Data Destruction


Data Compliance Standard
Our data erasure and processes are compliance with R2v3 standards,which is the highest standard in the industry. We use data destruction methods that meet the stringent requirements of NIST SP 800-88 and DoD 5220.22-M, along with the most rigorous industry standards. DoD is a standard compliant with U.S. Department of Defense specifications. Your data will be completely removed using the latest DoD-compliant software.

Data Safety Process
Our data safety process starts from verifying the carrier, way before transportation actually starts. The carrier have to pass the vigorous verifying process, compliance to R2v3 standards. Only sealed trucks equipped with monitors can be used, mandated by Federal DOT requirements, secures assets during in transit. Digital Surveillance starts from the moment a client’s equipment enters our warehouse. Burglar surveillance alarm with motor detectors system implemented. Our free standing building,not sharing walls with any company/organization, ensures for the highest level of safety.
Data erasure and sanitation have never been and will never be handled by contractors. These processes are exclusively performed at our 24-hour monitored, free-standing facility by highly trained data specialists. Our data destruction services are performed by trained and certified technicians to ensure that your assets are handled by qualified personnel. Each specialist has undergone comprehensive nationwide and felony background checks. We conduct annual audits of our data sanitation processes to ensure compliance with the latest R2 standards and data destruction codes.

Data Safety Method
Data sanitation involves two methods: data destruction, which physically obliterates memory components, and data erasure, which utilizes software to delete and overwrite data while automatically validating the process. Both methods ensure complete data removal. All equipment is securely stored in designated areas under continuous CCTV surveillance. If a machine fails to power up, the hard disk is physically removed and destroyed. Tekompass employs software to securely destroy data, meeting rigorous professional standards. Our adherence to R2v3 Standards ensures a verified data destruction process, mitigating any security risks associated with stored information on devices entering our facility.

100% Data Safety Guarantee
Tekompass owns a private free-standing facility. The entire building is under video surveillance 24/7, no employees are allowed to bring cell phones or cameras into the data processing area. We can guarantee no data will be leaked from our facility.
Manual Audit for Reaching 100% Data Sanitation.
As well as the use of software to sanitize data we add the extra step of a manual audit. Technician supervisors will randomly audit 2%-5% of sanitized units. If we find any data is not wiped in the manual-audit procedure, our technicians will manually check every unit’s data sanitation of this lot. Therefore, we can guarantee all units’ data will be completely removed.
Tekompass has established a process of verifying 5% of devices that are received from these facilities to verify correct categorization for sanitation, cosmetic and function.
Never have any incident of clients’ data released or exposed since we found in 2017.Our verified process ensures that data is never exposed to unauthorized sources.

Data Destruction Report for Auditing
We also provide a certificate of destruction for every asset, proving data was safely sanitized, with serial number.The data destruction report meets NIST 800-88 standards, we ensure the compliance with any data security audit requirements.