The old hard disk drive is disintegratin

Data Destruction

Secure Data Destruction

EDM Recycling is committed to establishing long-term partnerships with our clients. We work side by side with you to design, implement, operate, and monitor your IT Asset Disposition programs. We offer a full chain-of-custody solution that tracks each asset from arrival to destruction.  We utilize the following operating standards when destroying data:

 

  • Conformance with U.S. Department of Defense (DoD) data destruction standards

  • Support of all types of hard drive subsystems: IDE, SCSI, ATA, Fibre Channel, SATA, and SAS

  • Detailed reporting and chain of custody options

Our Process

Secure 

Transportation

We transport the sensitive materials securely in GPS tracked transportation. 

Receive

 Equipment 

Receive and transfer to designated secure storage area.

Wipe

Data

Certify 100% erasure of data using DOD standard software

Shred

Hard Drive

Hard drives are physically destroyed through designated machine.

Issue 

Certification

Destruction certifications

and detailed disposition report are issued.

The Importance of Data Destruction

Your company’s old technology can be a significant security risk and a hazard to the environment. When technology ends up in the wrong hands or is disposed of in the wrong way, it can cost companies millions. Electronically stored data is subject to complicated HIPAA/HITECH, FACTA, SOX, GLB, and FERPA regulations that can make responsible disposal difficult.  EDM uses DoD standards to destroy data after which the customer receives a Certificate of Destruction and a detailed Disposition Report after the asset disposal process is completed.

In the event that your enterprise has higher security needs, physical destruction ensures that your data devices and the information stored on them cannot be accessed. We can process hundreds of drives per hour, all within our access-controlled hard drive destruction department. EDM Recycling then places the crushed drives into a secure container for delivery to an EDM processing facility and the final recovery of non-ferrous metals.

Whether a system is being given to a charity or sold to an employee, third party, or at an auction, data security should be a strong concern. An unauthorized data leak may be the result of these systems leaving the company, which creates a serious liability if the drives have been merely reformatted. Reformatting or re-partitioning a hard drive will not erase the data; it can all be recovered with special software since it is the information table or directory that is altered, not the data file.

The information retrieved by an unauthorized party could contain sensitive private company and customer information, along with personal information about the computer users themselves. This unintended information exposure could lead to undesirable publicity and even legal prosecution. Data security has gained legal safeguards with recent legislation being passed to protect against the sharing of nonpublic personal information. Requirements are placed on the companies themselves to make certain that appropriate safeguards are in place to protect collected information from inappropriate eyes (i.e. Gramm-Leach-Bliley Act of 1999 and Health Insurance Portability and Accountability Act of 1996). Portions of new legislation continue to safeguard private information a company may have gathered concerning its customers, with serious penalties for violation.

Corporate Information

About Us

Certification

Career

Stay Connected

© 2020 EDM Recycling Inc.

Follow EDM

  • Instagram
  • LinkedIn
  • Linkedin
  • Instagram