Your old electronics may hold valuable personal information going from personal contacts to discrete photographs and other sensitive data. To avoid that this data would be available for others, we proceed to profound data cleansing process for each electronic device item that we receive.
We inspect each item, using special software to remove and destruct all information that may hold the device. Obviously the process of wiping data varies from one item to another, but all the devices are reverted and reset to their factory settings, the information thus truly erased.
We use different data destruction software (also known as data sanitization software, disk wipe software, or hard drive eraser software), but each data sanitization method completely erases the data from the device customers sell us online. Thus we permanently wipe out all program files, all other files, all partitions and disk formats, including all operating systems.
We alsoe use CheckMEND tool, which helps detect stolen electronic devices. It includes information coming from many sources, such as insurance companies, law enforcement authorities, wireless carriers and so on, all across the US. CheckMEND has been developed by Recipero, a consumer electronics background report service. This tool compiles data coming from major wireless carriers, FBI and other organizations to provide the database of lost or stolen devices. This database is updated daily.
Our protocols of wiping sensitive data are compliant with all major standards, such as DoD 5220.22-M, HIPAA, GLB Act, Theft & Assumption Deterrence Act, NIAP EAL 4+ (v 6.1), Sarbanes-Oxley Act.
We also use for certification the ISO 9000 family of quality management systems standards which were designed to help organizations ensure that they meet the needs of customers while meeting statutory and regulatory requirements related to a product: ISO 9000 deals with the fundamentals of quality management systems, and ISO 9001 deals with the requirements that organizations wishing to meet the standard must fulfill.
To achieve the best results our technicians work in a secure environment, and our supervisors inspect each and every device just to make sure that the process of data removal.