Skip to main content


 

Data Destruction

Protect your sensitive information

Today’s organisations own and manage a wealth of data. Confidential and sensitive business information is scattered across different devices: PCs, laptops, servers, smartphones and tablets. But data can also be found in unexpected places: copiers, printers, digital cameras, and so on. What can you do with these devices and the stored data when they need to be replaced? How can you be sure that there are no leaks of sensitive information from your IT equipment?

Why destroy old laptops, servers and hard drives?

As an organisation today, you manage and own a wealth of data. Confidential and sensitive company data is scattered across various devices. Think of hard disks, PCs, laptops, servers, smartphones and tablets. But devices you would not immediately think of also possess data: photocopiers, printers, digital cameras... What do you do with these devices and the stored data once they are due for replacement? By destroying them and/or the stored data, you can be sure that no data leak can happen through your old IT equipment.

Data destruction of hard disks

Discover all possibilities to have your hard disk (HDD or SDD) professionally destroyed here.

Data Destruction of Tapes

Tapes have almost become an obsolete technology. Nevertheless, it is important to also have this data professionally destroyed.

Data destruction of laptops and other hardware

Do you want to destroy the data of laptops, desktops or smartphones? Find out how we do it.

Software or mechanical destruction

Out of Use offers businesses the guaranteed and certified destruction of these data. This can be done either using software or mechanically, and simply depends on what you opt for as the customer. In the case of software-based destruction, all the data are deleted, but the hardware itself remains intact. The device remains reusable, and it can have a second life with a completely empty memory. In the case of mechanical destruction, the hardware itself is rendered unusable and a second life is impossible. So how is this done? Read all about it on this page!

 

It's important to know that this data destruction follows a fully traceable process: from the safe and reliable collection of the devices, to the actual data destruction and the Weeelabex-accredited recycling of the data carriers. After destruction Out of Use will issue a data destruction certificate so you can be 100% sure that your data has been securely processed. As an environmental company and circular service provider, we can also promise the environmentally-friendly processing of the devices.

Contacteer ons voor datavernietiging

Because we wanted to exclude all the risks, we opted for data destruction on our own site. The hard disks are crushed by the shredder into tiny fragments measuring no more than 300 square millimetres. The destruction certificate always gives us valid proof that the data has been destroyed. As a recognised recycling business, Out Of Use also ensures the proper recycling of our hardware in accordance with the WEEE directive 2012/19/EU and the Waste Framework Directive 2008/98/EC.

We worked together with Out of Use on several reuse and recycling projects, such as the dismantling of tape robots, hard disk destruction, and so on. For each instance of data destruction, Out of Use gives us a certificate guaranteeing the destruction of all the data present. That’s essential for compliance with the new General Data Protection Regulation (GDPR). The collaboration with Out of Use supports our social vision of circular entrepreneurship. Sustainability is a key part of the business plan here at Simac.

Because we wanted to exclude any risk, we opted for data destruction in our data centre. The hard disks were crushed by the shredder into tiny fragments measuring no more than 300 square millimetres. and the data tapes were degaussed using a 10,000 Gauss magnetic field. Out Of Use spent a few days here on site, so we could witness the destruction. The serial numbers were recorded so that they could be mentioned on the destruction certificate. That always gives us valid proof that the data has been destroyed.

Your benefits:

Datavernietiging

Absolutely certain destruction

We offer destruction methods at security levels 2 to 5 where it is technically impossible to reproduce the data, all in accordance with the official and stringent DIN66399 standard for the destruction of paper, hard drives and other data carriers.

Certificaat van vernietiging

A transparent certificate of destruction

After the destruction, you’ll receive a destruction certificate. This lists the number of data carriers and can be supplemented with their serial numbers and photos on simple request. After data wiping, you’ll receive a data erasure report. As waste processors, we can also issue an environmental certificate.

Data wiping

We cater for different data carriers

We can destroy your data on several types of electronic data carriers, including hard disks, tapes, SSDs, smartphones, CDs and USB. Where possible we can scan in the serial numbers for listing on the destruction certificate, or we can photograph the data carriers.

Datavernietiging Out of Use

On your own site or in our workshop

Would you rather the devices didn’t leave your company? In that case you can opt for on-site destruction. In this event we visit your business with our mobile shredder or degausser. Destruction then takes place on your premises and under your supervision.

Safe & secure Box

Secure, sealed transport available

Depending on the quantity, we offer transport options in a closed roller container with padlock, or in a sealed Out of Use truck. For smaller data carriers with sensitive information you can use our Safe & Secure Boxes, which are transported by our partner Seris Security. Read more about Safe & Secure Boxes here.

Read more about the Safe & Secure Box here
shredded discs

Both software-based and physical destruction

We offer several methods of destruction to fully meet your wishes: data wiping (in accordance with the ADISA standard using Blancco software), mechanical perforation (in accordance with DIN66399 class H2), degaussing (demagnetisation), and several levels of shredding (in accordance with DIN66399 class H4/T3, H5/T4 and E5). You decide and we take care of the professional execution.

datavernietiging

A binding GDPR-compliant contract

In compliance with the GDPR regulations, Out of Use acts as your processor for data destruction. The contract clearly describes the responsibilities and also the liability for any data leaks. We offer three possible destruction levels. Discover more here: Discover more.

Discover more

CASE: Out of Use destroys data of Ghent University Hospital

Read in this article why Ghent University Hospital chose the on-site data destruction services of Out of Use.

Read more

Reliable destruction of your data