Since 80% of corporate computers contain sensitive information, you need to be sure the information on your hard drives is safe from thieves. Wiping or degaussing alone is not enough to guarantee the destruction of your sensitive information. Our hard drive destruction service completely destroys the hard drive rending it impossible to recover the information it contained.
Data Destruction Services
How our Secure Hard Drive Destruction Works – Red Leaf provides a secure process to make data irretrievable.
- Secure chain of custody process
- A log of manufacturer name and serial number for each device
- Complete destruction of material – not wiped or degaussed
- Itemized Certificate of Destruction
- Recycling by approved partners to reduce your carbon footprint
Red Leaf process will eliminate data from the following media:
- Hard Drives
- Backup Magnetic Tapes
- Floppy and Zip Disks
- Optical Media
Red Leaf Certifications
Red Leaf is fully compliant with the Environmental Protection Agency, Missouri Department of Natural Resources, and applicable City and County authorities. Red Leaf utilizes RIOS/ R2 Certified Electronics Recycling process, and are ECycle Certified from the Missouri Department of Natural Resources.
Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that does not remove data previously written to the media, or through physical properties of the storage medium that allow previously written data to be recovered.
Data remanence may make inadvertent disclosure of sensitive information possible should the storage media be released into an uncontrolled environment (e.g., thrown in the trash, or obtained by a third party). Various techniques have been developed to counter data remanence. These techniques are classified as clearing, purging/sanitizing or destruction. Specific methods include overwriting, degaussing, encryption, and physical destruction.
Effective application of countermeasures can be complicated by several factors, including media that are inaccessible, media that cannot effectively be erased, advanced storage systems that maintain histories of data throughout the data’s life cycle, and persistence of data in memory that is typically considered volatile. Several standards exist for the secure removal of data and the elimination of data remanence.