Process

Top left: Stacked laptops on a cardboard box. Top right: Open hard disk drive. Bottom left: Piles of paperwork and files. Bottom right: Neatly folded colorful fabric.

1. Collect

After confirming with our staff on your preferred date and time, we:

  • Collect the items from your location.

  • Scan the items’ information at your location
    (you may choose to have us perform this step at our secure facility instead).

  • Place all ICT items in a box and lock it with a number combination defined by you.

Contact us to find out more information.
The types of destruction services and range of items suitable for destruction are listed on our Services page.

Image showing a security camera, a card reader, and three trash bins with sorted waste: the top bin with mixed recyclables, the middle bin with shredded paper, and the bottom bin with crumpled paper.

2. Destroy

We destroy your items according to your requirements in our secure facility. You may view the destruction process via CCTV if needed.
Our staff will provide the viewing link at your request.

Person in an orange shirt signing documents on a table, with another person's hand visible nearby, using a black pen.

3. Certify

We issue a Certificate of Destruction to you after completing the destruction of your items. This document officially certifies that your items have been securely destroyed in an environmentally responsible manner and you have been compliant with data protection laws.