EMG Çevre

Secure Data Destruction Service

Secure Data Destruction Service

Data Destruction

When computers entered every area of ​​our lives, we started to do all of our work with computer systems. This has led to the proliferation of unnecessary unnecessary information in digital life. Parallel to this, the confidential data of public institutions and organizations, private companies has increased. Keeping this confidential information, which is increasing day by day, in a reliable environment has also become a problem over time.

For this, XNET created R&D activities, designed special devices and software, and established a number of standards for safe data destruction. The mentioned standards consisted of conditions such as recycling, environmental pollution and conditions of use. After the safe destruction of the data, there is also the option of reusing the data logger to be destroyed, or not.

Secure destruction service is provided in 3 different ways:

Method of physical destruction

It can be done using a variety of methods, including incineration, grinding, smelting, and chemical treatment. This method is done to render the drive inoperable and to damage the media on which the data resides.

Physical destruction is the definitive solution when properly handled. There is no question mark in your mind, it allows you to return to your daily life and is the definitive result. However, these operations should definitely be carried out by trained and authorized personnel, with devices specially designed for these works.

Software data destruction

It is not a method preferred by corporate companies and government offices. It is usually a method that individual users resort to. The data that has been destroyed by writing can be reused safely because it does not contain any data on the hard disk surface. Hard disks have more value in recycling.
It is a method implemented by overwriting each of the drive sectors with meaningless data patterns. The destruction process works on data with a combination of 1 and 0. The security level increases with the number of times it is written to the data on the entire hard disk . It is best to use certified software for this deletion, and a report is made indicating the processes of this deletion and with which software it was made.

Data destruction with magnetic field distortion method

It is done by using a machine that generates a strong electromagnetic field to destroy the data on the hard disk. Devices that destroy data by magnetic field disturbance method are generally expensive and their maintenance is very important. These devices are only used for magnetic field data destruction.

  • Request Form

    MOTAT request is opened via ECBS System for waste delivery.

  • Waste Receiving

    Disposal is completed with Hazardous Waste Transport Vehicles.

  • Waste Acceptance

    The wastes transported to the facility by vehicles with MOTAT are accepted through the ECBS System.

  • Sort

    Accepted wastes are classified according to their types.

  • Hazard Elimination

    Hazardous wastes are pre-treated.

  • Waste Treatment

    Wastes go through separation, shredding and data destruction processes.

  • Reporting

    Necessary reports are provided to authorized institutions.