Certified Document Destruction

DataLock destroys all types of information-bearing materials, including documents, hard-drives, computer media, uniforms, and unwanted product. 

Plant-Based Document Destruction – NAID AAA Certified

Datalock Truck

DataLock’s trained security drivers transport documents in locked security containers in locked trucks to DataLock’s facility.  The movement of each truck is recorded with GPS technology.  Destruction of materials is accomplished by a Veco-Plan grinder.  This is a heavy-duty industrial-grade machine that can destroy over 4 tons of paper documents per hour.  Destroyed paper is shipped to paper mills, where it is pulped, de-inked, and recycled. 

Mobile Document Destruction – NAID AAA Certified

DataLock destroys documents at client locations with a Shred-Tech shredding truck.  This vehicle is rigorously maintained and is operated by a trained security driver.  The movement of the shredding truck is recorded with GPS technology.  This vehicle also destroys documents at the “Super-Shredder” events.  Destroyed paper is shipped to paper mills, where it is pulped, de-inked, and recycled.

Micro-Media Destruction – NAID AAA Certified

Datalock Truck

DataLock destroys micro-media with an SEM disintegrator.  This disintegrator meets the requirements of the National Security Agency and Central Security Service (NSA/CSS) specifications 02-02 (for high security disintegrators) and NSA/CSS 04-02 (for optical media destruction) by reducing materials to particles no larger than 3/32 of an inch across.

Hard-Drive Destruction – NAID AAA Certified

Datalock Truck

DataLock destroys hard-drives by reducing them to small fragments with a hydraulic shear.  The destroyed material is recycled. 

 

Facility Security

DataLock’s facility is a steel and concrete building constructed to industrial specifications.  DataLock’s facility is secured with physical and electronic locks, and is protected by a monitored alarm system, which includes infrared motion detectors, door-open sensors, audio sensors.  Video cameras cover key areas of DataLock’s facility and record to a dedicated video server.  DataLock employees are regularly screened for drugs and criminal history, and are highly trained in information security procedures.