The first step is to determine the protection class. After all, destroying a document that does not contain sensitive information is simple and relatively less time consuming. Unlike “Top Secret” data, for example, a hard disk should not fall into the wrong hands. The physical destruction of this potentially critical asset to the smallest possible particle makes it impossible to extract information from the data carrier. No matter how sensitive the data is, safe and complete destruction of data is possible. Read more about the different security classes and security levels.

Offsite destruction services

If the security class is 1 or 2, in other words the data carriers contain general to sensitive data. In this set-up, shredding, i.e. reduction and bending, is carried out in a closed and secured destruction location. All data carriers are registered to ensure security during the process.

Onsite destruction services

Security class 2 or 3, data carriers with sensitive to very sensitive data. Execution is made possible by a mobile shredder with a small footprint, so that destruction can take place in a data center or right next to an administrative desk if necessary. They are relatively small machines, low-noise production. They work on a regular 230V socket, in other words, they are suitable for indoor use. With the execution of the destruction services on location, both the destruction and the registration are carried out at your place. This is to ensure that all processes run safely.

What else is possible?

For more specialized and/or high protection class (3), destruction with a (mobile) high-security destroyer is possible. This is more of an adjustable cutter than a shredder. The cut length can be adjusted, for example from a 70mm hard disc to 1mm strips, a cross cut can also be applied to achieve even smaller particle sizes. Unique machine-generated photos in a 2-step process are also possible. Furthermore, the (mobile) high-security destroyer takes a photo of every data carrier that is destroyed. Prior to this, a barcode is automatically scanned and compared with barcodes logged in by the operator.

How does this work?

  1. First, the data carriers are provided with a unique barcode to start the scanning process
  2. The operator scans the barcode of the data carriers
  3. The machine’s automated elevator can carry up to 15 data carriers
  4. Once the machine is loaded and the operator locks the door, the process begins
  5. The high-security shredder scans and verifies each barcode and when it matches, a photo is taken
  6. After a photo is taken, the cutting process starts
  7. Once the cutting process is completed, each data carrier is individually registered as “successfully destroyed”

Hybrid destruction services, combine degaussing and shredding

As an extra security layer, class 3, it is possible to opt for hybrid destruction services. In this particular setup, the destruction takes place in 2 steps. A data carrier is first demagnetized and then shredded. As each step is performed, the serial number is recorded. Demagnetization only applies to data carriers that use magnetism as a means of data storage. This can be both an HDD and a tape, hybrid destruction services are not always possible for other types of data carriers. However, it is possible to partially perform this service on site. Both actions can be logged separately to ensure hybrid security.

Recent posts