removal of old equipment can also be arranged for you.

These days Data can be recovered with tools from the Internet.

How many ways are there to expose sensitive personal data? One company misplaced a backup tape; MoD - Top Secret Data left on train, another puts customers' Social Security numbers onto mailing labels for anyone to see. Others lose laptops, inadvertently post private information online, or leave documents exposed to prying eyes. The possibilities are endless, as we're learning with every new revelation of a data breach or hack or inexcusable lapse in secure business practices. By one estimate, 53 million people, including consumers, employees, students, and patients, have had data about themselves exposed over the past 13 months.

Data security is an ongoing process, but by being aware of threats and understanding destruction options, you will be in a much better position to protect your business and yourself.

So how does this help you - well for some businesses, the peace of mind that comes from knowing sensitive records will never leave their facilities intact makes the choice of using an On-site Data Destruction Service worthwhile.

These businesses may choose to outsource such destruction. Outsourcing can be affordable and safe when done properly. If you choose this option, be sure to do your homework. Ask what methods will be used, where your items will be kept prior to destruction, what happens to destroyed waste, and what proof you will get that items were actually destroyed. If you do not like the answer to any of these questions, look for another source.

If you would like further information on Data Destruction - please call us on 0870 727 1578, or click here to email or make a request here

The chart  below lists some obvious and not-so-obvious items that could cause significant problems if not disposed of properly.

All of these items can be made secure by one of three methods:
 

  • Shear - Cuts a Hard Drive into two, putting the HDD beyond use. (see Shear in action).

  • Shredding – Reducing to small strips via a paper shredder or Industrial shredder.

  • Degaussing – Using powerful magnets to permanently eliminate data from magnetic media.

  • Disintegration – “Mechanical Disintegration” that continually cuts items into smaller and smaller pieces until they are unrecognizable and unreconstructible.

ITEM

THREAT

METHOD OF DESTRUCTION

Computer Hard Disk Drives

Data Theft — Documents, Spreadsheets, Databases, etc.

Shearing - Disintegration or  Degaussing

Thumb Drives/Flash Drives/Memory Cards

Data Theft — Documents, Spreadsheets, Databases, etc.

Disintegration or Degaussing

Cell Phones/Blackberries & other PDA's

Data Theft — Contact Lists, Call Logs, Images, etc.

Disintegration

Optical Media — CDs/DVDs

Data Theft

Disintegration

Other Magnetic Media — Floppy Disks, Zip Disks, Computer Backup Tapes

Data Theft

Disintegration or Degaussing

Expired Inventory, Off-Spec Products, Prototypes

Corporate Liability,  Brand Degradation, Industrial Espionage

Disintegration

Credit Cards/ID Badges

I.D Theft — Data on Magnetic Strip

Paper Shredding (Low Volume)

Disintegration (High Volume)

Audio, Video & Micro Cassettes

Meeting Records, Sales Aids/Training Materials

Disintegration

Laser Printers & FAX Machines

Data Theft — Remnant Data on Drums & Internal Memory

Disintegration


Copyright 2003-2009 secure-data-destruction.eu