Data Security

At Ecosystems, data security is our highest priority. From collection to transport, sanitisation, and destruction, we ensure every step is rigorously controlled to protect our clients’ sensitive data

Physical Protection and Collection Security

The security of client data begins at the collection point. Each piece of equipment is barcoded on-site and scanned into the Eco-Tracker Portal, establishing a secure chain of custody. The Eco-Tracker system ensures traceability from the point of collection to final processing, with the following procedures in place:

    • Collection by Vetted Staff: All equipment is handled by fully vetted staff.
    • Secure Loading: Items are countersigned by both Ecosystems and client representatives before being loaded.
    • GPS Tracking: Equipment is transported in GPS-tracked vehicles, with data-bearing items secured in containers. Our logistics team monitors each vehicle’s location, investigating any deviations or unscheduled stops in real time.

Upon arrival at our facility, each item is rescanned off the vehicle to ensure that no equipment is lost during transport, guaranteeing complete traceability from collection to destruction.

Data Destruction Methods

Ecosystems utilises state-of-the-art data destruction technologies to ensure that data is completely and irretrievably erased from every device, aligning with NIST 800-88 standards:

  • DSS Mobile Data Sanitisation
    Our ADISA Product Assurance Certified DSS Mobile device, supplied by Data Safe Solutions, directly communicates with each storage device to identify its unique capabilities. It then selects the most effective sanitisation method, including cryptographic erasure for self-encrypting drives, block-level erasure, or targeted overwriting with verification for non-encrypted drives. This tailored approach ensures compliance with the highest data security standards and provides clients with Certificates of Sanitisation, accessible through our Eco-Tracker Portal.
  • Physical Destruction
    For devices requiring complete physical destruction, we employ industrial-grade shredders, HDD crushers, and degaussers. Shredding reduces drives to small, irrecoverable fragments, while crushers exert extreme pressure to destroy internal components. For magnetic media, degaussing disrupts magnetic fields, erasing data beyond recovery. Each physically destroyed device is meticulously logged, with Certificates of Physical Destruction provided via the Eco-Tracker Portal.

Together, these methods provide full traceability and proof of compliance, ensuring that all data-bearing devices are securely processed according to stringent industry standards.

Comprehensive Data Destruction

Ecosystems provides verifiable data destruction for every device collected, encompassing a wide range of data-bearing items, including:

    • Devices: PCs, laptops, tablets, servers, mobile phones, and multifunction printers.
    • Media: Hard drives (HDDs and SSDs), backup tapes, CDs, DVDs, floppy disks, and USB memory sticks.
    • Network Equipment: Routers, firewalls, CCTV systems, and EPOS systems.

If it can store data, we can securely destroy it. Each item is documented, and clients receive individual Certificates of Destruction or physical evidence of destruction through the Eco-Tracker Portal.

Secure Facilities

Our facilities are fortified with multiple layers of physical security, ensuring your data is safeguarded at every stage:

External Security

    • Enclosed 12-Foot High Fencing: The building is surrounded by high-level security fencing.
    • Electric Roller Shutters and Windows: Reinforced doors and windows enhance the facility’s security.
    • 360° Monitored CCTV: Surveillance cameras provide constant monitoring of the premises.
    • Alarm System: Linked to external security and monitored around the clock.

    Internal Security

    • Monitored CCTV: All data processing areas are continuously recorded.
    • Restricted Access: Only authorised personnel have access to secure data destruction areas, ensuring strict control over sensitive processes.