In this age of technology, we all know that merely deleting a digital record or file will be insufficient to destroy the information contained therein – as the underlying digital data are typically still preserved in the system and can often be “undeleted.” At HK Liquidations we understand the liability concerns that places on corporations and business owners to ensure that sensitive information and documents stay protected. There are specific technical methods that must be used to properly dispose of data to ensure that no information can be recovered. The destruction methods used in the process of destroying data should be based on the risk posed by the sensitivity of the data being destroyed and the potential impact of unauthorized disclosure. At HKLiquidations we offer several methods of data destruction that are listed below. Our staff can assist you in choosing the method that best suits your company’s needs.
Hard Drive Shredding – Which entails the hard drive or media itself, being placed inside a high powered shredding device, ensuring complete destruction, and eliminating the possibility of the media being lost, stolen, or winding up in the wrong hands. The process reduces the media or hard drive down to a commodity (particles, fragments, or small parts rendering the media object virtually unrecognizable).
Degausing – Is the process of using an industrial strength magnetic process that is applied to hard drives or magnetic storage devises that ensures all data is completely wiped magnetically. Degausing is often coupled with Hard Drive Shredding as a means of providing an unfailing method of completely wiping hard drives and other media storage.
3 to 7 Wipe Sanitization – The sanitizing process erases data then records random data over the erased data multiple times in random sequence. This process results in causing the erased data to be unrecognizable and unreadable and is done to DOD 5220.22-M standard (Department of Defense), this is typically performed for reusable drives.
Call today @ 214-997-3083 to discuss: the best way to keep your data safe, how to avoid identity theft, and how to best manage your data erasure options.