100% Data Destruction and Sanitization Services.
We know that today, protecting your confidential information is one of your highest priorities; and we make it safe, secure and simple.
Data sanitization is the process of permanently and irreversibly removing or destroying the data stored on hard drives or other media storage devices. A device that has been sanitized or destroyed has no usable residual data, and even the most advanced forensic tools will not be able to recover the erased data.
Watch this short, 1:35-minute video below to see Excess Logic’s data destruction process.
We remove all traces of identification on retired equipment, such as company asset tags, embedded security devices, and corporate branding labels from all equipment to protect your identity and integrity.
We offer solutions for small and large projects, and we employ multiple methods of data destruction. We provide solutions for magnetic and solid state drives.
We also completely and physically destroy disks, tapes, flash memory devices, RAM, ROM, integrated circuits, DVDs, CDs, smartphones, tablets, and computer equipment to eliminate the risk of attempts to re‐use or recover data from computers, related devices, and media. We will issue a Certificate of Destruction of all destroyed assets.
Excess Logic recycles all destroyed media and only works with certified downstream partners. We require our recycling partners to be accredited under one of the two accredited certification standards: R2 ‐ The Responsible Recycling Standard for Electronics Recyclers and the E‐Stewards Standard for Responsible Recycling and Reuse of Electronic Equipment Exit Standard for Recyclers.
Our guarded processing facilities are access-controlled and monitored, ensuring maximum protection of your data bearing assets prior to destruction. All assets are stored and secured until processing begins. Security measures implemented at all Excess Logic facilities include intrusion alarm systems, CCTV surveillance, limited access and locked areas, strict visitor controls, secured storage. Background checks are done on all new employees and IT security protocols are in place to protect client assets
Certificates of Data Destruction can be provided, regardless of the service provided – data erasure, on-site destruction, witnessed destruction or plant recycling.