Our aim is to simply take away the hassles associated with IT disposal and provide our customers with a
complete peace of mind solution for the management and retirement of redundant IT equipment
Secure Data Destruction
Digital Growth Computer recycling service ensures all data is wiped to the highest of standards; all our work is carried out in accordance with the data protection act. Our process of data removal involves multiple overwriting with CESG approved software and exceeds both the standards set by the Ministry of defence and US department of defence. Our software permanently wipes all data from any data storage device up to, CONFIDENTIAL, RESTRICTED access, SECRET and TOP SECRET levels and will overwrite data from any size of ATA/IDE/SCSI/SAS/USB/SATA/Fibre Channel and FireWire drives. In addition, the software erases all hidden/locked areas on a hard disk such as DCO, HPA and remapped sectors this process can be time consuming but ensures all data is destroyed and is non recoverable. If for any reason the Hard Drive cannot be accessed or data is proving difficult to wipe the hard drive is then removed and physically destroyed. Our secure data wiping guarantees the total removal of all data and on request the removal of all identification markings including electronic "tattoos”.
All our vehicles are fitted with real time GPS tracking. Our premises are guarded with 24hour uniformed security personnel, Infrared night vision CCTV cameras, anti-vandal barriers and a Locktec 24hour monitored Alarm system.
Our secure data destruction service allows Clients the use of our CESG approved Hard Drive Crusher in this case all data storage devices are removed from equipment on site by the client. Hard Drives serial numbers are recorded and then placed in the crusher. Which is capable of physically destroying Server, PC and laptop hard drives in less than 15 seconds and will render the hard drive inoperative. The inoperable hard drives are then removed from site and base recycled.
Once equipment has been safety tested and has successfully undergone the data removal process it is packed and securely stored. Our research and development officers then seek new communities, which can benefit from our scheme. Once approved, the equipment is forwarded on without delay.