Physical Data Destruction
Recycling Process
Physically destroying data typically involves methods that render the data storage devices unusable and the data irretrievable. Here are some common techniques:
Shredding: Specialized industrial shredders can grind hard drives, CDs, DVDs, and other storage devices into small pieces, ensuring the data cannot be reconstructed or recovered.
Degaussing: This process involves exposing magnetic storage devices, such as hard drives and tapes, to a strong magnetic field. The magnetic field disrupts the data patterns, effectively erasing the data and rendering the device unusable.
Crushing: Hard drive crushers apply immense pressure to crush the storage devices, breaking the internal platters and other components. This mechanical destruction makes data recovery impossible.
Drilling/Puncturing: Drilling holes or puncturing the storage devices, especially through the platters of hard drives, physically damages the media to the point where data recovery is infeasible.
Melting: Exposing storage devices to high temperatures, such as in a furnace, melts and distorts the physical components, ensuring that any data on the devices is permanently destroyed.
Incineration: Burning storage devices at high temperatures reduces them to ash, completely obliterating any data they may have contained.
Each of these methods ensures that the data stored on the devices is irretrievably destroyed, providing a high level of security for sensitive information.
Software Based Erasing
Laptops and Desktops
Software Tools: Use tools like DBAN or Blancco.
Process: Boot from a USB containing the wiping software, select the hard drive, and perform multiple overwriting passes.
Verification: Confirm data erasure and generate a report.
Smartphones
Factory Reset: Perform a factory reset via the settings menu.
Wiping Apps: Use apps like iShredder for multiple overwrite passes.
SIM and Memory Cards: Remove and destroy or separately wipe these cards.
Verification: Check for complete data removal.
Network Switches
Factory Reset: Reset the switch to factory settings.
Erase Configuration: Use CLI commands (erase startup-config) to delete settings.
Verification: Ensure all user data and settings are removed.
Servers
Wiping Software: Use Blancco Drive Eraser or KillDisk.
Process: Connect the software via USB, wipe each disk, including RAID arrays.
Verification: Confirm data erasure and provide a certificate.
General Best Practices
Compliance: Adhere to standards like NIST SP 800-88.
Physical Security: Secure devices during wiping.
Documentation: Maintain detailed records of the wiping process.
Irrespective of the specific service provided by TER for your organization, certification will be issued. Upon request, the following certificates can be obtained after the completion of the corresponding service:
- Collection Certificate
- Collection Inventory Spreadsheet (detailing make, model, and serial number)
- Data Wipe Certificate
- Certificate of Destruction