Data Security

Data destruction lies at the center of the IT Asset Disposition (ITAD) industry, including Certificates of Destruction (CODs) and disposal/recycling certificates. This level of documentation is often required of companies conducting audits or of compliance organizations. But not all CODs are created equal.

AODCX takes data security extremely seriously. At the outset of each engagement, we consult with the client to determine the destruction method(s) that are most appropriate given their industry, compliance requirements, data configurations and physical IT hardware. We determine whether destruction should take place onsite or offsite, and the destruction methodology employed.

Our virtual wiping methods include NIST, ISO, DoD, NSA and many more – and we can provide validation of successful wipes by serial number. Physical methods include degaussing, crushing and shredding (tolerances vary based on type of drives destroyed, whether spinning disks or SSDs). And with AODCX ’s fully-witnessed destruction, clients can be sure that what we promise is delivered.

Data Security

Contact Us


* These fields are required.