📑 No exception and no room for manoeuvre!
Your laptops are in safe hands with us. Regardless of whether they have already been cleaned or not, all data carriers undergo the same processes to achieve maximum security.
Standards and certifications
In general, all our processes are based on the following guidelines:
- Data deletionNIST 800-88 (Clear / Purge)
- Data carrier destruction: DIN 66399 / ISO 21964
🍂 Data erasure before destruction
Destruction of data storage media is no better than a clean deletion. That is why we endeavour to reuse data carriers in the best possible way.
⚠️ Be careful with «certified» deletions!
Standards such as ISO 9001, ISO 14001 and ISO 27001 say nothing about how securely data is deleted and how data storage media are handled.
This is a popular «trick» used by IT service providers to feign security that has never been externally tested and verified. In any case, our organisation is effectively certified.
How does data erasure work?
Depending on the data carrier and its capabilities, our erasure system selects one of the secure Secure Erase / Sanitise commands. Verification takes place after successful execution of these erasure methods.
🔎 Verification is essential!
A command can be executed quickly. The only way to prove whether or not it has been properly cancelled is with verification. To do this, our deletion system compares the statuses before and after the deletion: and it is precisely this comparison that is not easy!
🤷 Where can I see the details of the cancellation?
The classification of erasure processes is carried out according to the «Clear» and «Purge» categories defined in NIST 800-88 in the Deletion documentation per data carrier.
How does the destruction work?
If a data carrier cannot be deleted or accessed, it is physically destroyed. For this purpose, our organisation has industrial shredder systems as well as a camera system that is unique in Switzerland and creates a video as evidence for each destruction process.
🔎 Trust is good, proof is better!
If a data carrier is installed in a storage device, the risk of data loss is still relatively low. But what do the processes look like as soon as a hard drive is removed? We can track the path of every hard drive down to the metre and second.
🤷 Where can you see the details of the destruction that took place?
Destruction processes are classified according to the safety levels defined in DIN 66399 / ISO 21964 in the Deletion documentation per data carrier. In addition, all videos are also stored individually in the deletion documentation.
Storage until deletion / destruction?
Triple secured
The processing site is generally burglar-proof, has a video surveillance system and an alarm system that alerts us and the police in the event of a break-in.
🚨 Additional protection for unprocessed goods
Unslaked goods are stored in an additionally secured and hardened area of our processing area. This area is again separately monitored and alarm-protected.
Deletion documentation
🧑🏼🔧 Free of charge, ready to use and audit-proof
It should be easy for donors to understand what has been deleted and how. That is why we have very detailed deletion documentation that shows all the work carried out.
Click here for the info page -> Deletion documentation