After being replaced, used hardware has to be disposed of. Frequently used hardware are fully operational, but contain data which may not be made public or would have adverse effects if disclosed. Moreover, the Regulation of the European Parliament and of the Council (EU) 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC and country-specific regulations impose further requirements to better protect the data of clients, employees or partners.
The first step of the audit consist in defining the condition and suitability of hardware. In the scope of audit services, Secure Data Recycling IT offers to:
Upon the audit performance, the client receives full information on the hardware held, which may also serve to define the value hereof.
Based on the information received from the client and the audit carried out, the scope of order and the date of order performance is defined. Secure Data Recycling IT can also offer to act as intermediary in the sale of hardware from which data were wiped, and ensure warranty and post-warranty service. Data can be erased using software or else physically destroyed in a Secure Data Recycling IT branch, or at the Client’s premises using the mobile headquarters.
If required, hardware is collected using the means of transportation belonging to Secure Data Recycling IT having diversified fleet at its disposal, also including Mercedes Actros and Mercedes Sprinter, capable of collecting shipments of various size. Hardware can be collected from several locations at the same time. Full logistic control during transport and at the Client’s premises enhances safety in the entire data erasure process chain. The Client can control the entrusted hardware (video and gps) in each process step. Secure Data Recycling IT transports received data carriers in sealed containers, opened and closed in the presence of Your representatives. In case of their absence, we video record the entire process.
We own fully secured rooms to perform works related to data deletion. The building is continuously monitored using cameras and alarm systems. Our employees are obliged to keep company secret and act according to detailed safety procedures. In addition, the entire data deletion process is registered using video equipment.
With Secure Data Recycling IT software by White Canyon and Blancco partners, data can be wiped directly from the received hardware. Data can be erased from HDD, SSD, any type of mobile devises, servers etc. Works are performed maintaining the highest security level or directly at the client’s. Upon the client’s request, data carriers may also be physically destroyed using RS30 shredder manufactured by Austrian UNTHA, and meeting H5 level of DIN 66399 standard, with a prior carrier demagnetisation.
Tamper-proof reports are generated for data erased using the software to confirm the order performance in compliance with the most rigorous security procedures. With Blancco Management Console data erasure reports are centrally managed and made available to persons responsible for data protection and authorised by the Client.