Data Destruction

Data destruction is a term which has become increasingly used in today’s modern technological world. Similar to physical possessions, data or information is a crucial aspect of daily modern business, whether publicly or privately operated.

Data is sensitive information that is significant to the business, it may contain proprietary information or may relate directly to members of the public. Failure to fully destroy such data prior to decommissioning of I. T. equipment may inadvertently result in the data entering the public domain. Such inadvertent disclosures may have an adverse impact upon a company or public body, leading to negative media coverage, prosecution, brand damage, loss of revenue and unforeseen internal running costs.

When it comes to selecting ways to destroy data, organizations have a short menu. There are three main options: Overwriting, which is covering up old data with information; Degaussing, which erases the magnetic field of the storage media; and Physical Destruction, which employs techniques such as disk shredding. Each of these techniques has benefits and drawbacks, experts say.

Enterprise clients generally have a pretty good idea of how to deal with data destruction and this practice has been relatively consistent over a period of years. Still, some organizations, particularly SME’s, need more education about data destruction.

Companies must follow all the regulations, laws and policies in relation to data destruction to comply with legal standards. Every company needs to educate their employees on data destruction policy. Companies need to be in compliance with the industry standards for their policy. Data should be completely destroyed and inaccessible.

Types of Data Destruction

Following are some of the types of data destruction adopted by companies:

1: Non-Physical:

a: Binary Wiping or Purging

b: Secure Erase (Hard Disk)

c: Enhanced Secure Erase (Hard Disk)

d: Degaussing (some tape-based media)

2: Physical:

a: Degaussing (Hard Disks and Some Tapes)

b: Shredding

c: Granulating

d: Crushing

Data Destruction in Australia

To help protect individuals and organizations from privacy and data breaches, new amendments to the Privacy Protection Act have been enacted. On th March , the Office of Australian Information Commissioner (OAIC) began enforcing a harmonized set of Australian Privacy Principles (APP’s), with harsh penalties for data and privacy breaches.

Devices such as mobile phones and network equipment are items often overlooked as sources of data breaches. Devices that may contain confidential or private information which may result in a data or privacy breach if not properly disposed of include:

Computers & Laptops
Mobile Phones & Tablets
Servers and Network Equipment
External Hard Drives
USB thumb drives
CD’s and DVD’s
Printers & Copy Machines
Rube's Role in Data Destruction

RCube Solutions provides complete solutions for all security and destruction requirements, ensuring all data is % irretrievable.

Rcube Solutions adopts the following methods for data destruction:


Degaussing and/or Shredding of HDDs, SSDs, and other storage devices
Proof of Destruction (Serial number Scanning and Asset Reporting)
Certificate of Destruction
GPS Tracked Vehicles

Address: Riverwood, NSW
Web: http://