• Secure Device Collection

    Woven bag with Tamper Security Tag to keep your devices save.

  • Safe and Secure

    Protecting and erasing your data.

  • Full Data Destruction

    Irrecoverable data erasure or shred

  • Saving the Planet

    We focus on recycling and reuse for zero electronic waste to landfill

Data Erasure & Destruction

How our data erasure and destruction works.

What does data erasing mean?

Data erasing is the process of permanently removing information stored on a device so that it can never be accessed, retrieved, or reconstructed.

This is essential for protecting privacy, complying with data protection laws, and safeguarding sensitive information against unauthorised access.

How We Erase Data on Different Devices

To ensure thorough data erasure, we use a combination of software, firmware, and physical methods, each tailored to the specific device type and storage medium.

Here’s how we approach each one:

Laptops and Computers

Software Erasure (Overwriting with Zeros or Random Patterns):

For laptops and computers, we use secure software methods to erase storage devices.
The data erasure process involves overwriting all accessible sectors of the storage device with either zeros or a random sequence of bits.
This effectively replaces the original data with meaningless information, making it impossible to recover any previously stored data.
This method is widely recognised for sanitising data on hard drives and solid-state drives (SSDs) that are accessible to the operating system.

Firmware-Based Erasure (Secure Erase and Enhanced Secure Erase):

For drives that support it, we use firmware-based Secure Erase (SE) and Enhanced Secure Erase (ESE) methods, which are part of the ANSI ATA standard supported by most ATA and SATA drives manufactured since 1991.
This approach overwrites the entire surface of the disk, including hidden areas, spare sectors, and any bad sectors, ensuring complete erasure even in areas that are inaccessible to software-based methods.

Mobile Devices and Tablets

Apple Devices:

For Apple devices, we replace the device’s firmware with the latest supported version, effectively overwriting the device’s internal software and erasing all prior data.
We then generate a new encryption key, making any previously stored data unreadable and ensuring complete data security.

Android Devices:

For Android devices, the process involves overwriting all user data with zeros.
Once this is complete, the device is reset to factory settings, ensuring that all user data is erased and that the device is ready for new ownership without any risk of data leakage.

Smart Devices

Smart Tech:

For smart devices, any removable storage (such as SD cards or SIM cards) is physically shredded to prevent data recovery.
Following this, the device itself is reset to factory settings, erasing user data and removing any link to the previous owner.
This process ensures that the device is completely cleared of old data and is fully deactivated from prior use.

Loose Data

CDs, DVDs, USB Drives, SD Cards, Floppy Disks

For secure disposal of removable media, we employ physical shredding, which breaks down the storage medium into small fragments, making data recovery impossible.
Shredding is a highly secure method for destroying data on these types of media, as it ensures complete and permanent destruction.

Why Data Erasure Is Important

Data erasure isn’t simply about deleting files or reformatting devices—it’s a specialised process designed to completely eliminate data traces. Proper data erasure is essential for:

  • Privacy and Compliance: Ensuring compliance with privacy regulations (such as GDPR), which require organisations to properly dispose of personal data.
  • Security: Protecting sensitive information from unauthorised access, safeguarding the privacy and security of individuals and companies.
  • Device Reusability: Enabling devices to be securely repurposed or resold without compromising previous data.

For data we can't erase, we destroy

For data that cannot be erased, we ensure its destruction.

We remove the device's data-bearing components and shred them beyond recovery.

Data Destruction

For data we can't erase, we destroy.

How we destroy them is by stripping out the data components of the device, and shredding them to an irrecoverable condition.