PROTECT YOUR BUSINESS AND STAY COMPLIANT

Data Destruction

Why EDM?

EDM Recycling is committed to establishing long-term partnerships with our clients. We work side by side with you to design, implement, operate, and monitor your IT Asset Disposition programs. We offer a full chain-of-custody solution that tracks each asset from arrival to destruction.  We utilize the following operating standards when destroying data:

  • Conformance with U.S. Department of Defense (DoD) data destruction standards
  • DoD 5220.22-M

  • NIST 800-88

  • Support of all types of hard drive subsystems: IDE, SCSI, ATA, Fibre Channel, SATA, and SAS

  • Detailed reporting and chain of custody options

Our Process

EDM provides three distinct data destruction options: Data Erasure, Hard Drive Crushing, and Hard Drive Shredding. Our experts help facilitate comprehensive data destruction and electronic recycling. We provide asset serial number reporting and a certificate of destruction report on the same day of service. Clients can track the status of their materials via our secure portal.

Secure Transportation

We transport the sensitive materials securely in GPS tracked transportation.

Receive Equipment

Receive and transfer to designated secure storage area.

Wipe Data

Certify 100% erasure of data using DOD standard software

Shred Hard Drive

Hard drives are physically destroyed through designated machine

Issue Certification

Destruction certifications and detailed disposition report are issued.

Your questions answered

FAQ Data Destruction

Data wiping is the permanent removal of data from a data carrier in a computer, laptop, server or any other hardware, among others. This can be done for various reasons, such as to protect data from unauthorised access, to comply with regulations (GDPR), or if you want to redeploy the IT equipment within your own organisation or when selling or donating it.

Data wiping is important for several reasons:

  1. First, it helps protect your business data from unauthorised access. If data is not erased properly, it can be used by cybercriminals.
  2. Secondly, data wiping may be required by regulations. Many regulations, such as the General Data Protection Regulation (GDPR), require organisations to securely erase data when it is no longer needed.
  3. Thirdly, data wiping is used to repurpose hardware securely within one’s own organisation or by selling or donating it for a second life.

Data wiping involves erasing data from the data carrier by means of software. This is the most circular option because the data carrier is reusable after this. Since the data is not recoverable, you can reuse or sell the data carrier itself.

In data destruction, a data carrier is physically destroyed by the shredder. As a result, the data cannot be recovered, but the data carrier is also no longer usable.

Data erasure is critical for businesses to protect sensitive information and maintain cybersecurity. Here’s why:

  • Ensures compliance with data protection laws like GDPR, CCPA, and HIPAA
  • Prevents data breaches and reduces the risk of costly cyber attacks
  • Safeguards company and customer data from unauthorized access
  • Allows safe disposal or resale of IT assets without data leakage
  • Protects brand reputation by demonstrating commitment to data security
  • Mitigates legal and financial risks associated with data mishandling
  • Supports environmental sustainability through proper e-waste management
  • Enables secure cloud migrations and data center decommissioning
  • Maintains customer trust and loyalty through responsible data practices
LET'S MAKE IT CIRCULAR

Want to know how to make your IT circular?