Data Security

Data security is our primary concern; it is what Revive IT was established to be best at.

A large proportion of supposed IT recyclers don’t recognise the importance of ensuring extensive data security compliance which can leave you open to a series of threats. Many typical flaws computer disposal companies have are: failure to provide sufficient training, failure to complete risk assessments and apply controls, use of third party couriers, incompetent management, massive lack of knowledge and expertise especially relating to data sanitization and so on.

Revive IT is committed to the collection and disposal of redundant IT equipment in a secure fashion ensuring the risk of compromise is minimised. Here we have listed the main methods we secure our services:

  • Revive IT are the highest accredited IT recycling / data destruction company in the UK with UKAS ISO 27001, BS 7858 and BS EN 15713 accreditations
  • Our experienced, expert primary staff have undertaken and continue to review comprehensive data security risk assessments and all available control methods are made use of
  • All staff carry Revive IT photo ID cards with expiry dates
  • Collection of items using our own trusted security vetted staff (all staff are CRB checked and 5 year background checked in accordance with BS 7858)
  • All goods loaded into, transported in and unloaded out of our vehicles are covered by our vehicle CCTV systems
  • All vehicles are fitted with 24hr GPS tracking systems which allow us to locate them at any time
  • Data destruction – absolutely every form of your confidential data is sanitized on every single device
  • Full collection / asset tracking carried out up to the point of data destruction ensuring 100% traceability
  • Only members of staff with level 2 security clearance are permitted to enter restricted data bearing areas
  • Biometric finger print recognition lock security systems in use
  • Vigorous security procedures and staff security training in place to ensure all aspects of your data security are protected; this includes extremely in depth security training for loading, unloading and transporting your confidential data
  • All members of staff exposed to confidential data such as collection staff must meet our strict criteria
  • Premises protected by 24hr online alarm
  • Premises protected by 24hr recorded CCTV
  • Visitors supervised at all times
  • Goods In areas supervised at all times
  • Warehouse walls armed with shock sensors connected to the alarm system in place
  • The site is well lit up during the night
  • Supplier (data security) agreements in place with of Revive ITs suppliers – each has to comply with our strict security procedures
  • Manned receptions
  • Security staff onsite
  • Revive IT never use third parties – all activities are undertaken by ourselves

Our management team hold expertise in all areas of the services we provide and they are experienced, competent and aim for nothing less than 100% compliance

Secure Recycling & Data Destruction of:

  • IT Hardware (all types)
  • Data Centre Hardware
  • Telecoms Hardware
  • Audio Visual / Media Hardware
  • Electronic & Testing Hardware
  • Networking Infrastructure

Request Callback: