Your data is our businessData leaks, identity fraud, data scams - they're becoming more common and more sophisticated, and cost UK taxpayers £billions each year.
We fill our devices with information; from bank details to personal data. When you replace your tech, the data stored on your old device doesn't disappear. Many of our clients say "Its okay, I've done a factory reset", or "don't worry, it's broken" without realising that in the wrong hands, their data is still completely accessible with freely-available tools. For businesses, data security is essential. Under GDPR, you have a legal responsibility to responsibly dispose of data; but more important than the risk of hefty fines is the risk to your customers and your reputation. Tech-Takeback's expert team of data erasure specialists ensure that all your data is completely erased before it can be assessed for reuse. Did you know...A security firm was able to recover 40,000 photos, 1,000 Google searches, hundreds of emails and even a loan application from 20 factory-reset mobile phones purchased online. Avast Good to know...Both Global Erasure and Certus obtained EAL 3+ certification from NATO, UK NCSC and ADISA. This rigorous certification is the most comprehensive certification currently available. The softwares support the wiping of even hidden or locked data, such as Device Configuration Overlay (DCO), Host Protected Area (HPA) and remapped sectors of the drive. |
Our erasure processSecure data overwriting Secure licenced erasure software overwrites every single piece of data on a device/hard drive as follows: Global Erasure: HMG Infosec Standard 5 (IS5) Baseline (single pass): The drive is overwritten once with a fixed pattern of zeros and then verified Enhanced (three pass): The drive is overwritten three times with ones, zeros, then pseudorandom then verified, to provide stronger assurance against recovery. NIST.SP.800/ATA Clear (single pass): The drive is overwritten once with zeros, ones or pseudorandom and then verified so normal recovery tools can't retrieve data. purge (three pass): Uses built-in secure erase commands to wipe even hidden/remapped sectors, making the data unrecoverable even with forensic methods. Certus Erasure: Baseline for M series (2 pass) pseudorandom then cryptographic erase. The encription keys are securely deleted, making data permanently unreadable. Picea Android 6 and earlier: Overwritten with zeros. Android 7 and later: Cryptographic sanitization iOS and iPadOS: Cryptographic sanitization, OS reset. Following overwrites, verification checks ensure that nothing is left - not even the original operating system - and a certificate of erasure is generated. Devices that fail data erasure Drives that fail the erasure process are physically destroyed and a certificate of destruction is issued. |