Secure Data Destruction Services
By Reboot Monkey Team
On-site physical destruction of storage media at your datacenter facility. NIST 800-88 Rev 1 compliant. Certificate of Destruction issued per asset. Active in 250+ cities across 190 countries.
Last updated: April 10, 2026
What Is Secure Data Destruction?
The NIST 800-88 Rev 1 Standard: Clear, Purge, and Destroy
- Clear applies logical techniques to sanitise user-addressable storage locations, typically via overwrite. It is the lowest assurance level and is suitable only for media being reused within the same organisation for low-sensitivity data. Clear does not protect against forensic laboratory recovery. It is not adequate for HIPAA, GDPR, or PCI DSS media disposal.
- Purge renders data irrecoverable even with state-of-the-art laboratory equipment. For hard disk drives (HDDs) and magnetic tape, degaussing achieves Purge by saturating the magnetic domains. For SSDs and NVMe drives, cryptographic erase or the manufacturer-issued Secure Erase command must be used. Critically, multi-pass overwrite methods do not achieve Purge for SSDs: the wear-leveling architecture of NAND flash means logical overwrites miss hidden sectors. Purge satisfies HIPAA 45 CFR 164.310(d)(2)(i), GDPR Article 17, and PCI DSS v4.0 Requirement 9.4.6.
- Destroy renders media physically unusable by any known means. Mechanical shredding reduces drives to fragments below 5mm per DIN 66399 specifications. Other Destroy methods include pulverising, incineration, and melting. Destroy is the appropriate choice for highest-classification data, media with unknown encryption status, or end-of-life equipment where reuse is not a consideration.
A Note on Superseded Standards
Media-Specific Destruction: Why One Method Does Not Fit All
- Hard disk drives (HDD, SATA/SAS, 2.5" and 3.5" form factors): Degaussing achieves NIST Purge by disrupting the magnetic platters. Physical shredding achieves NIST Destroy. Multi-pass overwrite achieves NIST Clear only.
- Solid-state drives (SSD, SATA, and NVMe, including M.2 and PCIe form factors): Degaussing is NOT effective. SSDs contain no magnetic media. The appropriate Purge method is cryptographic erase (for drives with hardware encryption or self-encrypting drive support) or the manufacturer Secure Erase command. Physical shredding or disintegration achieves NIST Destroy.
- NVMe drives (PCIe, U.2, and M.2): Same requirement as SSD above. Degaussing is not applicable. Cryptographic erase or physical destruction only.
- Magnetic tape (LTO, DLT, DAT): Degaussing achieves NIST Purge. Physical shredding or incineration achieves NIST Destroy.
- Optical media (CD, DVD, Blu-ray): No magnetic or electronic erase is applicable. Physical shredding or incineration to the Destroy standard is required.
- USB drives and memory cards: Physical shredding or disintegration to the Destroy standard. No software wipe achieves the assurance level required for regulated data on these form factors.
On-Site Destruction at Your Datacenter Facility
Global Reach Across 250+ Cities and 190 Countries
Compliance Frameworks: What Each Regulation Actually Requires
- HIPAA (45 CFR 164.310(d)(2)(i)): Covered entities and business associates must implement procedures to remove electronic PHI from media before reuse and protect media from unauthorised access during disposal. HHS Security Rule guidance references NIST 800-88 as a recognised sanitisation standard. Purge or Destroy achieves compliance. The Certificate of Destruction documenting method, date, location, and responsible party is the required compliance evidence. HIPAA audit records must be retained for a minimum of six years.
- GDPR (Article 17 and Article 5(1)(e)): Article 17 grants data subjects the right to erasure. Article 5(1)(e) requires that personal data be stored no longer than necessary. When hardware containing personal data is decommissioned, controllers must ensure that data is rendered permanently inaccessible. NIST 800-88 Purge or Destroy satisfies this obligation. The Certificate of Destruction, with asset identification and method documentation, provides the evidence required for Data Protection Authority audits and data subject requests.
- PCI DSS v4.0 (Requirement 9.4.6): Organisations processing cardholder data must destroy media using methods that render cardholder data irrecoverable and unusable. Requirement 9.4.6 specifically requires that destruction methods be documented and verifiable. NIST 800-88 Purge and Destroy both satisfy this requirement. QSA assessors expect to see CoD records during assessments.
- ISO 27001:2022 (Annex A.8.10): Controls for information deletion require documented procedures for secure asset disposal, including verification that data has been rendered inaccessible. Certificate of Destruction and asset disposal logs satisfy the evidence requirements for annual surveillance audits.
- SOC 2 Type II (CC6.5): Controls around logical and physical access include disposal of assets. SOC 2 Type II auditors trace a sample of assets from inventory through to CoD during the audit period. Missing documentation for any asset in scope is treated as a control weakness.
Certificate of Destruction: What It Must Contain
- Asset identification: Serial number, make, model, capacity, form factor, and media type for each item processed individually.
- Sanitisation method: The specific NIST 800-88 category (Clear, Purge, or Destroy) and sub-method (cryptographic erase, degaussing, shredding, etc.).
- Date and time: Exact date of destruction, or date range for batched operations.
- Location: The physical facility where destruction was performed. For on-site destruction, this is the client's datacenter address and cage reference. This is directly relevant for data sovereignty compliance.
- Responsible party: Name, title, and signature of the field engineer who performed or witnessed the destruction.
- Chain of custody: For any assets that required transport, documented transfer records from client custody to destruction point, including seals, lock serial numbers, and timestamps.
- Downstream disposition: Where physical fragments went after destruction (licensed metal recycler, hazardous waste facility, etc.).
- Certification statement: A signed legal statement attesting to compliance with the stated standard and irrecoverability of data.
R2 and e-Stewards: Understanding Partner Certifications
Data Destruction as Part of the Decommissioning Lifecycle
Industries and Use Cases
- Financial services: Banks, fintechs, and capital markets firms handling cardholder data (PCI DSS Requirement 9.4.6) and proprietary trading data. Regular hardware refresh cycles in trading infrastructure mean ongoing destruction requirements.
- Healthcare and life sciences: Hospitals, health insurers, pharmaceutical companies, and research institutions handling electronic protected health information (ePHI) under HIPAA 45 CFR 164.310(d)(2)(i).
- Technology and SaaS: Cloud providers and SaaS vendors undergoing SOC 2 Type II audits require documented asset disposal evidence across all hardware retired during the audit period.
- Government and defence: Agencies and contractors with FISMA obligations, NIST 800-171, or ITAR requirements where destruction method selection and documentation requirements exceed civilian standards.
- Telecommunications: Carriers retiring network infrastructure hardware across distributed sites where coordination and per-asset documentation at scale is operationally complex.
- Enterprise IT departments: Any organisation running a multi-year hardware refresh cycle, datacenter consolidation, or facility exit requiring documented compliance with GDPR, ISO 27001, or internal information security policies.
How Reboot Monkey Delivers Secure Data Destruction
- Scope definition: Asset inventory provided by the client or produced by our engineers during an on-site audit. Includes media type, quantity, physical location within the facility, and any specific compliance requirements (HIPAA, PCI DSS, GDPR, etc.).
- Method selection: Reboot Monkey engineers recommend the appropriate NIST 800-88 method for each asset type. SSDs and NVMe drives receive cryptographic erase or physical destruction. HDDs receive degaussing or shredding. Tape and optical media receive degaussing or physical destruction.
- On-site execution: A Reboot Monkey field engineer is dispatched to the client's datacenter. Destruction occurs on-site. The client may request a witness be present for the process.
- Documentation: Each asset is logged with serial number, media type, method applied, date, time, and location. For physical destruction, photographic documentation is available.
- Certificate of Destruction issuance: A CoD covering all assets processed is produced on the same day, signed by the responsible field engineer, and delivered digitally to the client.
- Hardware coordination: Where the client requires downstream hardware recycling or ITAD services, Reboot Monkey coordinates handoff to an R2 or e-Stewards certified partner with chain-of-custody documentation covering the transfer.
Pricing and Service Options
- Per-incident: A fixed fee for a single destruction engagement. Suitable for ad-hoc decommissioning events or one-off hardware retirement.
- Block hours: Pre-purchased engineer hours, drawn down across multiple engagements. Suitable for organisations with quarterly or semi-annual hardware refresh cycles.
- Monthly retainer: Bundled service with defined SLA response times. Suitable for large enterprises with ongoing, high-volume destruction requirements across multiple sites.
Why Reboot Monkey Instead of a Traditional Data Destruction Vendor
- No transport risk: Media is destroyed where it sits. Chain of custody does not depend on sealed drums and shipping manifests.
- Vendor neutrality: Reboot Monkey is not affiliated with any datacenter operator. We work in Equinix facilities, Digital Realty facilities, NTT facilities, and any independent carrier-neutral site. The client is not restricted to a preferred vendor list imposed by the facility.
- Global consistency: A single provider, single contract, and single documentation format across all locations. Particularly relevant for multinational compliance programmes where audit teams need consistent CoD records.
- Integrated lifecycle services: Data destruction bundled with rack-and-stack, server migration, smart hands, and datacenter decommissioning under one engagement. One project manager, one chain of custody, one set of records.
- 24/7 NOC with 4-hour on-site SLA: For emergency destruction requirements, including breach response scenarios, Reboot Monkey can dispatch a field engineer within four hours at covered locations.
- No minimum fleet: Reboot Monkey does not operate a fleet of shredding trucks that requires a minimum volume to justify dispatch. A single rack of servers is a valid engagement.
On-Site Data Destruction
Dedicated page covering our on-site destruction process, equipment, and witness options in detail.
IT Asset Disposition (ITAD)
End-to-end IT asset disposition including hardware recovery, R2-certified recycling coordination, and value recovery.
Datacenter ITAD
ITAD services scoped for full datacenter environments, including inventory, destruction, and asset recovery at scale.
Datacenter Decommissioning
Full-lifecycle decommissioning services from planning and power-down through data destruction, rack removal, and facility remediation.
Datacenter Decommissioning , United States
Decommissioning and data destruction services across major US datacenter hubs including Ashburn, New York, Dallas, Chicago, and Los Angeles.
Datacenter Decommissioning , United Kingdom
Decommissioning and data destruction services across UK datacenter facilities in London, Manchester, and other major hubs.
Datacenter Decommissioning , Germany
Decommissioning and data destruction services in Frankfurt, Berlin, and other German datacenter facilities. GDPR-aligned documentation.
Frequently Asked Questions
What is the difference between data destruction, data wiping, and data deletion?
Data deletion removes file system references but leaves the underlying data on the media and recoverable with standard tools. Data wiping applies overwrite patterns to user-addressable sectors, achieving NIST 800-88 Clear level. Data destruction encompasses both software-based sanitisation (Clear and Purge) and physical destruction (Destroy). For regulated data, Purge or Destroy is required. Wiping alone does not achieve Purge for SSDs or NVMe drives due to wear-leveling architecture.
What are the three NIST 800-88 methods and when should each be used?
NIST 800-88 Rev 1 defines Clear, Purge, and Destroy. Clear uses logical overwrite and is suitable only for non-regulated data being reused internally. Purge renders data irrecoverable under laboratory conditions, using degaussing for HDDs and tape, or cryptographic erase and Secure Erase commands for SSDs and NVMe drives. Purge satisfies HIPAA, GDPR, and PCI DSS media disposal requirements. Destroy physically disintegrates the media through shredding, pulverising, incineration, or melting. Destroy is used for the highest sensitivity data or where Purge verification is not possible.
Does degaussing work on SSDs and NVMe drives?
No. Degaussing disrupts magnetic domains on ferromagnetic media such as HDDs and magnetic tape. SSDs and NVMe drives store data on NAND flash chips, which contain no magnetic media. Applying a degausser to an SSD has no effect on the data. The correct Purge methods for SSDs are cryptographic erase (if the drive supports hardware encryption) or the manufacturer Secure Erase command. Physical shredding or disintegration achieves NIST Destroy.
What is a Certificate of Destruction and what must it contain?
A Certificate of Destruction (CoD) is a document issued by the destruction vendor that serves as legal evidence of compliance with data destruction obligations. It must include the serial number and description of each asset processed, the NIST 800-88 method applied, the date and time of destruction, the physical location where destruction occurred, the name and signature of the responsible engineer, and a certification statement attesting to the irrecoverability of the data. HIPAA requires CoD records be retained for a minimum of six years.
What does HIPAA require for data destruction?
HIPAA 45 CFR 164.310(d)(2)(i) requires covered entities and business associates to implement procedures to remove electronic PHI from media before disposal or reuse. HHS guidance references NIST 800-88 as a recognised standard. Purge or Destroy satisfies the requirement. The Certificate of Destruction is the required compliance evidence for OCR audits.
What does GDPR require for data destruction?
GDPR Article 17 gives data subjects the right to erasure. Article 5(1)(e) requires personal data not be retained longer than necessary. When hardware containing personal data is decommissioned, the data must be rendered permanently inaccessible. NIST 800-88 Purge or Destroy satisfies this obligation. The Certificate of Destruction, with asset identification and method documentation, is the evidence required by Data Protection Authorities. For organisations subject to data localisation requirements, in-country on-site destruction avoids potential issues with cross-border data transfer.
What does PCI DSS v4.0 require for data destruction?
PCI DSS v4.0 Requirement 9.4.6 requires that media containing cardholder data be destroyed using methods that render the data irrecoverable and that destruction methods are documented and verifiable. NIST 800-88 Purge and Destroy both satisfy this requirement. QSA assessors expect to see Certificate of Destruction records during PCI assessments.
Does Reboot Monkey hold R2 or e-Stewards certification?
R2 and e-Stewards are facility certifications awarded to ITAD processing sites, not to field service providers. Reboot Monkey is not an ITAD facility and does not hold these certifications. Where Reboot Monkey coordinates off-site hardware recycling as part of a decommissioning engagement, we route materials through R2-certified or e-Stewards-certified partner facilities. The Certificate of Destruction we issue references the partner facility and their certification status.
Can data destruction be performed on-site at a colocation facility?
Yes. Reboot Monkey field engineers work inside third-party colocation datacenters as a core service. We already provide remote hands, smart hands, rack-and-stack, and migration services at Equinix, Digital Realty, NTT, and independent carrier-neutral facilities globally. Data destruction is performed at the client's cage or suite, inside the facility, without removing media to an external location. A Certificate of Destruction is issued on the day.
How long does on-site data destruction take?
Duration depends on asset volume and the mix of destruction methods required. Cryptographic erase for encrypted SSDs is fast and can process many drives in an hour. Physical destruction operations scale with the volume of media. Reboot Monkey will provide a time estimate as part of scope confirmation. For large-scale decommissioning projects, destruction is staged across the decommissioning window and documented batch by batch.
What happens to the hardware after destruction?
Where physical destruction produces fragments (shredding, disintegration), the fragments are typically routed to a licensed metal recycler or hazardous waste facility. Where Purge methods are used and the hardware has residual value, the client may choose to recover the hardware for resale or responsible recycling through an R2 or e-Stewards certified ITAD partner. Reboot Monkey can coordinate this handoff as part of an ITAD engagement.
How does Reboot Monkey handle data destruction across multiple countries?
Reboot Monkey operates across 250+ cities in 190 countries. For multinational clients running global hardware refresh cycles or datacenter consolidations, we can coordinate destruction engagements across all locations under a single contract. Documentation follows a consistent format across all sites, producing a uniform audit trail. In-country destruction is available wherever local data sovereignty requirements prohibit cross-border data movement.