Data security — including proper erasure and destruction of data — is essential to any quality asset recovery program.
Hard drives, flash drives, tape backups and virtually every other type of storage device represents a potential risk to businesses, institutions or consumers. The more you know Regency Technologies the less you worry. Our data erasure and security procedures eliminate risk and comply with the most rigorous industry standards.
Regency Technologies’ data security systems have been developed through years of experience. Our combination of appropriate tools and applications, along with processes that have been tested and documented, ensure that all data erasure and destruction techniques are best in class. This attention to detail is paramount when considering an asset recovery service provider.
Data erasure and security is a core competency of Regency Technologies. For every item — working and non-working — we adhere to Department of Defense 5220.22-M procedures, which specify overwriting information and software with three passes of random 1-0 patterns, assuring all data is permanently removed and unrecoverable. We also provide data destruction through dismantling and shredding. All non-functional storage media is segregated and secured until it is scheduled for destruction.
Complete data security documentation, including a certificate of destruction, is provided in every client report, available online 24/7.
Overall facility security is another key component to data security. All of Regency’s facilities are thoroughly secured and under constant video surveillance.
» LEARN MORE ABOUT OUR FACILITY SECURITY