IT Security


Staying safe, secure and within the law.  and its partners follow ISO 271001 Information Security Standard.

Some of our and our partners physical and digital security processes include:

  • Storage in a secure warehouse in designated areas
  • Secure boxes for storage of items containing data
  • Limited access by authorised personnel only
  • Secure transportation
  • Secure data removal solutions with approved tools
  • Rental of data removal tools for onsite service

IT Security services:

­ On site Hard disk and other storage device destruction (on site and off site) Please speak with your account manger or contact us 

Equipment rental:

We also provide mobile data destruction equipment to our clients to rent starting at just £500 per day together with our security expert.  We provide Safest Hard Disk crusher used by banks and government departments. We work hard to bring you the most advanced solutions available, if you hear of any other products or services that you would like to see on here please let us know and we’ll include it in our range if there is a demand for it.  Please speak with your account manger or contact us 

More on Data Security:

­Research has shown that fear of sensitive information stored on old PCs being used maliciously is one of the biggest obstacles preventing environmental re-use of old IT equipment and its re-deployment into the local community.

Some time ago, Director made a presentation to over 50 representatives of city firms at the Environmental Best Practices event hosted the London Stock Exchange and organized by the Corporation of London. The subject was “Secure Data Removal to enable Re-use donation of IT Equipment”


At the presentation, he confirmed that sensitive information can be securely removed and ‘wiped’ from all machines as long as companies use a reliable tools with high standards of data removal. ensures that data removal is consistent with strict standards such as the US Department of Defence clearing & sanitizing standard DoD 5220.22-M. This standard requires all storage and indexing locations on the hard drives within the computer to be overwritten three times with zeros and random characters. This is generally adopted as industry standard.

Faulty Hard Drives that cannot be wiped of data should be physically disabled prior to recycling through an authorized process.  and its partners follow ISO 27001 Information Security Standard.