Home > Resource Center > Blog > Electronic Data Destruction 101: Shredding
Electronic Data Destruction 101: Shredding

Electronic Data Destruction 101: Shredding

Posted in Blog

Glenn Laga

Shredding electronics is the most secure and cost-effective way to dispose of all types of end-of-life computer hard drives, solid state drives, media tapes, printed circuit boards, tablets, smartphones, CDs and DVDs, film and video tape, motherboards, silicon chips and credit card swiping devices. Shredding services are best for businesses with large data centers (enterprise sites) or a stockpile of old hard drives and media tapes because it is a fast, efficient and cost-effective process.

 What is electronic shredding or e-shredding?

Electronic data destruction by shredding destroys the drive platters, mechanisms, and electronic components rendering the data virtually unrecoverable. Complete physical destruction and smaller shred sizes ensure that your digital data is permanently destroyed. Using hard drives as an example, the typical shredding process consists of the following steps:

  1. Remove hard drive from the host unit.
  2. Capture the serial #. (Option: marry serial # to host unit for improved chain of custody documentation.)
  3. Issue chain of custody documents to transfer possession/ownership of the equipment and move to mobile data destruction truck.
  4. Feed hard drives into shredder.
  5. Shredder slices and dices into small pieces.
  6. Shredded byproduct recycled by R2 or e-steward recycler.
  7. Certificate of data destruction listing serial # and location and date.

Why shred?

Thirty percent of data leakages occur because someone finds valuable data on discarded equipment. The bigger the data, the larger the risk for a big data breach.

 Which shredding service should you choose?

Depending on the amount and type of material that requires shredding, many companies choose onsite hard drive shredding providers. Your personnel can witness the end-to-end process to maintain the highest level of security and eliminate security and chain of custody concerns.  Guardian recommends that you ensure that your provider will scan and shred all hard drives and media tapes etc. and provide a certificate of destruction that confirms all data is appropriately destroyed.  And, choose an electronic data destruction company that will also ensure the proper recycling and disposal of shredded materials in accordance with environmental protocols.

To check if shredding is the right form of electronic data destruction for you we recommend that you consult with your IT equipment VAR or contact Guardian directly. They can review the volume, and type of equipment, frequency of disposition, and factors such as industry regulations, customer requirements and your company IT management, security and privacy policies.

Electronic Data Destruction 101: Chain of Custody

Ready to get started?

Get a quote > Discuss your challenge >

Glenn Laga Nominated as President-Elect for the 2023 i-SIGMA Board of Directors

How will i-SIGMA continue to enhance secure information lifecycle management? Glenn Laga weighs in on the trends that the Guardian Data Destruction team has identified …

Glenn Laga Nominated as President-Elect for the 2023 i-SIGMA Board of Directors Keep Reading >

Keep Reading >

Think you have an air-tight data destruction plan? How we found 18,000 GB of unknown, unidentified and unrecorded server data storage in a 1-day audit.

Hidden hard drives, loaded with data, are walking out of data centers. Not in pockets or backpacks. They’re actually just completely missed, overlooked, data storage …

Think you have an air-tight data destruction plan? How we found 18,000 GB of unknown, unidentified and unrecorded server data storage in a 1-day audit. Keep Reading >

Keep Reading >

Retired IT assets are a big data breach problem if you’re skipping a visual hunt for installed, hidden and state-of-the-art hard drives

Worried about cybersecurity? Add overlooked data storage on retired enterprise IT devices to your IT asset disposition process. Because the physical shape and size of …

Retired IT assets are a big data breach problem if you’re skipping a visual hunt for installed, hidden and state-of-the-art hard drives Keep Reading >

Keep Reading >

Stay in the know

Get relevant information right in your inbox

We do not sell or share your information with anyone

Previous Next
Close
Test Caption
Test Description goes like this