top of page

​

 

 

 

Renewpath  Data Destruction Policy

 

 

Standards
All Renewpath Data Destruction methods meet or exceed NIST 800-88 standards, DoD 5200.22-M data sanitization and/or all different standards such as HIPAA/HITECH, Sarbanes-Oxley Act, Gramm-Leach-Bliley Act, FACTA Disposal Rule, Bank Secrecy Act, Patriot Act of 2002, Identity Theft and Assumption Deterrence Act, US Safe Harbor Provisions, FDA Security Regulations, PCI Data Security Standard, and all other various local, state, and federal regulations. We offer proprietary technology destruction to  completely deconstruct and annihilate all physical applications. 

​​

Data Storage Types
• Hard Drives/ SSD / Onboard Storage (Integrated Storage) 
• Cell Phone, PDA, Tablets  
• Flash Memory, Thumb Drive  
• DVD /Optical  
• SIM Cards 
• Paper/ Documents  

​

Destruction Processes

 

Data Destruction For Computers with removable storage 

Physical destruction of HHD/ SSD 

 

Documentation
Data Destruction Certificate with serial #'s , asset tag # and description of each device.

 

Data Destruction Procedures For Apple Computers with Integrated Storage
We follow Data Destruction Protocol Provided by Apple 
https://support.apple.com/guide/mac-help/erase-your-mac-mchl7676b710/mac

​

​

Permanent data destruction (by overwrite) is achieved using the Disk Erase tool on each computer. 

Once “Disk Erase” occurs, then all data that occupied the disk becomes permanently irretrievable.

 

Documentation

A snapshot of the free space along with the serial number on the same screen would identify compliance with the procedure recommended by Apple. 

​

Screen Shot 2020-02-07 at 10.56.36 AM.png

Other Data Destruction

​

Paper Shredding           

-Certificates for paper shredding are available 

​

​

Proprietary Technology
-Certificates are Available 

-Shredding will occur in the same manner as data storage devices

​

* Cell Phones or Tablets with Non-Removable Batteries and PC ”All In One”  desktop computers may take up to 14 business days to process

​​
 

Data Destruction Contracts are available

bottom of page