
CERTIFIED DATA WIPING & DESTRUCTION
This process is specifically aimed at securely wiping and destroying data on end-of-life IT assets while providing certified documentation for clients.
Secure, Compliant, and Verified Data Erasure for
End-of-Life IT Assets
1. Initial Client Consultation and Assessment
Understand client requirements and compliance standards.
​
-
Steps:
-
Discuss the client’s data security needs, type of data storage devices, and regulatory standards (e.g., GDPR, HIPAA).
-
Identify required levels of data destruction (e.g., data wiping vs. physical destruction).
-
Review IT Recyclers’ certifications (e.g., i-SIGMA, ISO) with the client to ensure they meet necessary compliance standards.
-
2. Device Collection and Secure Transport
Collect devices securely and establish a chain of custody.
​
-
Steps:
-
Arrange secure collection or transport of devices.
-
Log each device with a unique ID and track serial numbers.
-
Maintain a chain of custody documentation, including client acknowledgment and signatures.
-
3. Verification and Preparation for Data Wiping
Verify devices and prepare them for certified wiping or destruction.
​
-
Steps:
-
Inspect devices upon arrival, cross-checking with client-provided records.
-
Sort devices according to wiping requirements.
-
Update the tracking system to log the appropriate data wiping or destruction method for each device.
-
4. Data Wiping Process
Ensure complete, certified data erasure using approved software.
​
-
Steps:
-
Software Wipe: Use DBAN or other industry-standard software to perform multi-pass wipes based on client requirements (e.g., DoD 5220.22-M).
-
Verification: Complete a post-wipe verification to ensure data has been irreversibly erased.
-
Document each device’s wipe status in the tracking system for certification purposes.
-
5. Physical Destruction
(if applicable)
Physically destroy devices when required for higher security standards.
​
-
Steps:
-
For physical destruction requests, use shredding or degaussing equipment.
-
Log the destruction process, including date, method, and technician information.
-
Securely dispose of shredded or degaussed materials, following environmental standards.
-
6. Certificate of Data Wiping & Destruction
Provide the client with a certified document verifying the completion of data wiping or destruction.
​
-
Steps:
-
Generate a Certificate of Data Wiping & Destruction for each batch or device.
-
Include specific details: device ID, method used, date, and technician’s name.
-
Review the certificate with the client for approval and provide copies for their records.
-
7. E-Waste Recycling or Disposal
Properly dispose of or recycle remaining device materials.
​
-
Steps:
-
Identify parts that can be recycled and those that require disposal.
-
Transfer recyclable parts to refurbishment or recycling departments within IT Recyclers.
-
Dispose of non-recyclable materials in compliance with environmental regulations.
-
8. Audit and Record Maintenance
Maintain a detailed record for compliance and auditing purposes.
​
-
Steps:
-
Archive Certificates of Data Wiping & Destruction, along with chain of custody documents.
-
Perform periodic audits of the data wiping and destruction process to ensure ongoing compliance.
-
Keep records accessible for client review, internal audit, or regulatory inspection.
-
This certified process provides clients with peace of mind through secure data destruction practices backed by official documentation and compliance with recognized industry standards. Let me know if you need any additional customization.
Compliance & Certifications
​​
At IT Recyclers our team is committed to keeping our knowledge up to date and staying in compliance. We are certified in the following areas for your peace of mind:
HIPAA Compliance
Protecting sensitive patient data in the healthcare industry.
GDPR Compliance
Complying with the General Data Protection Regulation (GDPR) to protect individuals' privacy rights.
PCI Compliance
Complying with the Payment Card Industry Data Security Standard (PCI DSS) to protect your business's credit card data.
NAID-AAA Data Destruction
Following strict protocols for data destruction to protect your business's sensitive information.