secure data destruction

Secure Data Destruction

Information in old computers or other data storage devices is considered a significant source of identity theft and confidential corporate information. Under the umbrella of an increasing number of federal and state laws and regulations, virtually every organization has a statutory obligation to protect personal information of its employees, its clients and confidential financial information. Companies that do not have an end-of-life and recycling policy for their obsolete or non functioning IT assets in place, are placing the privacy of their employees, partners and customers at severe risk.

Too often, in an effort to keep operational expenses low, companies rely on data deletion and disk formatting as means of destroying sensitive data. Tech-savvy thieves understand this and therefore can collect sensitive information that can be used to their benefit. What results, is a flurry of negative reactions to the organization that though their vital information was destroyed. Litigation issues, financial risks and many other problems resulting from recovered data can quickly bring a fortuitous company to the brink of devastation.

When a company no longer has a need for their obsolete or non-functioning equipments, before being donated to charity, offered to employees or recycle, it is extremely important that complete data erasure, disk sanitization or physical destruction be successfully conducted. This prevents sensitive information from being viewed or collected by persons unauthorized and ensures legal and security accountability.

What types of businesses should exercise Secure Data Destruction?

Every business that values their and their customers privacy and security should have a data destruction policy in place. Every key decision-maker of enterprise or organization must provide secure data destruction in order to ensure that all sensitive business data is effectively eliminated from any and all storage media before its disposal for whatever reasons; recycling, re-marketing a computer or returning a PC that was leased.

How can Complete Data Destruction be Attained?

Complete Data Destruction can be performed in-house by personnel within the organizations IT department or the task can be outsourced to a reputable IT asset management company. While many companies may feel compelled to save money by allowing their own employees to handle the Data Destruction, this often fails to meet the “checks and balances” demand of business. To ensure Secure Data Destruction, there needs to be a policy in place that guarantees accountability and accuracy.

Methods of Secure Data Erasure/Destruction

Effective Secure Data Destruction should meet or exceed the D.O.D 5220.22-M standards. When Data Destruction Services are performed to these particular sets of standards, companies can be ensured that their information is safely destroyed and that the drives are either rendered unreadable, cleansed (meaning that the drives can be re-used) or physically destroyed.

E-Cycling Puerto Rico Secure Data Destruction Methods Includes:

Data Erasure Software

Our Software-based US DOD 5220.22 compliance data erasure is considered one of the most effective ways of erasing recorded data from computer hardware. The data wiping software records information such as: drive size, unit serial numbers, processor speed etc. thereby providing a database record of all units it wipes. This means that the results are completely documented and fully auditable, thus adding an extra layer of security for the company that's having the service performed.

In-House or On-Site HDD’s Physical Destruction

Crushing hard drives can also be implemented as part of a larger data destruction strategy. If there is a time-gap between pick-up of the equipment and the actual physical destruction of it, a hard drive crusher can be used on-site as a security tactic to render the drives inoperable in the meantime. This process safeguards the company and adds an extra layer of security and protection. We can perform the service at our facilities as well.


Hard drive degaussing is the process of rendering a hard drive completely unreadable through the use of powerful electromagnets. Once degaussed, the hard drive is useless and it cannot be sold, re-used or donated. For most companies, hard drive degaussing is part of a comprehensive plan to eliminate recorded data such as patient files, financial information or other sensitive or confidential material.

Our Secure Data Destruction services offer the following benefits:
  • US DOD 5220.22 Compliance
  • Asset Tag and Serial Number Recovery / Removal
  • Chain of custody documentation
  • Secure asset tracking and logistics
  • Environmentally responsible disposal
In addition, E-Cycling Secure Data Destruction services meet or exceed all industry-specific regulations, including:
  • FACTA (Fair and Accurate Credit Transactions Act)
  • GLB (Gramm-Leach Bliley) - banking and financial institutions
  • HIPPA (Health Insurance Portability and Accountability Act) - the health care industry
  • SOX (The Sarbanes-Oxley Act)
Contact Information

(787) 285.5686

(787) 285.5687

Postal Address:
PO Box 8830
Humacao, PR 00792-8830

Physical Address:
Road #3 KM 85.06
Industrial Park Cataño
Humacao, PR 00792-8830 

Visit our Contact Page

Free Newsletter