Erase and
Destroy Data

data destruction methods

There are 2 methods to securely remove data from IT devices. One method uses a software, the other uses physical destruction. Otherwise known as Secure Data Erasure and Data Destruction.


Data Erasure

Data within a storage device is removed using a software-based method by overwriting them. Although we refer to it here as Data Erasure, it is also known as Data Sanitization, Data Wiping, and Data Clearing to name a few.

Data Sanitization

NIST 800-88

Based on security guidelines by the National Institute of Standards and Technology (NIST).

This method aims to effectively Clear, Purge, and Destroy any and all data making them irretrievable.

  • Most Recommended Method
  • Disk is Safe to Reuse
  • Hard Disk Drive (HDD)
  • Solid State Drive (SSD)
  • Mobile Devices
  • USB Drives
  • New and Developing Technologies
  • Benefits List is Non-Exhaustive

Military Grade Wiping

DoD 5220.22-M

First introduced by the Department of Defense (DoD). This method overwrites existing information on individual sectors of the hard disk. This prevents any data recovery using commercially available processes. 

DoD 3 or 7-Pass Wipe implements:

  • Pass 1: Writes a '0' and verifies
  • Pass 2: Writes a '1' and verifies
  • Pass 3: Writes randomly & verifies
  • Repeat for 7-Pass Wipe

So why is it only 4.5 stars?

  • Has issues with SSD devices
  • Time consuming process

Basic Reformatting

Free or Paid Software

Formatting a disk creates a new and blank indexing scheme which makes every sector available to write new files. It does not erase the data on the disk. A specialist using free or paid tools could still recover most or all of the stored data.

  • Clears disk for new files
  • Time consuming process
  • Viruses could still remain
  • Data is recoverable
  • Non-compliant method
  • Long-term reputation risk
  • Long-term financial risk
  • High risk to data breach

Data Destruction

Known more commonly as physical destruction of hard disks, this method takes its terms literally. Data Destruction is achieved by mechanically altering a storage device or IT equipment's physical characteristics. 

TV screen static michael-dziedzic-0W4XLGITrHg-unsplash-small

Degaussing

Demagnetiser

This method removes data by rearranging the device's magnetic field. Not all degaussers can delete data permanently as it requires a stronger magnetic field than the disks' coercivity.

  • Rapid sanitization process
  • Audit compliant
  • Proven solution when done right
  • Secure method for brand reputation
  • Works with un-erasable disks
  • Reduces data breach risks
  • Hard disk cannot be reused
  • Does not work with SSDs
  • No value for the original hardware
shredded paper username-5948556_640

Shredding/Disintegrating

Hard Disk Shredder

This method shreds the equipment into small pieces or disintegrates them into minuscule particles. Unless the disk is overwritten beforehand, data can still be recovered by determined experts using forensic recovery tools.

  • Audit compliant
  • Proven solution when done right
  • Reduces data breach risks
  • Works with any type of hard disk
  • Hard disk cannot be reused
  • Difficult to monitor or track
  • Not environmentally-friendly
  • No value for the original hardware

Burning or Melting

Incinerators

Not recommended. This effort is more dangerous and risky than it is beneficial.  

Destroying a computer hard drive

Drilling or Crushing

Household Tools

Not recommended. This effort is more dangerous and risky than it is beneficial. Data is still easily recoverable.


Steps to how we work


Step 1: Audit and Inspection

Congratulations! You've determined to retire your unused IT assets. Once you've scheduled a meeting with one of our representatives, we will work closely with you on the following:

  1. 1
    Logistics and Decommissioning
  2. 2
    IT Asset Audit
  3. 3
    Mobile Device Audit
  4. 4
    Ascertaining Security Risks and Procedures

Step 2: Security Services

Once we've audited your IT assets, we can now move to the secure decommissioning process. That includes taking extra precautionary steps.


We have security procedures in place against threats that might harm your brand's reputationWe'll discuss this detail in private.

Step 3: Accreditation

We'll supply you with full audit reports and documentation. This includes tailored reports needed by your Head of Departments. Should your Finance or Compliance team need specific contracts, we've got that ready too.

Step 4: Adaptive Green Solutions

You can choose from a range of sustainable and environmentally-friendly solutions for your retired IT assets. Here's an example:

  1. 1
    Recycling for 'Beyond Economic Repair' Equipment
  2. 2
    IT Asset Remarketing
  3. 3
    Employee Buyback Programmes
  4. 4
    IT Asset Donation and Deployment Programmes

why choose us

SPW as your IT Asset Management Partner

We guarantee you peace of mind when you dispose or repurpose your IT assets and data.

View our credentials

iso-certified

E37637

JA000598 | ARES/TW/12010095Q

JA000599 | ARES/TW/12010095E

SH000596 | ARES/TW/12010095S

industry partners

ministry approved

ministry of finance malaysia khazanah treasury

K10139579993239881

ministry of finance singapore

200810328C

WDL-22-09-0005

trusted by

SPW is trusted by over 1k+ brands including Fortune 500 companies.

  • Partnerships & Certifications

  • Environmental Commitment

  • Social Responsibility

JA000598 | ARES/TW/12010095Q

ISO 9001

Quality Management System

JA000599 | ARES/TW/12010095E

ISO 14001

Effective Environmental Management System

SH000596 | ARES/TW/12010095S

ISO 45001

Occupational Health and Safety

Edit your caption text here

I-SIGMA®

International Secure Information Gov. & Mgmt.

E37637

BIZ SAFE

Achievement in WSH and Risk Management

blancco itad gold partner

Edit your caption text here

BLANCCO

Gold Partner for Secure Data Erasure

WipeDrive Enterprise (PRNewsFoto/WhiteCanyon Software)

Edit your caption text here

WIPE DRIVE

Security Software for Permanent Deletion

WDL-22-09-0005

NEA

General Waste Disposal Facility Licence

Other Services

Auditing can be daunting and overwhelming. Let us help you audit your IT assets either on-site at your premise or off-site at our facilities.

Our goal is to refurbish and recycle used IT equipment safely. All while protecting your company data and the environment.

Keep your budget committee happy and have a strategy in place. As a global remarketer, we can extract the best value for you.

Moving across city, state, or country lines? We can get it done for you safely and securely from rack-to-rack. 

Want to do your part for the community? We'll help you achieve your CSR goals while ensuring your equipment are safe to deploy.

Every phase in IT lifecycle management comes with its associated risks. We have stringent measures in place for each critical juncture.

Don't know where to start?

Explore our most popular learning topics. 

women computer research arlington-research-nFLmPAf9dVc-unsplash

April 22, 2024

The rapid growth of electronic waste has become ...

June 1, 2023

As technology continues to advance, the need for ...

May 30, 2023

In today's digital age, proper disposal of sensitive ...

Have a question? We're a message away.

× How can I help you?