Data Destruction Process
We destroy all data passed to us safely and securely.
Any erasable functioning media is wiped using a multipass binary overwipe. Any non-functioning or non-erasable media is physically destroyed. Whichever method is used, the data is completely and irretrievably eradicated.
Our destruction process meets or exceeds many internationally recognised standards including the Communications Electronics Security Group (CESG) Commercial Product Assurance (CPA), NATO CONFIDENTIAL, NATO RESTRICTED, NATO SECRET and COSMIC TOP SECRET, Defence INFOSEC Product Co-Operation Group UK (DIPCOG) and exceeding standards provided by the USA Department of Defense. A data destruction certificate is provided at the end of the process.
We meet the highest standards for secure data erasure because we know compliance doesn’t always achieve the greatest security. Our process supports up to 22 erasure standards including:
Standard Name | # of Passes | Description |
---|---|---|
Air Force System Security Instruction 5020 | 2 | Originally defined by the United States Air Force, this 2-pass overwrite is completed by verifying the write. |
Aperiodic random overwrite/Random | 1 | This process overwrites data with a random, instead of static, pattern. Each sector of the drive will contain different data. This process is completed by verifying the write. |
Bruce Schneier’s Algorithm | 7 | This 7-step process, presented by security technologist Bruce Schneier, overwrites using 1s, 0s and a stream of random characters. |
BSI-2011-VS | 4 | This 4-pass system is the original BSI standard defined by the German Federal Office of Information Security. |
BSI-GS | 1 | Defined by the German Federal Office for Information Security, this process begins by removing hidden drives (HPA/ DCO if existing) and overwriting with aperiodic random data. The next step triggers a firmware based command dependent on the type of drive. The last step is to verify the write. |
BSI-GSE | 2 | The BSI-GSE adds one extra step to the BSI-GS. After the first overwrite, an additional overwrite with aperiodic random data is added before moving on to the last two steps. |
CESG CPA – Higher Level | 3 | The UK government’s National Technical Authority for Information Assurance standard is a 3-pass process with a verification after each step. |
Cryptographic Erasure (Crypto Erase) | N/A | This method uses the native command to call a cryptographic erasure, which erases the encryption key. While the encrypted data remains on the storage device itself, it is effectively impossible to decrypt, rendering the data unrecoverable. Because this method uses the native commands as defined by the manufacturer, it is only available if supported by the drive being erased. |
DoD 5220.22-M | 3 | Published by the U.S. Department of Defense (DoD) in the National Industrial Security Program Operating Manual (also known as DoD document #5220.22-M), it specified a process of overwriting hard disk drives (HDDs) with patterns of ones and zeros. The process required three secure overwriting passes and verification at the end of the final pass. More on this standard is available at our blog, “Everything You Need to Know About the DoD 5220.22-M Disk Wiping Standard & Its Applications Today“. |
DoD 5220.22-M ECE | 7 | This method is an extended (7-pass) version of the DoD 5220.22-M. It runs the DoD 5220.22-M twice, with an extra pass (DoD 5220.22-M (C) Standard) sandwiched in between. |
Certification levels
All data is processed in the same way, but we offer a number of different levels of certification:
Standard: A general certificate covering the list of equipment processed, stating all data passed to us has been destroyed.
Premium: A detailed certificate comprising lists of asset tags or serial numbers certified to exceed the standards listed above.
Our standard service is free of charge, the premium service is £6 per item. (an item is considered as any data carrying media including discs, data tapes, mobile phones, usb keys, flash memory, etc). If you have items you don’t need wiped or destroyed please let us know.
Tech Recycle use Industry leading software and hardware to ensure the highest standards when handling and eradicating data.