Process
1. Collect
After our staff confirms your booking, we:
collect the items from your location,
scan the items’ information at your location (you may choose to have us perform this step at our secure facility instead), and
place all ICT items in a box and lock it with a number combination defined by you.
Contact us to find out more information.
The types of destruction services and range of items suitable for destruction are listed below.
2. Destruct
We destruct your items according to your requirements in our secure facility. You may view the destruction process via CCTV if needed.
Our staff will provide the viewing link at your request.
3. Certify
We issue a Certificate of Destruction to you after completing the destruction activities. This document officially certifies that your items have been securely destroyed in an environmentally responsible manner and you have been compliant with data protection laws.