Author Elizabeth Wilmot

How to Destroy Data

How to Destroy Data

While the ability to clearly establish what data end-of-life really means is still a challenge for most companies, uncontrolled data growth is gradually resulting in the development of corporate policies regarding data storage and retention. Many policies are also driven or imposed by legislation and regulations such as the Privacy Act, Payment Card Industry (PCI) Data Security Standard, and other government compliance requirements.  Data Killers is compliant with all regulations and knows how to destroy data.

Click here to read the entire article.

Data Killers uses a variety of destruction methods that are tailored to meet the unique requirements of each customer.  These methods include shredding, crushing, degaussing, incineration and disintegration.  Our teams of trained data technicians are all well versed in the assortment of destruction methods and the requirements of the laws governing destruction.  At Data Killers, our destruction processes are all certified and surpass government mandates.  Our destruction services and disposal processes and our advanced equipment completely satisfy all federal requirements such as NSA, DoD and GSA regulations.  In addition, Data Killers is certified by the Defense Logistics Information Service to store and transport military critical technical information.