Data Destruction Secure Data Eliminate

My Computer No Longer Works – What Now?!

If you are getting rid of an old PC or laptop, you should either remove the hard drive or destroy it to protect your data. People have been known to scavenge hard drives from tips and retrieve sensitive personal, medical and financial information.

Selling dead machines for spares or repair is even riskier, and how much would your Laptop be worth? I doubt it will fetch enough to make it worth spending the time and (probably) money needed to erase your data. And, of course, if you don’t do it, you could be at significant financial risk, depending on the information stored on it.

Whether or not the buyer replaces the motherboard, they will probably be able to read your hard drive, unless you encrypted it with an unhackable password. This is unlikely.

Because your laptop won’t boot, you will have to do what an attacker or repairer would do: remove the hard drive from the laptop. However, if you want to delete your data and reinstall the hard drive, you will need either another PC or a hard disk eraser.

If you have a desktop tower with a spare drive bay, you can mount the laptop drive inside, by connecting the power and data cables. This is easy and if you have another laptop, you can mount it in an external hard drive enclosure, then connect it to another PC via a USB port.

In theory, you could also use a degaussing machine, which uses very strong magnetic fields to erase all forms of magnetic media – disks and tapes. We provide this service and you can read more HERE.

You could, of course, simply destroy the hard drive physically, which is what some government departments prefer.  Read about how we can safely and securely destroy your Hard Drive.

It’s easy to delete the data on a hard drive in a working PC or in an external USB enclosure. It’s not quite so easy to erase it completely. When you delete files, the operating system doesn’t erase them, it just removes them from its directory. This frees up the sectors for use by other programs, so most of them will be reused eventually. Until that happens, someone with an un-erase program can locate the data sectors on the hard drive and reconstruct the original file.

Contact us to get more information on safe data destruction or data retrieval methods.

Data Integrity Failure As Local Council Provide Wrong Fuel Info – Costing Owner £1000’s

How could Westminster Council get this so wrong?

An automated parking payment system provided by the council failed the data integrity test by giving inaccurate information with no other options offered to our colleague – the customer!

Saturday morning in Central London, our colleague’s wife parked her husband’s car and used the ‘Pay by Phone’ system provided by Westminster Council and was duly told that it would cost £14 for 2 hours. She was also informed that the vehicle ran on diesel fuel and a further £4 surcharge was levied to the original cost.

After the relaxing shopping trip, our colleague’s wife then re-fuelled at a petrol station with diesel fuel, based on the information provided by Westminster Council, and driving a few miles down, it was obvious that the car actually ran on petrol!!

The cost to fix the engine – £5300 ex VAT….WOW! Add to that the daily cost of a replacement vehicle.

Given that the error & failure in data integrity by the local council directly led to the damage caused to the car, unknown to the unsuspecting wife of the owner’s vehicle.

Do you think Westminster Council is liable?


A Hammer is Not Enough to Securely Destroy Your iPad & iPhone

iPad, iPhone and tablet devices are now part and parcel for most businesses. The forecast is that there will be over 18 million iPads in the UK by 2019…next year. What happens when the devices are old or do not function anymore? Taking a hammer or just throwing the devices away is wrong on many levels & also illegal! These devices are sealed and the lithium batteries could be toxic if you attempt to destroy them and are not possible to separate out the hazardous items without specialist tools.

To safely dispose and destroy your iDevices, we at Data Eliminate can promise to not only shred your devices (at your offices or we can collect and shred them at our secure location) so your data is not compromised, we also remove the electronic waste from company’s offices in line with the WEEE regulations.

In addition, if you have a selection of iDevices that need to be refurbished to be reused or sold that allows our customers to recover monetary value.  These types of assets are often refreshed on a more regular basis than hard drives and present worthwhile opportunities.

In addition to this service, we also offer our mobile device refurbishment service to enable our customers to recover monetary value from the reuse or redeployment of iPad, iPhone devices, tablets and other smart phones.

To look at our iDevice destruction and refurbishment process in detail – CLICK HERE


ISBA Conference Brighton 2018

We were at the Independent Schools’ Bursars Association Annual Conference on both Wednesday 9th and Thursday 10th May 2018 at The Brighton Centre.

The ISBA a professional development programme & a popular annual conference attracting many of the independent education sector’s leading experts offering topical updates for schools plus networking opportunities and an exhibition of more than 130 professional advisers and companies dedicated to providing top quality services to the education sector.  The event has over 420 bursars and senior management staff from independent schools every year. As the administrative managers of schools they are the key decision-makers in sourcing their school’s services and supplies.

Our Director Julian Fraser was invited to speak on the panel about how to eradicate the risks posed by sensitive data held on end of life computers, smart phones, hard drives and other electronic assets. Julian explained protecting against company reputation and financial damage that could arise from a data breach in an environmentally responsible method.

Visitors to our stand were showcased our destruction shredded samples and taken through the process of Data Destruction and Disposal as a critical service the independent schools should implement. With highly sensitive data on both teachers and pupils, data protection and safely disposing of hardware containing this data is paramount for independent schools.

For more information – click on our website for a full rundown on what we do – or contact us directly at



Out of the Box GDPR Aligned Destruction and Recycling Services

The  May deadline to become GDPR compliant is fast-approaching, and Data Eliminate has taken necessary steps to ensure compliance with the forthcoming EU General Data Protection Regulation (GDPR) both as a Data Controller and Data Processor.

What is GDPR?

If you’re unfamiliar with the GDPR (General Data Protection Regulation), it’s a regulation designed to strengthen and unify data protection for all individuals within the European Union, effective 25th of May 2018. With affect immediately

This means a person will have more rights, freedoms, and control over how their data is used. It also includes some behind-the-scenes requirements in regards to how that data and information are stored.

What does that mean for me?

If you handle or process the data of any person in the EU, GDPR will apply to you whether you’re located in the EU or not.

How has Data Eliminate prepared for GDPR?

Data Eliminate had an established base of policies, procedures and operational methods as part of providing high security services for the past ten year.  These have been extensively reviewed, updated and enhanced in order to incorporate the requirements of the Regulation. This has includes a full analysis of the data we hold and inspection by external privacy experts of our overall approach to verify that our internal understanding of the Regulation is aligned with those of other organisations.

Out of the Box GDPR Aligned Destruction and Recycling Services

Our HMG Corporate and Military Grade services include features designed to comply with GDPR.  This includes a formal contract for each engagement containing the required clauses, a full audit trail showing details of assets process and a Certificate of Destruction backed by £2 million of professional indemnity cover.    Customers should find these services align with their GDPR Compliance needs

Questions? Please contact us

As always, we’re here if you’ve got any questions! Drop us an email at:

To read our official GDPR statement on our website, please click here

Data Eliminate Helping Towards a Safer Digital Britain at the CYBERUK Manchester 2018 Event

We were at the CyberUK event in Manchester earlier this month and we had a great time meeting and greeting experts and visitors at our stand over the 3 days.

The National Cyber Security Centre hosted the event as the Government’s flagship event for cyber security in the UK. Over 2000 industry leaders and professionals across the UK’s information security community came together with a goal to develop and build and community that makes the UK the safest place to live and work online.


We showcased our disposal and destruction services to peers and businesses and in light of cyber security, data breach and upcoming GDPR – our services highlight the crucial need to have data and equipment destroyed and disposed of to stop any breach of data and also stay in line with government regulations.

On Tuesday evening the ‘Flash Talk’ sessions were held and the Ministry of Justice among others speakers giving their opinions and expertise on Cyber Security and data protection. By night time, the conference room was converted into a live entertainment arena…music, bars and food. It was the perfect wind down after a long day and a good chance to informally talk to the leaders in the industry.

Wednesday we had the pleasure of the Home Secretary Amber Rudd attended the show – with so much in the news about attacks on UK cyberspace – it was fitting she attended to absorb the great energy that the show generated. She pledged £50 million to boost UK cyber security.

Over the three days we ran a prize draw for an Echo Spot where attendees enter our competition (winner to be announced)

Julian Fraser (Data Eliminate MD) our founder was at the show and with over 20 years of experience in the Data Destruction industry – ‘It was a pleasure to see so many like-minded peers at the event and some familiar faces. We generated a buzz around our stand with the Cornflakes and Rice Krispies cereal compared to our shredded hard-drive pieces that were the same size if not smaller pieces (as seen in the photo on our stand).

Data Eliminate’s background in secure destruction and logistics handling some of the UK’s most sensitive data mean that methodical, orderly and secure approach to forensic investigations come as second nature. In addition, Data Eliminate have launched a digital data forensics service – Our digital forensic investigation team have the experience to handle computer corporate misuse, IP Theft, Fraud, GDPR data audits & data investigation for private clients.






Like Data Eliminate, your organisation has most probably been inundated with emails urging you to become GDPR compliant before the world falls apart when the Regulation formally comes into force.

The GDPR is a substantial and complex document and our own experience is that most company’s promoting products and services on the back of it have little understanding of it. Here is our official GDPR page describing Data Eliminate’s key objective to provide customers with an asset disposal and secure data destruction solution which can be seamlessly incorporated into their GDPR compliance strategy.

So here is a simple bit of straightforward guidance about what your organisation should do with reference to data destruction in order to comply.

The first point is that destruction counts as a form of data processing like using the data for marketing, payroll services or similar. If your organisation owns the data and asks a third party to destroy it then your organisation is a Data Controller and Data Eliminate is the Data Processor.

The Regulation requires you as a Data Controller to have a written contract with Data Eliminate Ltd and it should contain certain clauses. See here for more information.

Secondly, the most significant provision of the GDPR to data destruction is the effect it has on the retention of storage of data. In other words, the days when you can leave large quantities of IT equipment or paper records in a storage cupboard and leave them there for years and years are over.  The GDPR requires you to identify all the different types of data your organisation holds and how long each type of data should be kept for.  In making this judgement, one is meant to balance the commercial needs of your organisation in retaining the data against the privacy needs of the private individuals (Data Subjects) whose Personal Data is held on the media in the store cupboard.  If you can’t produce anything meaningful to explain how you reached this judgement when challenged by an enforcement authority such as the UK Information Commissioner– then you could be in trouble.

Thirdly, is the simple fact that while data still exists (or is held on a hard drive, mobile phone or USB stick) it can be stolen and it represents a risk. Once it has been destroyed then the risk no longer exists. The fines for a data breach – which could result from old computer media being lost or stolen – have increased from £500k under the DAP to up to £20million Euros (or 4% of an organisation’s global turnover).  So, the fines help show this into sharp focus.

Fourthly, it won’t have passed your attention that, rightly or wrongly, the UK is leaving the European Union. It is planned that the GDPR will be incorporated into UK Law.  Even it is isn’t , and even when the UK has completely left, if your organisation holds Personal Data about citizens of the EU, then the GDPR still applies.   They key fact is that any Enforcement Authority in the EU can come after your organisation – not just the UK’s Information Commissioner.  It would perhaps not been that surprising in the circumstances if the Spanish, Slovakian, Slovenian equivalents of the ICO cut their regulatory teeth by taking to task some errant UK companies and organisations.

In Data Eliminate’s view, GDPR and data destruction is no more complicated than this.

If you require further information or guidance then please contact us on Tel: 0345-1234400 or use the Enquiry Form.

How To Safely And Responsibly Dispose of IT Equipment / Computer Recycling

With computers becoming an indispensable part of every household, business or institution in this modern era of information technology, taking care of the safe disposal of these used machines has become a major issue over the years. The boom of the internet and the reduced cost of computers and related IT equipment have encouraged both individuals and corporations to buy and own multiple computers and laptops. This in turn has led to a high increase in the number of these devices worldwide.

computer recyclingProper disposal of the IT equipment requires an efficient and secure disposal service system that can disassemble and segregate all the individual machine components of computers and other IT equipment. These spare parts then can either be recycled or reused to manufacture new computers or IT products. A well defined disposal service system takes care of a lot of services right from the complete breaking down of an unusable product for recycling, reusing the intact parts for other machines, removal of all the component labels, resale of specific components to maintaining a detailed report of all the IT parts that have been disposed off.

IT Recycling: An effective solution for responsible disposal of IT equipment

IT Recycling or Computer Recycling is one of the best methods for safe and legal disposal of computers and IT equipment. Typically, computer recycling can be defined as the reuse of computers, electronic items and IT products. It may comprise of either using the dismantled machine components for manufacturing other products or just finding an alternative use for these disassembled components.

Why use computer recycling?

There are a number of major reasons that make it necessary to recycle computer parts and components. These reasons vary from environmental factors, security concerns, disposal laws etc. Some of the primary reasons are mentioned below:

  1. Less Pollution: This is the foremost reason for computer recycling. The computer or electronic parts found in unused computers are made of chemical constituents that are highly toxic and emit harmful radiations leading to health hazards. These parts are also used for landfills which can cause seepage of hazardous chemicals like mercury, chromium, cadmium and other isotopes to the ground water hence contributing to the already high levels of environmental pollution.
  2. Legal aspects: The safe disposal laws in many countries demand that computer manufacturers be monitored by the state agencies aiding them to manage, sell or dispose the surplus computers, regulating the inappropriate disposal of computer parts or IT equipment and set up a recycling fund which may provide grants for supporting new systems of IT recycling.
  3. Lend a helping hand: The recycled computer parts can help to serve specific needs of other people in different ways. For example, one may donate them to charitable institutions or organizations that may greatly benefit from them.

Popular methods of computer recycling

  1. Individual recycling: This type of recycling can be done by any consumer and consists of distinct methods some of which are:
  • Resale: Consumers can easily resell used computers or computer parts to other users by through various means such as auctions or online ads.
  • Product exchange: Many computer manufacturers provide the service of free part replacement to consumers where any non functional and old parts are taken back by the company and replaced by new ones.
  • Scrapping: The more valuable parts of IT equipments are dismantled and sold separately as scrap.
  1. Corporate Recycling: Big sized computer firms or corporations have a highly organized and streamlined recycling system which helps manage the large numbers of computer and electronic equipment. Special data security techniques like on site data eradication and safe transport and transfer of devices are employed to protect confidential data.



Other related IT equipment recycling

Besides the main stream computer recycling, other related types of device recycling methods are available too. While the procedure for   laptop recycling, monitor recycling, printer recycling is similar to computer recycling, there are other devices like servers, mobiles and hard drives which may store highly confidential personal and professional data that needs to be protected. Such devices have to be tagged and catalogued systematically before recycling them. The hard drive shredding or destruction methods are effective for secure hard drive recycling. The shredding method can be used for safe server recycling and mobile recycling too.