Degaussing magnetic data storage media

Degaussing magnetic data storage media

Degaussing magnetic data is the process of decreasing or eliminating a remnant magnetic field.

(Wikipedia) Data is stored in the magnetic media, such as hard drives, floppy disks, and magnetic tape, by making very small areas called magnetic domains change their magnetic alignment to be in the direction of an applied magnetic field. This phenomenon occurs in much the same way a compass needle points in the direction of the Earth’s magnetic field. Degaussing, commonly called erasure, leaves the domains in random patterns with no preference to orientation, thereby rendering previous data unrecoverable. There are some domains whose magnetic alignment is not randomized after degaussing. The information these domains represent is commonly called magnetic remanence or remanent magnetization. Proper degaussing will ensure there is insufficient magnetic remanence to reconstruct the data.

Erasure via Degaussing magnetic data may be accomplished in two ways: in AC erasure, the medium is degaussed by applying an alternating field that is reduced in amplitude over time from an initial high value (i.e., AC powered); in DC erasure, the medium is saturated by applying a unidirectional field (i.e., DC powered or by employing a permanent magnet). A degausser is a device that can generate a magnetic field for degaussing magnetic storage media

Degaussing magnetic data

Irreversible damage to some media types

Many forms of generic magnetic storage media can be reused after degaussing, including audio reel-to-reel tape, VHS videocassettes, and floppy disks. These older media types are simply a raw medium which are overwritten with fresh new patterns, created by fixed-alignment read/write heads.
For certain forms of computer data storage, however, such as modern hard drives and some tape backup drives, degaussing renders the magnetic media completely unusable and damages the storage system. This is due to the devices having an infinitely variable read/write head positioning mechanism which relies on special servo control data (e.g. Gray Code) that is meant to be permanently embedded into the magnetic media. This servo data is written onto the media a single time at the factory using special-purpose servo writing hardware.

The servo patterns are normally never overwritten by the device for any reason and are used to precisely position the read/write heads over data tracks on the media, to compensate for sudden jarring device movements, thermal expansion, or changes in orientation. Degaussing magnetic data indiscriminately removes not only the stored data but also the servo control data, and without the servo data the device is no longer able to determine where data is to be read or written on the magnetic medium. The medium must be low-level formatted to become usable again; with modern hard drives, this is generally not possible without manufacturer-specific and often model-specific service equipment.

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

You can further inquire following service from Data Terminator: Degaussing service in Singapore, Degausser in Singapore,NSA degausser Singapore,US DoD degausser Singapore,IT security, IT asset disposal, line of sight, on-site, secure data destruction.

Hard Disk Cloning

Hard Disk Cloning

Data Terminator uses tools such as the PSIClone™ to “clone” hard disks for customers’ usage. The PSIClone™ is packed with useful features for the forensic investigator. Designed with forensic data integrity in mind, a key feature of PSIClone™ is that the user is unable to write to the ‘source’ side of the device. With the included data recovery software, PSIClone has everything you need to perform data recovery right out of the box.

While PSIClone™ is a drive-to-drive cloning and imaging device, it stands out from other such devices because PSIClone™ has the ability to perform a robust compression while imaging a drive thereby allowing you to place images of multiple drives on one dump drive. This saves time and money.

Hard Disk Erasure service in Singapore

Hard Disk Erasure

Hard Disk Erasure is the method of securely remove data from hard disk while keeping the hard drive functioning or reusable. If you need to erase the data on a SCSI, IDE/PATA, SATA, laptop or SAS hard drive and then reuse or recycle hard drive, Data Devices’ line of DOD-approved hard drive erasers overwrite and erase the data on the drive, ensuring complete data security. The DOD-approved application WipeOutoverwrites and erases the drive 8 times. This guarantees the original data on the drive is unrecoverable to Department of Defense specifications. These units come standard with WipeOut Fast, which provides fast and comprehensive erasure. Our line of hard drive erasers and duplicators also supports solid state flash memory.

Data Terminator provides an ISO 9001 Certified for high quality Secure Electronic Data Erasure Services on any storage media such as PATA, SATA, or SCSI. There are many options of hard disk erasure. One of it is Software Erase, by overwriting the sector of the disk with a new value with certain amount of passes to ensure that the data is harder to recover. But we also provides a better option than software erase, “Secure Erase” which initiate the drive internal secure erase command, security erase unit, based on the ATA specification by the T13 technical committee.

If you have any request on data removing / restoring and degaussing, especially Hard Disk Erasure, please contact Data Terminator for a help.

Hard Disk Erasure

  • Kindly contact us for more details.
  • Or visit our website to find out more service and products

You can further inquire following service from Data Terminator: IT asset disposal, line of sight, on-site, secure data destruction,Degaussing service in Singapore, Degausser in Singapore,NSA degausser Singapore,US DoD degausser Singapore,IT security.

What is Degaussing?

Degaussing is a separate process from the computer system. It is a process that utilizes a machine to produce a strong electromagnetic field that destroys magnetically recorded data on a magnetic media. (E.g. hard disk and tape media…)

Who and Why degaussing is needed for your media?

• Radio/Television broadcasters: enables expensive tapes to be re-used.
• Computer departments of corporations: allows re-use of back up tapes and safe disposal of information from PC hard drives.
• Data Storage Companies: data no longer needed can be easily and efficiently erased.
• Defense Organisations: confidential and top secret information can be erased.
• CCTV Operators: allows VHS tapes to be re-used again and again.
• Audio/Video duplicators: allows re-use of any production over runs and returned out of date tapes.
• Financial Services: Banks and insurance companies can use a degausser to re-use magnetic media for voice logging systems.
• Emergency Services: Re-use tapes used in voice logging systems.
• Hospitals: erase sensitive information held on magnetic media, such as patient records no longer required.
• Universities: allows student records that are no longer needed to be erased.

 

Degaussing Services in Asia

Degaussing Services

Degaussing services are becoming vital services for ending of data life in storage media. Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization or degausing services, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

Data Terminator provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available.

Degaussing Services

Kindly contact us for more details.

Or visit our website to find out more

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

Secure Data Destruction

Data Terminator offer various Secure Data Destruction Services

secure data destruction

 

Hard Disk & Tape Sanitization

One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal.

In fact, DoD Requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

CD/DVD Optical Media Destruction

Destroying CD/DVD Optical Media doesn’t have to be a problem.

Data Terminator has a variety of machines to meet NSA/CSS Specifications for CD/DVD Optical Media Destruction.

IT Asset Disposal

Proper IT asset disposal is becoming more and more important not just on the environmental issues but also on data confidentiality.

Many organizations do not have the dedicated resources or the bulk quantity to justify the investment of procuring the equipment. They may choose to outsource such destruction and disposal. Outsourcing can be affordable and safe when done properly. If you choose this option, ask what methods will be used, where your items will be kept prior to destruction, or if there are any on-site services, what happens to destroyed waste, and what proof you will get that those items were actually destroyed.

Data security is an ongoing process, by being aware of the threats and understanding the destruction options, you will be in a much better position to protect your business and yourself. You will have complete peace of mind that you have left nothing behind.

Data Terminator provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

You can further inquire following service from Data Terminator: NSA degausser Singapore,US DoD degausser Singapore, Degaussing service in Singapore, Degausser in Singapore, IT security, IT asset disposal, line of sight, on-site, secure data destruction.

 

Enterprise Security Solutions

Enterprise Security Solutions

Enterprise Fraud Management

Enterprise Fraud Management (EFM) is a solution for detection of any suspicious activity or fraud incident in the Enterprise environment.

SSH Communication Security

SSH Communication Security providing an overall coverage for secure access communication on a network. This include monitoring, auditing, and controlling access of the communication.

User Activity Auditing & Monitoring

Keep track of the administrator or end user activity from a centralize management. It also covers user access to remote servers, virtual desktops, or networking devices, and records these activities

Advanced Persistent Threat (APT) Detection

APT detection is a live memory analysis that detects and analyzes threats on compromised endpoints. Contrary to the antivirus or IDS approach of matching suspected malware or traffic patterns with known malware signatures, the live memory analysis agent gives the analyst a view from a centralized console of what is happening inside the computer’s memory. This view can quickly expose a malware infection, regardless of whether a signature exists or not.

Network Access Control

Network Access Control (NAC) provides a network with the mandatory extra layer of protection for all existing security policies. It allows the Network Administrator to configure access parameters for the physical network ports and determine which devices are allowed access. It is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

DB Security

A Unified Database Solution including: Security, Caching, Auditing and Masking. The solution features a high-availability configuration to ensure business continuity. It has a broad range of security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability.

Endpoint Security.

The End Point Data Protection Suite delivers complete visibility, control, and protection of enterprise endpoints. It provides a comprehensive data protection solution in a single product, with a single management server and a single, lightweight agent.

Secure Storage Devices

Data Terminator offers Secure Storage Devices

Aegis Secure Key – USB 2.0 Flash Drive

Encrypted USB Flash Key with PIN access

Quick Overview

  • Military grade Full-disk AES 256-bit CBC Hardware Encryption
  • PIN activated 7-15 digits – Alphanumeric keypad use a memorable number or word for your PIN
  • Dust and water resistant
  • No software or drivers required
  • OS and platform independent – compatible with Windows, Mac, Linux and embedded systems
  • Works with any USB/USB On-The-Go devices

Aegis Padlock – USB 3.0

Encrypted USB 3.0 Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Integrated USB 3.0 cable – Data transfer speeds up to 10X faster than USB 2.0
  • Choice of real-time 128-bit or 256-bit Military Grade AES-XTS Hardware Encryption
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Aegis Padlock DT – USB 3.0 Desktop Drive

Encrypted Desktop Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Choice of real-time 128-bit or 256-bit Military Grade AES-XTS Hardware Encryption
  • Solid Aluminum Enclosure
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

 

Apricorn Padlock – USB 2.0

Encrypted Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Allows up to 10 PIN Passkeys
  • Choice of real-time 128-bit or 256-bit Military Grade AES Hardware Encryption
  • Integrated USB cable
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Aegis Padlock Pro – eSATA | USB 2.0

Encrypted Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Real-time 256-bit AES Hardware Encryption
  • Ultra-fast eSATA and USB interface for data transfer rates of up to 90MB/sec
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Safend Data Protection Suite

Q: What does Safend do?

Safend Data Protection Suite protects organizations from data leakage and theft with a single software product providing granular port and device control, transparent hard disk encryption, comprehensive removable media encryption and accurate content control. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity.

Q: What is an “endpoint”?

“Endpoint” refers to all enterprise workstations, laptops, and kiosks.

Q: What kinds of devices are commonly connected at endpoints?

A myriad of devices are connected to endpoints, including media players, handhelds, smart phones, printers, scanners, multi-function peripherals (scan/fax/print), Disk on Keys, CD/DVD-RWs, removable hard-drives, and other portable storage devices.

Q: Where can I get answers to questions not addressed here?

You may contact Data Terminator at info@data-terminator.com This e-mail address is being protected from spambots. You need JavaScript enabled to view it for any questions concerning Safend.

Q: How can I evaluate Safend products?

To request an evaluation of the Safend Data Protection Suite go to the Data Protection Suite page or click here.

The Safend Auditor can be downloaded from our Safend product page or by clicking here.
To request an evaluation of the Safend Protector go to the Protector product page or click here.
To request evaluation of the Safend Encryptor go to the Encryptor product page or click here

Q: What new Safend products are on the horizon?

Safend has a very aggressive development cycle and strives for frequent product updates. Future versions will include even more granular control of an expanded number of endpoints, including mobile devices, and also include enhanced scalability and management features.

Since Safend recognizes the importance of Content Awareness as part of a data protection solution, we intend to introduce a new add-on product to our offering, Safend Inspector, during 2010. This product will further strengthen our offering by providing a comprehensive, accurate endpoint based data protection solution which enforces a data centric security policy across approved data transfer channels.

Contact inspector.beta@safend.com This e-mail address is being protected from spambots. You need JavaScript enabled to view it to join the Safend Inspector Beta Program

Q: Does Safend have any type of ‘software assurance’ or maintenance program?

Yes, Safend offers a comprehensive maintenance and support program for all customers. This program assures customer access to software bug fixes, updates and version releases. The program can be purchased for a one-, two- or three-year period, which can then be extended on an annual basis.

Q: How do Safend products compare to other endpoint solutions available today?

Safend Data Protection Suite has several advantages over other endpoint security products:

Safend Data Protection Suite allows you to control all your data protection measures with a single management server, single management console and a single lightweight agent.

Operational friendly deployment and management

Best of breed port and device control, with instant visibility of connected devices (both current and past), and granular, flexible control over all physical and wireless ports.

Hard disk encryption is completely transparent and does not change end user experience and common IT procedures

Comprehensive and enforceable removable media encryption

Full control over sensitive data both inside and outside organizational network

Track file transfers from encrypted devices even on non-corporate computers

Q: Why do I need additional endpoint protection if we have the latest versions of Microsoft Windows and a firewall deployed?

Operating systems such as Microsoft Windows XP have only limited endpoint security functionality built-in. Endpoint security is not included in domain controlling and management software, nor in network security solutions such as firewalls. A separate, incremental solution like Safend is required to gain full visibility and granular, flexible control of all endpoints.

Q: What products does Safend offer and what do they do?

Safend Data Protection Suite protects organizations from data leakage and theft with a single software product. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity.

Safend Data Protection Suite consists of Safend Protector with its two add-on modules – Safend Encryptor and Safend Reporter. Safend Protector provides an enterprise grade, client-server management infrastructure for endpoint port control, device control and removable media encryption. Safend Encryptor, a license activated add-on module, expands the product security capabilities to protect the data on the endpoint in case of lost or theft. Safend Reporter add-on module provides visibility into the security status of the organization with automatic report generation. All functionality is provided by a single software product, with a single management server and a single lightweight agent.

Safend Auditor is additional clientless software for immediate risk assessment through endpoint port and device auditing.

Q: Is endpoint security a serious issue?

Endpoint security is a bona fide issue documented by analysts, the media, and organizations that have suffered losses because they did not have an endpoint security solution in place.

While most organizations adequately protect Internet connections via TCP/IP ports (for example, using a firewall), endpoints are often overlooked. An increasing amount of data points to the need to add endpoint protection to any proactive security policy.

Q: What risks are associated with these devices connected at endpoints?

Endpoints can present serious risks to the network and the organization as a whole:

Data Leakage: Large amounts of sensitive information and Intellectual Property can be stolen through endpoints

Infiltration: Malicious code including viruses, worms and Trojan horses can be infiltrated through endpoints

Non-Compliance: Personal information may be exposed at endpoints, leading to non-compliance with data privacy laws such as HIPAA and the Sarbanes Oxley Act.

Information leakage prevention service

Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Information leakage prevention is critical for your business.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

When a file is erased or deleted from your computer, the actual data in the file is not gone forever. The space utilized by that file is simply marked as “free” for use by other data. The case also applies to hard disks which are spoilt or with bad sectors. The fact is your data is still lurking in those hard disks that have no operational use.

Many people would think that once other data is written in that space, the original data becomes gone forever. However, with data recovery tools readily available, it is now possible to recover data even after it has been written over a few times.

Data Terminator provides secure and comprehensive data sanitization equipment and services with full compliance and quality to give our customers complete peace of mind. The secure data sanitization equipment used are all NSA-certified and our data sanitization process is ISO-certified.

Degaussing FAQs

Q: What is Physical Drive Destruction?

To positively prevent data from recovery; disks can be removed from disk drives and broken up, or even ground to microscopic pieces. DoD 5220.22M recommends degaussing followed by physical destruction of the storage medium (the magnetic disks) for data classified higher than Secret. Even such physical destruction is not absolute if any remaining disk pieces are larger than a single 512-byte record block in size, about 1/125″ in today’s drives. As linear and track densities increases, the maximum allowable size of disk fragments become ever smaller. Destroyed disk fragments of this size can be image restored by magnetic microscopy.

Some storage products are more easily destroyed than hard disk drives, such as magnetic disk data cartridges, tape cartridges, secure USB drives, and optical media.

Q: What is Non-destructive Data Erasure (Data Sanitization)?

Non-destructive data erasure supports wiping and permanently cleaning for all traces of deleted files and folder, administrator documents and other similar files or folders for maintaining computer privacy and enhancing system performance. It deletes all the data, free space, slack space, deleted memory chunks of data even if they’re not existing in a file, removes huge files stored on HDD of Windows OS and any removable media and cannot be recovered or restored by any data recovery software.

Q: What is Sanitization of Data?

Data Sanitization is the process of erasing (sanitizing) or destroying sensitive information in storage devices to meet legal compliance requirements thereby protecting user data from unauthorized use.

Q: What is Degaussing (or Demagnetizing)?

Degaussing is the process for reducing the magnetization of a magnetic storage device to zero by applying a reverse (coercive) magnetizing force, rendering any previously stored data unreadable and unintelligible, and ensuring that it cannot be recovered by any technology known to exist.

Q: What is Coercive Force?

A negative or reverse magnetic force applied for the purpose of reducing magnetic flux density.

Q: What is a degausser?

Degausser is an electrical device or permanent magnet assembly which generates a coercive magnetic force for the purpose of degaussing magnetic storage devices or other magnetic material. In order to be effective in sanitizing data, the degausser needs to be evaluated by an authority (e.g. US DoD, NSA/CSS) to meet the *oersted strength as claimed by the manufacturer.

*Oersted: A cgs unit of magnetic field strength, symbol: Oe. Oersted is a measurement applied to magnetic media.

Q: What is Magnetic Force Microscopy (MFM)?

The Magnetic Force Microscope is a variation of the Atomic Force Microscope, capable of providing high resolution, 3-dimensional images of magnetic fields. Magnetic Force Microscopy (MFM) technology can be used to probe magnetic storage media like hard disk and magnetic tapes for data residue.

If the magnetic data storage media such as hard disks and magnetic tapes have been completely degaussed, there will not be any data residue on the hard disk.

Q: What needs to be sanitised?

CDs and DVDs

Hard Drives

All forms of Magnetic Media, e.g. backup cartridges, tapes, zip disks and floppy disks

Optical and Flash Drives, e.g. thumb drives and memory storage cards

Q: How then to ensure that data are erased securely?

Degaussing – Using secure data destruction equipment such as hard drive degaussers to permanently eliminate data from magnetic media. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. In fact, DoD requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

Shredding – Using secure data destruction equipment to completely pulverize and reduce the media to dust.
Disintegration – Using secure data destruction equipment to destroy bulk materials into particles that cannot be reconstructed.

Q: Does physical destruction of hard disk drives make the data unrecoverable?

Hard disk drives can be removed from the computers, smashed, broken up, drilled holes and even shredded to smaller pieces to prevent the data from being recovered. However, even such physical destruction is not absolute if any remaining disk pieces are larger than a single record block in size, about 1/125″ in today’s drives (Note that as the linear and track density of magnetic recording increases the resulting recoverable pieces of disk must become even smaller if all chances of data recovery after physical destruction alone are to be zero).

By physically destroying the outer surface of the hard disks does not ensure that the data are properly sanitized/degaussed. Data can still be recovered by a process known as MFM (Magnetic Force Microscopy) ‏

Q: Why the need to ensure that electronic data in storage media are securely erased and destroyed?

By simply discarding obsolete or damaged storage media, traces of sensitive information that are being left behind can be recovered easily. This compromises the security of the confidential data.

HDD Hard disk drive Crusher

HDD Hard disk drive Crushers

 

SEM Model 0101 Sledgehammer Hard Drive Crusher

This hard drive “crusher” destroys all hard drives regardless of their size, format or type up to 1.85″ High including desktop, laptop and server drives.

NEW…..In models purchased after 08-15-11 ( Serial number 1404 or greater) hard drives mounted in caddies or with rails or handles  less than 9″ deep that are used in rack mounted server environments can been crushed without having to disassemble the drive  from the caddy, rail or handle.

At the touch of a button, the Model 0101 Sledgehammer Hard Drive Crusher delivers a staggering 12,000 pounds (or 490K PSI ) of force to a conical punch causing catastrophic trauma to the hard drive chassis while destroying the internal platter. The unit is quiet, smooth and virtually vibration free. Destruction takes only 8 seconds ( can destroy up to four laptop drives in one 8 second cycle ).

A safety interlock prevents operation of the hard drive crusher while door is open to protect operators and an emergency e-stop immediately halts operation when pressed.

SEM Model 0100 Sledgehammer Manual Hard Drive Crusher

No power required manual operation. This hard drive crusher meets the physical destruction piece of the NSA Degauss and Destroy Requirements when used with an NSA approved degausser.  Up to Three Tons ( 6,000 Lbs ) of crushing force is exerted on hard drives.  Destruction time is five seconds.

Datastroyer ACD Automatic Crushing Device

Hard Drive Destruction

Basic Specs of the Datastroyer ACD Automatic Crushing Device

    • Hard drive sizes: 1”, 0.65”, 1.65”, laptop and 1.8”
    • Typical Commercial Drives: approx. 4 lbs. exertions
    • Hardened (Heavy Shielded): approx. 12 lbs. exertion
    • Operating time: approx. 8 seconds or less per drive, dependent on operator
    • Destruction method: bends platter, damages heads, motor and circuit board
    • Power: 100 to 250 VAC
    • 50 or 60 Hz (specify voltage when ordering)

Weight: approx. 49 lbs (shipping weight approx. 64 lbs)

  • Dimensions: 21″H x 7.25″W x 11-5/8″D (13″W with handle)

Features of the Datastroyer ACD Automatic Crushing Device

  • Rugged Design
  • Tested and used by the NSA and DOD for destroying hard drives
  • Green and Environmentally-friendly
  • adapters available to accommodate additional drives
  • automatic operation for hands free hard drive destruction
  • If power goes out, manual crank can continue destruction
  • One year parts warranty

Datastroyer MCD Manual Crushing Device

Hard Drive Destruction

Basic Specs of the Datastroyer MCD Manual Crushing Device

  • Hard drive sizes: 1”, 0.65”, 1.65”, laptop and 1.8”
  • Typical Commercial Drives: approx. 4 lbs. exertions
  • Hardened (Heavy Shielded): approx. 12 lbs. exertion
  • Operating time: approx. 8 seconds or less per drive, dependent on operator
  • Destruction method: bends platter, damages heads, motor and circuit board
  • Weight: approx. 35 lbs (shipping weight approx. 50 lbs)
  • Dimensions: 16″H x 7.25″W x 9.25″D

 

Features of the Datastroyer MCD Manual Crushing Device

  • Rugged Design
  • Tested and used by the NSA and DOD for destroying hard drives
  • Green and Environmentally-friendly
  • No power required
  • easy hand crank operation
  • One year parts warranty



HDD Hard Disk Drive Eraser

WipeDrive

WipeDrive is an erasure that able to wipe all data from your hard drives in accordance with some well-known standards such as (DoD 5220.22-M, HMG IS5 Baseline, HMG IS5 Enhanced, Canada Ops-II, US Army AR380-19, US Air Force 5020, German VSITR, NAVSO P-5239-26, NCSC-TG-025, Russian GOST P50739-95) making it unrecoverable.

By completely erase your hard drive, it protects your identity and other personal information, when buying, selling or throwing your computer away. It may also improve your system performance.

Hammer

• NIST Approved – Hammer erasure tool is compliant with NIST 800-36 and 800-88

• Supports Multiple Devices At One Time – Hammer erasure tool is able to process up to 4 hard disks at once

• All-In-One Device – Hammer erasure tool can not only erase, but also, partition, format and image source data to each of the drives.

The Hammer is a hard disk drive erasure tool. The device will securely erase all data written to the attached drives, up to 4 drives at once.

Both PATA and SATA interfaces are supported. Secure Erase is implemented allowing guaranteed, uninterrupted erasure of all data stored on the media.

If a drive does not support the secure erase command, NIST 800-36 and 800-88 compliant data erase methods are used.

Once each connected device is erased, the user can configure the system to partition, format and image source data to each of the drives.

Once the process has been started, the Hammer will execute each step until complete.

Hammer is a one step tool that will erase all data from a drive and prepare the drive to be redeployed into service.

Features:

• Secure Erase / Pattern Erase
• Auto Partitioning / Auto Formatting
• Auto Image Copy
• NIST 800-88 Compliant / NIST 800-36 Compliant
• SATA and PATA interfaces
• High Speed UDMA transfers
• Verify after complete
• Portable
• Up to Four Drives at one time
• USB 2.0 for storing and printing verification logs

Benefits

• Provides peace of mind that confidential data will not fall into the wrong hands.

• Meets data sanitization standards set by the US National Institute of Standards and Technology (NIST) and The US Department of Defense

 

HDD Hard disk drive Shredders

Whitaker Brothers HDD Hard disk drive Shredders

Whitaker Brothers is recognized worldwide as a leader in the data destruction industry with paper shredders and disintegrators/granulators from manufacturers like MBM/Destroyit, Martin Yale and HSM. Over 65 years of experience enables us to respond with products renowned for quality, durability and value as solutions to the ever-changing security needs of our customers and the evolving field of data storage.

Whitaker Brothers105 Hard Drive Shredder

(Single Stage with No Conveyor)

Basic Specs of the 105  Shredder

  • Cutting Size: 20mm x 30-50mm (random length)
  • Voltage: 3 x 220 V/ 60 Hz
  • Weight: 1870 lbs
  • Dimensions: 54″H x 46″W x 71″D

Features of the 105

  • A high performance hard drive/magnetic tape shredder that can handle CDs, DVDs and USB sticks as well!
  • Multi-functional operating and display element for continuous and reverse operation.
  • Capacity rates are dependent upon hard drive size, thickness, and proper power.
  • Energy-efficient motors designed for high throughput.
  • Automatic stop and reverse in the event of a jam.
  • 2 years parts warranty, 90 days labor.

SEM Hard Drive Shredder

When it comes to the fast, safe, easy hard drive shredding, nothing outperforms the Jackhammer™ Hard Drive Shredder from SEM.
Designed with Operator Safety, Ease-of-Use and Mobility in mind, the SEM Model 0302-1.0 Jackhammer Hard Drive Shredder from SEM will shred up to 2,000 drives per hour at an end particle size of just 1.0″ wide.  It is also ideal for shredding optical media and other small electronic devices such as cell phones, blackberries, Printed Circuit Boards (PCBs), memory sticks, PDAs, and similar electronic data storage devices.
This slow speed, high torque hard drive shredder uses specially designed saw tooth hook cutters to chew up to 25 hard drives in a minute and features the following:
  • Take-away Conveyor with vulcanized rollers
  • Take-away Conveyor cover for added protection
  • Non metallic collection bin
  • Modified in-feed chute dimensions for operator safety
  • Safety curtain flaps
  • Easy access clean out panels
  • Sturdy lockable casters
  • Exterior powder coated paint
  • Integrated Hour Meter
  • 2 year warranty
  • OPTIONAL ~ HEPA Air Filtration System
  • OPTIONAL ~ Fork Pockets

Model 0300 Hard Drive Shredder – 1.5″ Particle Size

Low to medium volumeuse in an Office Environment – shreds up to 500 drives per hour.

Model 0301 Hard Drive Shredder-1.5″ Particle Size

Medium to high volume use – shreds up to 2,000 hard drives per hour.

Model 0302-1.5 Hard Drive Shredder-1.5″ Particle Size

Medium to high volume – shreds up to 2,500 Hard Drives per hour.

Model 0302-1.0 Hard Drive Shredder – 1.0″ Particle Size

Medium to high volumehard drive shredding – up to 2,000 Hard Drives per hour.

Model 0302-.75 Hard Drive Shredder-.75″ Particle Size

Medium to high volumehard drive shredding – up to 1,500 Hard Drives per hour.

SEM Model 0304-1.5 Hard Drive Shredder-1.5″ Particle Size

Extreme high volume – shreds up to 3,500 Hard Drives per hour.

SEM Model 0304-1.0 Hard Drive Shredder – 1.0″ Particle Size

Extreme high volume hard drive shredding – up to 3,000 Hard Drives per hour.

SEM Model 0304-.75 Hard Drive Shredder .75″ Particle Size

Extreme high volumehard drive shredding – up to 2,500 Hard Drives per hour.

HDD Hard disk drive Degaussers

Proton Hard disk drive Degaussers

Proton T-4 Hard disk drive Degausser

• T-4 complies with DoD requirements for destroying classified information on magnetic media and is on the NSA EPL. (October 2009)

• Independent tests indicate an Effective Magnetic Field (EMF) of 40,000 gauss and 13,330 Oersteds over 2.5 times the power of existing NSA test levels.

• Automatic On/Off operation.

• Lightweight enables table top or floor operation.

• Manufactured in the USA in ISO 9001 certified facilities.

• Destruction of confidential, sensitive and classified data is in accordance with recognized standards and provides compliance under FACTA, HIPAA, GLB, DPA, etc.

• Confidence that data on high density hard drives is rendered unavailable and unusable.• Minimal training and simplicity of use.• Fits easily into existing operations.

Proton T-1.5 Hard disk drive Degausser

  • Packs a punch – Strongest drawer style degausser available today, producing an effective magnetic field of 1.5 Tesla, capable of erasing up to 3 TB hard disks
  • Peace of mind – Meets data sanitization standards set by NIST & DoD
  • Hassle-free – Simple one touch button starts the swift degaussing process

The new Proton T-1.5 is a drawer style degausser that destroys data on hard drives and other magnetic media to help organizations protect sensitive information and stay in compliance with various Government regulations for data sanitization.

The T-1.5 is automatic, light weight and simple to use so it will fit easily into existing operations.

An effective magnetic field of 1.5 Tesla makes it the strongest drawer style degausser available today capable of erasing 3 TB drives.

As hard drive and other magnetic media densities increase, the T-1.5 will continue to be the ultimate guard against data loss that can lead to costly data breaches.

Proton 8000 Hard disk drive Degausser

  • Quiet Performer – Low-noise, compact unit with “industrial strength” flux fields.
  • Multiple usage methods – Foot controller available for hands-free operation to fit your organisation’s needs.
  • One Size Fits Many – Wide range of magnetic media supported including compact cassettes, hard disks and broadcast & video storage tapes.

The Proton Model 8000 Table Top unit is a low-noise, compact unit with ‘industrial strength’ flux fields. It features a foot-control for hands-free operation and can degauss a wide range of magnetic media, including ¼”, ½”, 1″ and 2″ thick reels, and up to 16″ diameter reels.

Other computer media includes compact cassettes, QIC, DC600, 2000, Tk50, 70, 85, 3480/3490/3590E, 4mm/8mm, Extrabyte/Travan, and any Type I, II or III computer media in addition to 3″½ and 5″¼ hard drives.

Broadcast & Video Media – VHS, S-VHS, U-matic, U-matic SP, 1″, 2″, B, and C format, Beta SP M1/M3, D1, D2, D3, DVC-PRO, R-DAT, Pancakes, and 16″ Mirror Mother Master Tape.

The Proton 8000 employs an exclusive magnetic resonance design that insures full-power to the magnetic loop circuit, (magnetic media) for full, deep degauss levels.

The Proton 8000 has a large work surface with operating instructions in full view, and a degaussing coil current monitor providing visual confirmation of full degauss levels.

A ‘soft-start’ design eliminates circuit-breaker problems at turn-on, and unlike other degaussers, has maximum erasure field plus maximum erasure time. Status indicator lights confirm operation mode.

All accessories are included – reel guide, foot control, hard drive handling container, detachable line cord and detailed instructions.

Proton 1100 Hard disk drive Degausser

  • NSA Approved – Proton 1100 is on the NSA Approved Product List
  • Peace Of Mind – NIST & DoD approved for all media up to 2,870 Oe
  • Tiny Form Factor – At only 13cm long and 400g in weight, this handheld degaussing wand is convenient during usage as well as storage
  • The Proton 1100 Degaussing Wandis designed to provide maximum security level media degaussing for a wide range of magnetic media.A multi-polar design insures minimum flux levels of 6,000 gauss and full hysteresis of all magnetic states.Conventional magnetic recording devices (recording heads) cannot provide the flux density required to totally erase magnetic signatures. The magnetic information remains in the media after conventional erasing techniques and reformatting procedures. Only a high-energy magnetic circuit that provides a full-cycle (+ – + -) field can reliably erase this remnant magnetic information to a full security level.A magnetic shield is provided for safe storage of the degaussing wand.Proton 1100 effectively degausses disk drives, diskpacks, drum type memories, floppies and any flat-surface magnetic memory.

 

SEM Mag EraSURE

SEM Mag EraSURE P3

• Permanent Fixed Rare Earth Magnet Technology
• Ergonomically designed portable workbench complete with drive staging area.
• Improved, larger aperture accepts full size VHS formats.
• NSA-approved degausser for LMR as well as PMR technology. This extends the life of this product well into the future.

• Provides peace of mind that confidential data will not fall into the wrong hands.

• Meets data sanitization standards set by the US National Institute of Standards and Technology (NIST) and The US Department of Defense.

• Environmentally responsible with low power consumption of 1 Amp.

• Highest Rated NSA Approved Degausser in the market – Supports up to 6,000 Oe for Hard Disks & 2,600 Oe for Tapes

• State-Of-The-Art Technology – World’s fastest cycle time of only 15 seconds

• Non-stop Business – Permanent fixed rare earth magnet technology is harnessed which produces no heat unlike traditional electro-magnetic methods,
allowing for continuous operations

SEM Mag EraSURE P3M

• NSA Approved Degausser – 6,000 Oe for Hard Disks & 2,600 Oe for Tapes

• Runs on Human Power – This degausser runs via a manual hand crank with a cycle time of just 10 seconds requiring no electricity to operate the unit

• Non-stop Business – Permanent fixed rare earth magnet technology is employed which produces no heat unlike traditional electro-magnetic methods, allowing for continuous operations

For field deployment or where power is not available or needed, the SEM Model ME-P3M is the ideal choice.  The unit is designed to degauss 5000 Oe Standard (LMR) and Perpendicular Magnetic Recorded (PMR) Hard Drives and/or Magnetic tapes quickly and easily.

The unit is operated by a MANUAL HAND CRANK METHOD with a cycle time of just 10 seconds requiring no electricity or power to operate the unit. The actual degauss cycle time is one second as the drive passes through the magnetic field.

An optional height adjustable mobile lift table (Model 250MOBLIFT) is also available.
For field deployment, an optional Deployment Hard Case is also available (Model P3M DEP).

SEM Mag EraSURE P2V

FollowMe works on a Client-Server infrastructure with a central server or servers handling all print jobs in a similar way to a print server.

FollowMe is an all-in-one Output Cost Management system consisting of three core components:

• the Client, which is the user’s workstation,
• the Q-Server, which is the print server, which stores all print jobs uploaded from the client, and manages all communications and
• the ID-Reader hardware (print release station), located on the printer allowing a variety of different recognition techniques to be sent to the server for authentication.

The user must first authenticate at the FollowMe Hardware using any of the supported indentification technologies. Once authenticated the FollowMe Q-Server will release any pending print jobs. If the device (copier/printer/MFP) is copy patrol enabled the FollowMe Q-Server will signal the hardware to enable the copy patrol functionality.

Secured Data Destruction Devices

To complement the services that it offers to its customers, Data Terminator also offers a comprehensive range of products in the Data Leakage Prevention field. This testifies its commitment to its customers, by offering products of the highest qualities and standards possible.

Data Terminator

Secured Data Destruction

Hard Disks / Magnetic Media Degaussers

Confidential Data Leaked? Old Sensitive Data Recovered? Not anymore! Data Terminator carries a large range of degaussers which can meet your organisation’s needs regardless of its size or type of media used.

Disintegrators

What other ways to guarantee data destruction then to smitten your hard disks & any other storage media into bits and pieces. To see the range of disintegrators available at Data Terminator.

Tape Degaussers

In a world where data is now more commonly stored in hard disks, tapes are often overlooked. Tapes like hard disks are vulnerable to sensitive data leakage. Data Terminator offers a range of tape degaussers which can meet your organization’s needs.


Endpoint Security

Safend

With the proliferation of easy data transfer through endpoints such as flash drives, network shares, wifi and Bluetooth, your employee could be moving confidential data without your knowledge. Safend can help your company fight against these potential data breaches.


Monitoring & Detection

Intellinx

Intellinx is a proactive enterprise fraud management solution providing a unique combination of unparalleled visibility to user activity with real-time alerts and investigation capabilities. To find out how Intellinx can help protect your organization against frauds.

Intellinx

ObserveIT is a powerful monitoring and detection solution that is designed for use in multi-server enterprise environments. It provides visibilities into user activities such as Microsoft Terminal Services and Citrix, without requiring any architecture changes. To find out how ObserveIT can meet your organisation’s security needs.

Intellinx

Tectia Guardian is a robust tool for auditing and troubleshooting secured connections, facilitating effective forensics and ensuring accountability across the critical business environment. To find out how Tectia Guardian can help improve the efficiency and integrity of your organisation.


Other Data Solutions

PSIClone
(s)

Have you been caught in a situation where your hard disk suddenly stopped working on you and the data which was stored inside was worth a fortune? Look no further. PSIClone which is the product of 27 years of data forensic research comes to your distress.

Hammer
(Data Erasure Tools)

If you thought that you could securely delete a document, just by emptying the trash, you were wrong. Many people have this impression that once a file has been emptied from the trash can, it cannot be retrieved, at least not by laymen. Do not put your data risk. Hammer is a hard disk erasure tool which can securely erase all data written on a particular drive.

About Data Terminator Pte Ltd.

About Data Terminator Pte Ltd.

Data Terminator (DT) was incorporated in 2007 to provide best in class security solutions and services.

It begins as an information Leakage Protection Specialist providing certified equipment and professional services for secure electronic data destruction. DT’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Data Terminator

Its processes are ISO 9001:2008 certified, giving customers the security with confidence.

Over the years, we have developed in depth other security solutions that helps our customer protect their Data in motion and Data in use as well. This include leading Enterprise Fraud Detection solution, database security  and secure communication  Across different platform.

DT’s  key customers include various Government Ministries, Statutory Boards, FSI and MNCs.

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

You can further inquire following service from Data Terminator: Degaussing service in Singapore, Degausser in Singapore,NSA degausser Singapore,US DoD degausser Singapore,IT security, IT asset disposal, line of sight, on-site, secure data destruction, Clear, Clearing, Purge, purging, Sanitize, sanitization, declassification, Degauss, degaussing, degaussing services, degausser, gauss strength, orsted, Rare earth permanent magnet, automatic degausser, electromagnetic, coercivity, electro magnetic pulse, automatic force microscopy, Magnetic force microscopy, AFM, MFM, portable, mobile. Certificate, ISO 9001, Hard disk, tape cartridge, LTO, DDS, DLT, MO, Thumb drive, SD , CD, DVD, USB, flash drive, Longtitudinal Magnetic Recording, LMR, Perpendicular Magnetic Recoding, PMR, Shred, shredding, high security, cross cut, diamond cut, disintegrator, destruction, Crushing, disintegration. Data destruction equipment, clone, erasure, multiple passess, md5, file level, sector level, data recovery, data cloning, Hard drive erase, data wipping, ghosting, offline tracking, P-list, G-list, DLP, ILP, endpoint security, data protection, external storage, data encryption, access control, Edge security, data leakage, information leakage, white list, black list, data logging, usb endpoint protection, Data loss prevention, usb lockdown, wifi bridging, flash drive encryption, security software, SaaS, software as a service, End of life, data in use, data in motion, data at rest, NSA , NSA/CSS evaluated products list, epl, US DoD 5220.22-M, Dtic, NISPOM, HIPAA, GLB, DPA, NIST 800-88, singapore, secure destruction and asset disposal services.

Let’s make your data yours only.

Benchmark

Benchmark

Data Terminator is the only ISO Certified company that provide electronics data erasure and destruction services in Singapore.

We adopt the best in class benchmark available in the industry today. They include:

  • US DoD 5220.22-M Compliant on Clearing and Sanitization
  • NSA/CSS 04-02 Compliant on Equipment
  • NIST Compliant for Media Sanitization
  • Singapore Banking Act Compliant
  • Official Secrets Act Compliant
  • ISO 9001:2008 – Secure Electronic Data Erasure & Destruction Services

We are No.1 in providing degaussing services singapore,hard disk destruction singapore,erase hard disk singapore,nsa degausser singapore,secured hard drive destruction singapore.

Value Proposition

Value Proposition

Data Terminator is able to provide its customers the highest standard for Information Leakage and Endpoint Protection with three distinctive values:

Superior Technology

Data Terminator has the technology and a full range of equipment to cater to different customers’ needs. Its comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Qualified and Experienced Team

Data Terminator is managed by experienced and security-trained specialists with more than 20 years of IT and security experience. Their in-depth understanding of various security requirements and processes in the enterprise IT infrastructure allow them to adapt quickly to the dynamic security situation during implementation on-site.

Superior Risk Management

Our superior technology and time- tested best practices are well integrated and ISO 9001:2008 certified. This integrated process coupled with our flexibility to deploy to where our customers desire; reduce any risk exposure of valuable information leaving customers’ secured premises. With a clear line of sight by our customers on every process, we worked closely with customers to ensure a near zero risk implementation.

With Data Terminator as your last line of defence, customers can implement their data sanitization with full confidence and peace of mind.

Core Business

Core Business

Data Terminator (DT) is an Information Leakage Protection Specialist providing certified equipment and professional services for secure electronic data erasure, destruction and disposal.

Data Terminator’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards. Its processes are ISO 9001:2008 certified, giving customers the assurance that their data assets are properly sanitized and disposed.

Data Termination Solutions:

  • Secure Electronic Data Destruction Equipment
  • Endpoint Leakage Protection
  • Hard Disk and Magnetic Tape Erasure/Degaussing Services
  • CD/DVD, Thumb-Drive, SD/Memory Card Destruction Services
  • Hard Disk Data Recovery Services
  • Hard Disk Cloning Services
  • IT Asset Disposal Services

Personal Data Protection Act

The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider appropriate in the circumstances.

Overview

What is Personal Data?

Personal data refers to data, whether true or not, about an individual who can be identified from that data; or from that data and other information to which the organisation has or is likely to have access. Personal data in Singapore is protected under the Personal Data Protection Act 2012 (PDPA).

What is the Personal Data Protection Act?

The PDPA establishes a data protection law that comprises various rules governing the collection, use, disclosure and care of personal data. It recognises both the rights of individuals to protect their personal data, including rights of access and correction, and the needs of organisations to collect, use or disclose personal data for legitimate and reasonable purposes.

The PDPA provides for the establishment of a national Do Not Call (DNC) Registry. The DNC Registry allows individuals to register their Singapore telephone numbers to opt out of receiving marketing phone calls, mobile text messages such as SMS or MMS, and faxes from organisations.

Objectives of the Personal Data Protection Act

Today, vast amounts of personal data are collected, used and even transferred to third party organisations for a variety of reasons. This trend is expected to grow exponentially as the processing and analysis of large amounts of personal data becomes possible with increasingly sophisticated technology.

With such a trend comes growing concerns from individuals about how their personal data is being used. Hence, a data protection regime to govern the collection, use and disclosure of personal data is necessary to address these concerns and to maintain individuals’ trust in organisations that manage data.

By regulating the flow of personal data among organisations, the PDPA also aims to strengthen and entrench Singapore’s competitiveness and position as a trusted, world-class hub for businesses.

How does the Personal Data Protection Act Work?

The PDPA will ensure a baseline standard of protection for personal data across the economy by complementing sector-specific legislative and regulatory frameworks. This means that organisations will have to comply with the PDPA as well as the common law and other relevant laws that are applied to the specific industry that they belong to, when handling personal data in their possession. 

The PDPA takes into account the following concepts:

  • Consent – Organisations may collect, use or disclose personal data only with the individual’s knowledge and consent (with some exceptions);
  • Purpose – Organisations may collect, use or disclose personal data in an appropriate manner for the circumstances, and only if they have informed the individual of purposes for the collection, use or disclosure; and
  • Reasonableness – Organisations may collect, use or disclose personal data only for purposes that would be considered appropriate to a reasonable person in the given circumstances.

Application of the Personal Data Protection Act

The PDPA covers personal data stored in electronic and non-electronic forms.

The data protection provisions in the PDPA (parts III to VI) generally do not apply to:

  • Any individual acting in a personal or domestic basis.
  • Any employee acting in the course of his or her employment with an organisation.
  • Any public agency or an organisation in the course of acting on behalf of a public agency in relation to the collection, use or disclosure of the personal data. You may wish to refer to the Personal Data Protection (Statutory Bodies) Notification 2013 for the list of specified public agencies.
  • Business contact information. This refers to an individual’s name, position name or title, business telephone number, business address, business electronic mail address or business fax number and any other similar information about the individual, not provided by the individual solely for his or her personal purposes.

These rules are intended to be the baseline law which operates as part of the law of Singapore. It does not supersede existing statutes, such as the Banking Act and Insurance Act but will work in conjunction with them and the common law.

When does the Personal Data Protection Act Come into Effect?

The PDPA takes effect in phases starting with the provisions relating to the formation of the PDPC on 2 January 2013. Provisions relating to the DNC Registry came into effect on 2 January 2014 and the main data protection rules on 2 July 2014. This allows time for organisations to review and adopt internal personal data protection policies and practices, to help them comply with the PDPA.

Development of the Personal Data Protection Act

In the development of this law, references were made to the data protection regimes of key jurisdictions that have established comprehensive data protection laws, including the EU, UK, Canada, Hong Kong, Australia and New Zealand, as well as the OECD Guidelines on the Protection of Privacy and Transborder Flow of Personal Data, and the APEC Privacy Framework. These references are helpful for the formulation of a regime for Singapore that is relevant to the needs of individuals and organisations, and takes into account international best practices on data protection.

Three public consultations were conducted since 2011 to seek feedback on the proposed data protection regime. The public consultation sought the public’s views on topics including the coverage of the proposed law, the proposed data management rules and transitional arrangements for organisations to comply with the new law. For more information on the public consultations, please visit the MCI website.

What can we do for you to cope with Personal Data Protection Act?

  •  Degauss onsite using NSA evaluated degaussers which is capable of erasing both longitudinal and perpendicular magnetic disk storage devices with coercivity of up to 5,000 Oersteds
  •  Shredded/crushed onsite by built-for-purpose HDD and SSD shredder/crusher to break it into smaller pieces

Our Services

Data erasure

Data erasure

Data erasure (also called data clearing or data wiping) is a software-based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to data disk sectors and make data recovery possible with common software tools. Unlike degaussing and physical destruction, which render the storage media unusable, data erasure removes all information while leaving the disk operable, preserving IT assets and the environment.

Software-based overwriting uses a software application to write patterns of pseudo-random meaningless data onto all of a hard drive’s sectors. There are key differentiators between data erasure and other overwriting methods, which can leave data intact and raise the risk of data breach or spill, identity theft and failure to achieve regulatory compliance. Many data eradication programs also provide multiple overwrites so that they support recognized government and industry standards. Good software should provide verification of data removal, which is necessary for meeting certain standards.

To protect data on lost or stolen media, some data erasure applications remotely destroy data if the password is incorrectly entered. Data erasure tools can also target specific data on a disk for routine erasure, providing a hacking protection method that is less time-consuming than software encryption. Hardware encryption built into drive firmware and integrated controllers is now a popular solution with no degradation in performance at all.

The firmware can encrypt at 256-bit full AES encryption faster than the drive electronics can write the data. Drives with this capability are known as self-encrypting drives (SED) and are present on most modern laptops and are increasingly used in Enterprise to protect data. Changing the encryption key will make all the drive data inaccessible so is an easy and very fast method of achieving 100% data erasure. Theft of an SED will induce physical asset loss, but data on the drive is inaccessible without the decryption key which is not stored on the drive.

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore, hard disk destruction singapore,erase hard disk singapore,secured hard drive destruction singapore, Malaysia, Indonesia, Thailand and Vietnam.

About us

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

Contact us

DT Asia Group

A: 21 Bukit Batok Crescent #13-72 WCEGA Tower, Singapore 658065
T: (65) 6266 2877
E: enquiry.dps@dtasiagroup.com