Protect your sensitive information
Today’s organisations own and manage a wealth of data. Confidential and sensitive business information is scattered across different devices: PCs, laptops, servers, smartphones and tablets. But data can also be found in unexpected places: copiers, printers, digital cameras, and so on. What can you do with these devices and the stored data when they need to be replaced? How can you be sure that there are no leaks of sensitive information from your IT equipment?
Why destroy old laptops, servers and hard drives?
As an organisation today, you manage and own a wealth of data. Confidential and sensitive company data is scattered across various devices. Think of hard disks, PCs, laptops, servers, smartphones and tablets. But devices you would not immediately think of also possess data: photocopiers, printers, digital cameras... What do you do with these devices and the stored data once they are due for replacement? By destroying them and/or the stored data, you can be sure that no data leak can happen through your old IT equipment.
Software or mechanical destruction
Contacteer ons voor datavernietiging
Out of Use offers businesses the guaranteed and certified destruction of these data. This can be done either using software or mechanically, and simply depends on what you opt for as the customer. In the case of software-based destruction, all the data are deleted, but the hardware itself remains intact. The device remains reusable, and it can have a second life with a completely empty memory. In the case of mechanical destruction, the hardware itself is rendered unusable and a second life is impossible. So how is this done? Read all about it on this page!
It's important to know that this data destruction follows a fully traceable process: from the safe and reliable collection of the devices, to the actual data destruction and the Weeelabex-accredited recycling of the data carriers. After destruction Out of Use will issue a data destruction certificate so you can be 100% sure that your data has been securely processed. As an environmental company and circular service provider, we can also promise the environmentally-friendly processing of the devices.
Because we wanted to exclude all the risks, we opted for data destruction on our own site. The hard disks are crushed by the shredder into tiny fragments measuring no more than 300 square millimetres. The destruction certificate always gives us valid proof that the data has been destroyed. As a recognised recycling business, Out Of Use also ensures the proper recycling of our hardware in accordance with the WEEE directive 2012/19/EU and the Waste Framework Directive 2008/98/EC.
We worked together with Out of Use on several reuse and recycling projects, such as the dismantling of tape robots, hard disk destruction, and so on. For each instance of data destruction, Out of Use gives us a certificate guaranteeing the destruction of all the data present. That’s essential for compliance with the new General Data Protection Regulation (GDPR). The collaboration with Out of Use supports our social vision of circular entrepreneurship. Sustainability is a key part of the business plan here at Simac.
Because we wanted to exclude any risk, we opted for data destruction in our data centre. The hard disks were crushed by the shredder into tiny fragments measuring no more than 300 square millimetres. and the data tapes were degaussed using a 10,000 Gauss magnetic field. Out Of Use spent a few days here on site, so we could witness the destruction. The serial numbers were recorded so that they could be mentioned on the destruction certificate. That always gives us valid proof that the data has been destroyed.
CASE: Out of Use destroys data of Ghent University Hospital
Read in this article why Ghent University Hospital chose the on-site data destruction services of Out of Use.
Reliable destruction of your data