Process

1. Collect

After our staff confirms your booking, we:

  • collect the items from your location,

  • scan the items’ information at your location (you may choose to have us perform this step at our secure facility instead), and

  • place all ICT items in a box and lock it with a number combination defined by you.

Contact us to find out more information.
The types of destruction services and range of items suitable for destruction are listed below.

 

2. Track

You can track our collection vehicle via GPS, as it delivers your items to our secure destruction facility.
Our staff will brief you on how to use the tracking feature.

Upon the items’ arrival at our facility, we open the locked box when you provide the number combination. Next, we verify every item against its scanned information.

If you had indicated to us not to scan the items during collection, we will open the locked box upon their arrival at our facility. We will request you to provide the lock’s number combination. We shall then scan the items’ information.

You may view the opening and verification process via CCTV.
Our staff will provide the viewing link.

 

3. Destruct

We destruct your items according to your requirements in our secure facility. You may view the destruction process via CCTV if needed.
Our staff will provide the viewing link at your request.

 

4. Certify

We issue a Certificate of Destruction to you after completing the destruction activities. This document officially certifies that your items have been securely destroyed in an environmentally responsible manner and you have been compliant with data protection laws.

Previous
Previous

Destruction Services

Next
Next

About Us