Strict data erasure and security procedures eliminate risk and comply with the most rigorous industry standards.
Regency's data security systems have been developed through 20+ years of experience. Our combination of appropriate tools and applications, along with processes that have been rigorously tested and documented, ensure that all data erasure and destruction techniques are best-in-class. This attention to detail is paramount when considering an IT asset conversion service provider.
At Regency, data security is at the forefront of everything we do. For every item — working and non-working — we adhere to NIST 800-88 and Department of Defense 5220.22-M procedures. These standards specify overwriting information and software with three passes of random 1-0 patterns, making sure all data is permanently removed and unrecoverable. We also provide data destruction through demanufacturing and in-house physical shredding.
Complete data security documentation, including a certificate of destruction, is provided in every client report. These reports are available through our online client portal.
Overall facility security is another key component to data security. All of Regency’s facilities are thoroughly secured and under constant video surveillance.
We adhere to NIST 800-88 and Department of Defense 5220.22-M procedures, ensuring that your data is destroyed properly.
Regency's data erasure and security procedures protect your data and eliminate the risk.