1. Asset Intake and Registration
Upon arrival, each device is logged into our asset tracking system and assigned a unique identification reference. Key information recorded includes:
-
Device type (laptop, desktop, server, mobile device, storage drive)
-
Manufacturer and model
-
Serial number
-
Storage capacity and drive type
-
Donor reference (where applicable)
Devices are securely stored in a controlled processing area until data sanitisation begins.
2. Data Erasure Methodology
All storage media are erased using Blancco Drive Eraser, an internationally recognised data erasure solution used by governments, enterprises, and data centres.
Blancco performs certified overwriting of storage media in accordance with recognised data sanitisation standards including:
-
NIST 800-88 (Guidelines for Media Sanitization)
-
DoD 5220.22-M overwrite method
-
ADISA and ISO-aligned erasure verification procedures
The software overwrites all addressable sectors of the storage device and verifies the erasure process to confirm that no recoverable data remains.
3. Verification and Reporting
Following completion of the erasure process:
-
The software performs automatic verification checks.
-
Each successful erasure generates a tamper-proof digital erasure report.
-
The report includes:
-
Device serial number
-
Drive model and capacity
-
Erasure standard applied
-
Date and time of erasure
-
Operator ID
-
Verification status
-
This provides a full audit trail demonstrating compliant data destruction.
4. Failed Erasure Procedure
If a device fails the erasure process due to hardware faults:
-
The storage media is removed from the device.
-
The drive is placed in a secure destruction stream.
-
Physical destruction is performed through certified shredding or crushing methods.
-
A destruction record is logged in the asset management system.
This ensures that no data-bearing media leaves the facility without verified sanitisation.
5. Post-Erasure Processing
Once the erasure process has been successfully completed:
-
Devices are re-tested for functionality.
-
Working devices are refurbished and prepared for redeployment or charitable distribution.
-
Non-functional equipment is responsibly recycled in accordance with environmental regulations.
6. Compliance and Security Assurance
Our ITAD process ensures:
-
Complete removal of all residual data
-
Full traceability of all processed assets
-
Compliance with recognised international data destruction standards
-
Protection of donor and organisational data privacy
This process supports our mission to securely reuse technology while maintaining the highest standards of data protection and environmental responsibility.

