top of page

1. Asset Intake and Registration

Upon arrival, each device is logged into our asset tracking system and assigned a unique identification reference. Key information recorded includes:

  • Device type (laptop, desktop, server, mobile device, storage drive)

  • Manufacturer and model

  • Serial number

  • Storage capacity and drive type

  • Donor reference (where applicable)

Devices are securely stored in a controlled processing area until data sanitisation begins.

2. Data Erasure Methodology

All storage media are erased using Blancco Drive Eraser, an internationally recognised data erasure solution used by governments, enterprises, and data centres.

Blancco performs certified overwriting of storage media in accordance with recognised data sanitisation standards including:

  • NIST 800-88 (Guidelines for Media Sanitization)

  • DoD 5220.22-M overwrite method

  • ADISA and ISO-aligned erasure verification procedures

The software overwrites all addressable sectors of the storage device and verifies the erasure process to confirm that no recoverable data remains.

3. Verification and Reporting

Following completion of the erasure process:

  • The software performs automatic verification checks.

  • Each successful erasure generates a tamper-proof digital erasure report.

  • The report includes:

    • Device serial number

    • Drive model and capacity

    • Erasure standard applied

    • Date and time of erasure

    • Operator ID

    • Verification status

This provides a full audit trail demonstrating compliant data destruction.

4. Failed Erasure Procedure

If a device fails the erasure process due to hardware faults:

  • The storage media is removed from the device.

  • The drive is placed in a secure destruction stream.

  • Physical destruction is performed through certified shredding or crushing methods.

  • A destruction record is logged in the asset management system.

This ensures that no data-bearing media leaves the facility without verified sanitisation.

5. Post-Erasure Processing

Once the erasure process has been successfully completed:

  • Devices are re-tested for functionality.

  • Working devices are refurbished and prepared for redeployment or charitable distribution.

  • Non-functional equipment is responsibly recycled in accordance with environmental regulations.

6. Compliance and Security Assurance

Our ITAD process ensures:

  • Complete removal of all residual data

  • Full traceability of all processed assets

  • Compliance with recognised international data destruction standards

  • Protection of donor and organisational data privacy

This process supports our mission to securely reuse technology while maintaining the highest standards of data protection and environmental responsibility.

electronics-recycling-cedar-rapids-iowa-process-flow.jpg

Follow us on Instagram

CONTACT US

Connect society where everyone, regardless of socioeconomic status, has access to the tools and skills necessary to thrive in a digital world.

Registered Charity: 1213285

BE THE FIRST TO KNOW

Sign up to our newsletter to stay informed

©Powered by iOSystems.

bottom of page