Compliant & Secure Hard Drive Destruction
protecting client’s and their customers
Today there are various methods used to erase a hard drive: overwriting, degaussing, and physical destruction. Each method can be effective.
A difference in the destruction methods are:
Overwriting allows reuse of the hard drive. If there are any sectors that could not be overwritten or was improperly done, and the hard drive is sold, the personal identified data is accessible.
Degaussing a hard drive renders the drive usable. All proprietary information (PI), personal identifying information (PII), protected health information (PHI), and electronic protected health information (e-PHI) data is completely destroyed.
Proper physical destruction of a hard drive prevents the retrieval of any data.
Our compliant and secure hard drive destruction method consist of a unique 2-step process. The first step of degaussing is compliant with the government and industry standards requiring complete erasure of sensitive data prior to disposal for:
- DOD (Emergency Destruction)
- HIPAA (Health Information Portability and Accountability Act)
- IRS 1075
- California Senate Bill 1386
- GDPR (General Data Protection Regulation)
- GLBA (Gramm-Leach-Bliley Act)
- NIST SP 800-88r1
- PCI DSS 3.2 (Payment Card Industry Data Security Standard)
- PIPEDA (Personal Information Protection and Electronic
The second step requires the use of a NSA approved Hard Drive / Solid-State destroyer. The end results is our Clients customer’s data is completely destroyed!
For regulatory compliance, we request Clients to sign a Confidential Data Destruction Agreement and, if appropriate, a HIPAA Business Associate Agreement.