Privacy policy

Privacy policy

Privacy policy

This privacy policy (“Policy”) describes how Website Operator (“Website Operator”, “we”, “us” or “our”) collects, protects and uses the personally identifiable information (“Personal Information”) you (“User”, “you” or “your”) may provide on the website and any of its products or services (collectively, “Website” or “Services”). It also describes the choices available to you regarding our use of your personal information and how you can access and update this information. This Policy does not apply to the practices of companies that we do not own or control, or to individuals that we do not employ or manage.

Collection of personal information

We receive and store any information you knowingly provide to us when you fill any online forms on the Website. You can choose not to provide us with certain information, but then you may not be able to take advantage of some of the Website’s features.

Collection of non-personal information

When you visit the Website our servers automatically record information that your browser sends. This data may include information such as your device’s IP address, browser type and version, operating system type and version, language preferences or the webpage you were visiting before you came to our Website, pages of our Website that you visit, the time spent on those pages, information you search for on our Website, access times and dates, and other statistics.

Use of collected information

Any of the information we collect from you may be used to improve our Website; improve customer service and respond to queries and emails of our customers; run and operate our Website and Services. Non-personal information collected is used only to identify potential cases of abuse and establish statistical information regarding Website usage. This statistical information is not otherwise aggregated in such a way that would identify any particular user of the system.


We do not knowingly collect any personal information from children under the age of 13. If you are under the age of 13, please do not submit any personal information through our Website or Service. We encourage parents and legal guardians to monitor their children’s Internet usage and to help enforce this Policy by instructing their children never to provide personal information through our Website or Service without their permission. If you have reason to believe that a child under the age of 13 has provided personal information to us through our Website or Service, please contact us.


The Website uses “cookies” to help personalize your online experience. A cookie is a text file that is placed on your hard disk by a web page server. Cookies cannot be used to run programs or deliver viruses to your computer. Cookies are uniquely assigned to you, and can only be read by a web server in the domain that issued the cookie to you. We may use cookies to collect, store, and track information for statistical purposes to operate our Website and Services. You have the ability to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. If you choose to decline cookies, you may not be able to fully experience the features of the Website and Services.

Links to other websites

Our Website contains links to other websites that are not owned or controlled by us. Please be aware that we are not responsible for the privacy practices of such other websites or third parties. We encourage you to be aware when you leave our Website and to read the privacy statements of each and every website that may collect personal information.

Information security

We secure information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use, or disclosure. We maintain reasonable administrative, technical, and physical safeguards in an effort to protect against unauthorized access, use, modification, and disclosure of personal information in its control and custody. However, no data transmission over the Internet or wireless network can be guaranteed. Therefore, while we strive to protect your personal information, you acknowledge that (i) there are security and privacy limitations of the Internet which are beyond our control; (ii) the security, integrity, and privacy of any and all information and data exchanged between you and our Website cannot be guaranteed; and (iii) any such information and data may be viewed or tampered with in transit by a third-party, despite best efforts.

Data breach

In the event we become aware that the security of the Website has been compromised or users Personal Information has been disclosed to unrelated third parties as a result of external activity, including, but not limited to, security attacks or fraud, we reserve the right to take reasonably appropriate measures, including, but not limited to, investigation and reporting, as well as notification to and cooperation with law enforcement authorities. In the event of a data breach, we will make reasonable efforts to notify affected individuals if we believe that there is a reasonable risk of harm to the user as a result of the breach or if notice is otherwise required by law. When we do we will post a notice on the Website.

Changes and amendments

We reserve the right to modify this privacy policy relating to the Website or Services at any time, effective upon posting of an updated version of this Policy on the Website. When we do we will revise the updated date at the bottom of this page. Continued use of the Website after any such changes shall constitute your consent to such changes.

Acceptance of this policy

You acknowledge that you have read this Policy and agree to all its terms and conditions. By using the Website or its Services you agree to be bound by this Policy. If you do not agree to abide by the terms of this Policy, you are not authorized to use or access the Website and its Services.

Contacting us

If you have any questions about this Policy, please contact us.

This document was last updated on July 6, 2017

Terms and conditions

Terms and conditions

These terms and conditions (“Terms”, “Agreement”) are an agreement between Website Operator (“Website Operator”, “us”, “we” or “our”) and you (“User”, “you” or “your”). This Agreement sets forth the general terms and conditions of your use of the website and any of its products or services (collectively, “Website” or “Services”).


We are not responsible for Content residing on the Website. In no event shall we be held liable for any loss of any Content. It is your sole responsibility to maintain appropriate backup of your Content. Notwithstanding the foregoing, on some occasions and in certain circumstances, with absolutely no obligation, we may be able to restore some or all of your data that has been deleted as of a certain date and time when we may have backed up data for our own purposes. We make no guarantee that the data you need will be available.

Links to other websites

Although this Website may be linked to other websites, we are not, directly or indirectly, implying any approval, association, sponsorship, endorsement, or affiliation with any linked website, unless specifically stated herein. We are not responsible for examining or evaluating, and we do not warrant the offerings of, any businesses or individuals or the content of their websites. We do not assume any responsibility or liability for the actions, products, services and content of any other third parties. You should carefully review the legal statements and other conditions of use of any website which you access through a link from this Website. Your linking to any other off-site websites is at your own risk.

Limitation of liability

To the fullest extent permitted by applicable law, in no event will Website Operator, its affiliates, officers, directors, employees, agents, suppliers or licensors be liable to any person for (a): any indirect, incidental, special, punitive, cover or consequential damages (including, without limitation, damages for lost profits, revenue, sales, goodwill, use or content, impact on business, business interruption, loss of anticipated savings, loss of business opportunity) however caused, under any theory of liability, including, without limitation, contract, tort, warranty, breach of statutory duty, negligence or otherwise, even if Website Operator has been advised as to the possibility of such damages or could have foreseen such damages. To the maximum extent permitted by applicable law, the aggregate liability of Website Operator and its affiliates, officers, employees, agents, suppliers and licensors, relating to the services will be limited to an amount greater of one dollar or any amounts actually paid in cash by you to Website Operator for the prior one month period prior to the first event or occurrence giving rise to such liability. The limitations and exclusions also apply if this remedy does not fully compensate you for any losses or fails of its essential purpose.

Changes and amendments

We reserve the right to modify this Agreement or its policies relating to the Website or Services at any time, effective upon posting of an updated version of this Agreement on the Website. When we do we will revise the updated date at the bottom of this page. Continued use of the Website after any such changes shall constitute your consent to such changes.

Acceptance of these terms

You acknowledge that you have read this Agreement and agree to all its terms and conditions. By using the Website or its Services you agree to be bound by this Agreement. If you do not agree to abide by the terms of this Agreement, you are not authorized to use or access the Website and its Services.

Contacting us

If you have any questions about this Agreement, please contact us.

This document was last updated on July 6, 2017

Shredder Singapore

Not only paper, the modern shredders now can shred SSD, CD, phones and USB thumbdrives into pieces!


The Proton PDS-88 Solid State™ Media Shredder is the perfect combination of office shredder, disintegrator and industrial shredder. It has the capability to shred several types of media, including solid state drives, CDs/DVDs, USB drives and more. Plus, it’s packed nicely into an office shredder body. With an easy to use control panel docked at the top of the shredder and safety features that allow users to visibly watch media get destroyed by the several interlocking shredder teeth, the PDS-88 is the perfect solution to solid state & media destruction.

Just plug into a standard outlet, insert your media through the large media flap or the small media chute, and watch as the shredder automatically destroys the material in minutes. Operators are protected by the transparent chute covers to avoid any potential safety hazards. The i-control panel integrated into the face of the shredder makes destruction an incredibly easy process.

Product Details

  • Able to destroy SSD Drives, Smartphones, mobile phones, mini-tablets, credit cards, CDs/DVDs & USB sticks.
  • Specially designed cutting cylinders to destroy a variety of media devices.
  • Auto-Reverse is enacted to ensure complete destruction of all inserted media.
  • Small media destruction chute and larger media destruction flap built in for safe, efficient feeding.
  • An easy to use control panel resides on the top of the unit that allows users to push a button for all operations.
  • The control panel also indicates the status of the shredder, whether it is running through, standby or in auto-reverse.

Hard Drive Shredder Ideal for Office Use

The new Model 0300 Jackhammer™ Hard Drive Shredder from Security Engineered Machinery (SEM) has a small footprint and is easy to use. Only 37” high, 45” wide, and 21” deep, it destroys hard drives, other electronic devices (cell phones, smartphones, PDAs, etc.), optical media (CDs and DVDs), and computer backup tapes. Its specially designed sawtooth, hooked cutters can handle 125 to 500 drives per hour (depending on type), reducing them to random 1½” shreds.

Fast, safe, clean, quiet, and easy to use, the Model 0300 Jackhammer is specifically designed for the office environment. The Model 0300 plugs into a standard 120-volt/20-amp single-phase wall outlet, unlike competitive units that have three-phase motors and require special wiring and outlets. Mounted on locking swivel casters, it can be moved easily and locked in place. The mailbox-like feed door accepts drives up to 1” thick and does not allow access to the cutting blades. Other safety features include built-in electrical interlocks halting operation when the waste-removal door or cutting-head access lid is opened. The simple and easy-to-use control panel on top of the unit contains four illuminated buttons: “start,” “reverse,” “stop,” and “reset.” The Model 0300 has built in logic control that senses jamming as well as a unique system protocol to clear the jam automatically. The shredder also has a “bin full” indicator, notifying the user when the waste collection bin has reached its capacity.

DT MFS901M Media Shredder

Designed to accommodate 3 different types of media; Paper, CD/DVD, USB thumb drives, IC Cards/Credit Cards. Strategically built for all around use but still remain its high security levels at P-7 (Paper Media), E-4 (Electronic Media), and O-5 (Optic Media).

Lightweight of about 45kg and the portable design and small footprint attached with wheels enable it to be easily transported whenever and wherever necessary.

Performance and Effectiveness (Security)

Highest of the top security shredder P-7 Level wherein it is specially designed to meet requirements of the Department of Defense (DoD/NSA) and exacting standards of the CIA, US Embassy’s, Top Secret U.S. Military Departments, National Security organizations, government agencies and government contractors.


DTA (DT Asia) is a major provider of degaussing and disintegrating machines. Our NSA approved Degaussers and Disintegrators for Secure Electronic Data Destruction is well-known in SSD Phones CD paper shredder in Singapore, SSD phones CD paper shredder in Japan and SSD phone CD paper shredder in Hong Kong. The solutions are various for every need of Data destruction:



Please contact us for more information and quotation.

Crusher Singapore

If you are in Singapore or Japan or Hong Kong, DTA provide best HDD and SSD crushers for your data destruction requirements.

hdd crusherThe HDD crusher is a powerful and fast SSD and hard drive destroyer which renders a wide range of storage devices unusable. Simple and safe to operate, destruction of media is guaranteed. The crusher provides a perfect accompaniment to a degausser providing the best way to destroy a hard drive whilst also being an ideal solution for companies who recycle used media storage devices.

Unlike degaussers that erase data through powerful magnetic fields, the  hard drive crusher destroys the drives and memory chips. For companies that require the utmost security, the crusher provides a perfect accompaniment to a degausser. It is also beneficial for companies who recycle used media storage devices.

SEM 0101 Sledgehammer Hard Drive Destroyer

The SEM Model 0101 Hard Drive Crusher has been “evaluated by the NSA/CSS and meets NSA and DoD compliance guidelines for the physical damage of media” with a durability rating of 204 drives/hour. This hard drive crusher destroys all hard drives regardless of size, format or type up to 1.85″ high including desktop, laptop and server drives. The Model 0101 hard drive crusher is an ideal way to meet the destroy mandate as part of the DoD’s Degauss and Destroy specification.


NSA/CSS Evaluated and Listed for destruction of 1-inch, .65-inch, 1.65-inch & Laptop Hard Drives

The PDS-100 provides an automatic, motor driven operation – simply insert the hard drive and sensors will automatically start the destruction cycle. A unique feature of the PDS-100 is its ability to operate manually if power is ever interrupted or unavailable. Simply grab the crank handle to continue securely destroying hard drives. No stoppage or setup necessary.


NSA/CSS Evaluated and Listed for destruction of 1″, 0.65″, 1.65″ & Laptop Hard Drives

The PDS-75 is designed to physically destroy all standard hard drives without the use of power in 8 seconds or less. Insert the hard drive into the slot and crank the handle 8 rotations to destroy the drive. After the process is finished the hard drive is ejected into the front debris drawer; an optional rear output chute is also available.

DTA (DT Asia) is a major provider of degaussing and disintegrating machines. Our NSA approved Degaussers and Disintegrators for Secure Electronic Data Destruction is well-known in hdd crusher Singapore, HDD crusher Japan and HDD crusher Hong Kong. The solutions are various for every need of Data destruction:



Please contact us for more information and quotation.


Degausser Singapore

How does degaussing work?

degausser singaporeDegaussing is the process of reducing or eliminating data stored on magnetic media such as tape, disks, reels, cassettes and hard drives. Magnetic media has a fine coating of iron oxide or chromium dioxide which sits on the tape or in the case of a hard drive, on its circular platter, and are orientated into a series of lines, which make up the recording or data.

A degausser works by generating an intense magnetic field, so powerful that it permanently removes the magnetic memory from the iron oxide or chromium dioxide coatings which removes, or randomizes, the recorded data pattern. By changing the magnetic field on the tape or hard drive with a degausser, the data stored on it can effectively be destroyed.

The field strength of a VS Security Products degausser destroys the magnetic structure and ensures that the data cannot be recovered. As degaussing hard drives does not rely on software, it will also completely and permanently erase failed or faulty hard drives.

What are the benefits of degaussing?

  • Degaussing hard drive is a complete, quick, easy and quiet process!
  • With a degausser, you keep complete control of your sensitive data at all times – no need to pass your data to third parties to be disposed of
  • Degaussing hard drives is 100% effective, even on damaged hard drives
  • Hard drive components can be fully recycled once degaussed
  • Cost effective – degaussing offers one of the most cost effective erasure solutions. Purchasing a degaussing machine is usually a one-time investment


When exposed to the powerful magnetic field of a degausser, the magnetic data on a tape or hard disk is neutralized, or erased. Degaussing is the guaranteed form of hard drive erasure, as such; it serves as the standard method of data destruction. Using the right degausser will guarantee that your information is no longer retrievable.

  • Degaussing is simply a demagnetizing process to erase a hard drive or tape.
  • Degaussers contain a controlled magnetic field that is measured in units of gauss or oersteds (Oe).
  • All magnetic media has a magnetic property, called coercivity, that is also measured in units of oersteds (Oe).
  • The Oersted (Oe) value tells us how easy or how difficult a piece of media is to erase. Basically, higher Oe media requires stronger degausser magnetic field ratings.


To understand how a degausser works, one must first understand how information is first recorded onto hard drives, tapes, reels, cassettes and other magnetic media.

Magnetic media has been with us since the 1920s. Although it has seen dozens of changes over the years, the basic ideas remain the same.

Magnetic tape has three basic components: a fine metal iron oxide powder, a binder and the film backing. A tape recorder works by moving the tape past a set of small metal blocks, called heads, at a steady speed. A tape recorder contains both record and playback heads. These heads are specialized electromagnets. When recording, the recording heads will create a magnetic field that alters the positioning of the fine iron oxide powder on the surface of the tape into a digital recording pattern. In turn, the playback heads read this pattern and convert it into sound, video or computer data.

Hard drives function in a similar matter, but were built for increased reliability and speed. Here, tape is exchanged for a flat, circular piece of metal, called a platter, which contains a fine coating of iron oxide or chromium dioxide. The platter spins beneath a read/write head. When small pulses of electricity are passed through a coil in the head, the surface of the platter becomes magnetized. Data is recorded using binary code, a series of 1s and 0s (magnetic pulse and reverse pulse, consecutively).

A degausser erases by generating a magnetic field so powerful that it permanently removes the magnetic properties from the iron oxide or chromium dioxide coatings which erases, or randomizes, the recorded data pattern.


With so many different degausser models on the market, it’s important to know what to look for when choosing a right model for your needs as not all degaussers are created equally. Electromagnetic degaussers generate a magnetic field by charging a degaussing coil. Permanent magnet degaussers contain one or more rare earth magnets and do not require electricity to operate. Some degaussers are meant for mobile operations, while others are built for high volume.

The most important aspect to consider when shopping for a degausser is its ability to erase your media. Degaussers are rated for different media based upon the degausser’s maximum magnetic field strength. The magnetic field strength of a degausser is measured in gauss, or oersteds. Tapes and hard drives also have a measurable magnetic value called coercivity, which is measured in oersteds as well.

As technology has advanced through the years, coercivity ratings on tapes and hard drives has grown allowing users to store more information on said media. In turn, these higher-coercivity tapes and hard drives require advanced degaussers with more powerful magnetic fields.

DTA (DT Asia) is a major provider of degaussing and disintegrating machines. Our NSA approved Degaussers and Disintegrators for Secure Electronic Data Destruction is well-known in for degausser Singapore, degausser Japan and degausser Hong Kong. The solutions are various for every need of Data destruction:



Please contact us for more information and quotation.

Secure Wipe Singapore

Why wipe your storage device?

secure-wipeWhat happens to all the personal documents, pictures, private emails, programs, passwords, credit card details, etc that are on it?

These days, where just your name, address and date of birth are enough for someone to pretend to be you, what do you do with your old computer?

These days, where thieves regularly buy used hard drives on ebay and find for free at recycling centers and garbage dumps, what do you do?

Well, obviously you delete everything, but how?

Just delete the files? What exact files? Windows keeps all sorts of internal records everywhere!

With free forensic software your deleted files can be undeleted and a lot of information you probably never knew was on there can be found!

Secure Erase or secure wipe is the name given to a set of commands available from the firmware on PATA and SATA based hard drives.

Why Secure Wipe?

Why might you want to want to wipe a disk instead of just deleting individual files, messages, and so on? The main reason is what can happen if a device is seized. Forensic inspection of a seized device with special software tools can recover significant amounts of deleted information and references to individual files and software that have previously been removed. Wiping your disk entirely is a valuable means of protecting data against such a forensic examination, and also not having to make individual decisions about whether to erase particular things.

It’s also important if you want to make sure photos or videos are truly deleted from a camera or phone’s SD card, since these devices rarely delete media securely.

A laptop can wipe its own hard drive, or removable storage media like USB drives or SD cards, by overwriting the contents. One method of doing this is formatting the storage medium, but note that this term is applied to two very different processes. Only full formatting with overwriting (also called “secure formatting”) actually erases the hard drive by overwriting data. “Quick format” does not do so, and is thus less secure. Formatting tools let you choose between a quick format and a secure overwriting format. For data destruction, always choose a secure overwriting format.1

You should already have built-in tools that can perform a full overwriting format or wipe a hard drive, or you may download third-party tools to do this. Below are some steps you can take with major computer operating systems to wipe your devices or removable media. Keep in mind that after wiping a hard drive, you may need to reinstall the operating system before you can use the device again.

One consideration when wiping computer media is the limited ability to delete data on solid-state drives (SSDs) ubiquitous in modern computers, including flash-based removable media as well as internal SSD hard drives. Because of a technology called wear leveling, overwriting may not reliably delete these kinds of storage media in full. This technology tries to spread out where things are stored to prevent any one part of the storage medium from being used more than another part. Researchers have shown that overwriting a single file on an SSD often doesn’t destroy that file’s contents; even after the entire device has been overwritten, wear leveling may leave a small random portion of the data on these media in a recoverable form. There are software vendors that promise to securely delete SSDs, but it is still not clear to us whether this can be done reliably to make the information completely unrecoverable. Encrypting your SSD may be the best way to prevent access to the information on the drive.

Once a hard drive has been erased with a program that utilizes Secure Erase firmware commands, no file recovery program, partition recovery program, or other data recovery method will be able to extract data from the drive.

Note: Secure Erase, or really any data sanitization method, is not the same as sending files to your computer’s Recycle Bin or trash. The former will “permanently” delete files, whereas the latter only moves the data to a location that’s easy to flush away from the system (and just as easy to recover). You can read more about data wipe methods through that data sanitization link above.

Since Secure Erase is a whole-drive data sanitization method only, it is not available as a data wipe method when destroying individual files or folders, something tools called file shredders can do. See our Free File Shredder Software Programs list for programs like that.

Using Secure Erase to erase the data from a hard drive is often considered the best way to do so because the action is accomplished from the drive itself, the same hardware that wrote the data in the first place.

 Other methods of removing data from a hard drive may be less effective because they rely on more standard ways of overwriting data.
 According to National Institute of Standards and Technology (NIST), the only method of software-based data sanitation must be one that utilizes a hard drive’s Secure Erase commands.


Wipedrive is world’s Only EAL4+ Common Criteria Disk Wiping Software

What is WipeDrive?

WipeDrive is the world leader in secure data destruction. It allows corporations and government entities to permanently and securely erase data from hard drives, removable media and mobile devices, providing a secure, cost-effective, and environmentally responsible way of recycling and retiring computer storage.

Wipe SSDs (Solid State Drives)

Need to wipe solid state drives? Since 2011, WipeDrive has been a market leader in comprehensively wiping SSD drives by removing security freeze locks to ensure there are no hidden or locked areas of the drive that are missed. Erasing SSDs is a priority for many companies because they retain their value better than traditional platter hard drives allowing them to re-coupe part of their cost or re-use the drives internally. WipeDrive can wipe any SSD drive that is free from manufacturer defects.

DTA (DT Asia) is a major provider of degaussing and disintegrating machines. Our NSA approved Degaussers and Disintegrators for Secure Electronic Data Destruction is well-known in Singapore, Japan and Hong Kong. The solutions are various for every need of Data destruction:


DTA offers best Secure Wipe Singapore, Secure Wipe Hong Kong and Secure Wipe Japan with Wipedrive Solution.

Please contact us for more information and quotation.

How to Dispose your Computer and Portable Storage Media Securely

Dispose storage media

dispose storage media

Do you know that data still resides on your computer and portable storage media, such as thumb drives and memory cards, after you delete the document or files?

Using the analogy that your computer’s storage is a library, deleting a file is akin to removing a book’s index from the library catalogue. The book (file) will still be in the library (computer’s storage), you can still find it if you have the right tools. The same analogy can be applied to other types of electronic storage media. A storage media may contain more personal and confidential information than you thought. Personally identifiable information (PII), financial credentials, and sensitive data can be recovered if they are not completely and securely removed. The easiest way for criminals and fraudsters to obtain such information is to examine disk drives that were not sanitised.

The Myth of Deleting and Reformatting

Deleting all the files or reformatting your storage media is not a secure way to remove data before disposal. Bits and bytes of the data can still be recovered after you have performed these two actions.

Myths Facts
“Once I delete the unwanted file in my computer and clear my computer’s ‘recycle bin’, the file is gone forever” Recalling the library analogy, deleting a file is the same as removing a book’s index from the library catalogue. It does not remove the book from the library, you just couldn’t find it if you look into the library catalogue. In the case of a computer’s storage, the file’s data still resides in the storage media, until the memory space that it occupies in the storage media gets overwritten by other files’ data.
“I can reformat my computer’s hard disk drive to remove all traces of past data” When you reformat your computer’s hard disk drive or other portable storage media, it may look as if all data in it has been erased. However, that is far from the truth, your previous data still resides in the storage media and can still be recover.

Reformatting your computer’s hard disk is similar to destroying the library catalogue. However, the books can still be found on the shelves.

What Should You Do Before Disposing Your Computer and Removable Storage Media

Data stored in your devices (e.g. computer, laptop, and mobile devices) resides in its storage media (e.g. hard disk, storage card, etc.).  In this section, we will discuss three actions that you may consider before disposing your computer and removable devices.

1 Encryption
Encryption is the process of encoding information using an “encryption algorithm” and “encryption key”, turning it into an unreadable ciphertext. By encrypting your data, others will not be able to retrieve its content unless they gain access to the “encryption key” (like your password) that you use to encrypt the data. You can either encrypt specific files in your storage media or the entire storage media. However, the security of the data is only as strong as its encryption standard and key. It can be recovered given enough time and effort. A list of encryption software can be found on Wikipedia (Comparison of Disk Encryption Software).When choosing an encryption algorithm, the AES128 (AES256 when available) encryption standard. Remember to always use a strong password (encryption key) to encrypt the data.
2 Secure Data Erasure
Secure data erasure uses software-based methods to overwrite every bits of your storage media’s memory space such that all its original data is overwritten to an unrecoverable state.
3 Physical Destruction
You can either shred it, or pulverise it completely. You would require industrial standard tools to destroy your hard disk as it is definitely much tougher to break than you think.

Dispose your Computer and Removable Storage Media Responsibly

After you have sanitised your computer or removable media, you should dispose your electronic waste (e-waste) responsibly in an environmentally friendly way. Consider recycling it; you can find a list of collectors and traders for recyclables on the National Environmental Agency (NEA)’s website (

DTA (DT Asia) is a major provider of degaussing and disintegrating machines. Our NSA approved Degaussers and Disintegrators for Secure Electronic Data Destruction is welknown in Singapore, Japan and Honkong. The solutions are various for every need of Data destruction:



Please contact us for more information and quotation.

Data wiping solution Singapore

Data Wiping

Data wiping is the process of logically removing data from a read/write medium so that it can no longer be read. Performed externally by physically connecting storage media to a hardware bulk-wiping device, or internally by booting a PC from a CD or network, it is a nondestructive process that enables the medium to be safely reused without loss of storage capacity or leakage of data.

 data wiping

Why You Should use Data Wiping

There are two main reasons data wiping may be a better option for your organization. The first, is that the drive is still usable after it has been wiped. That means that the drives can be remarketed and reused. The second reason is that data wiping is cost-effective. You can get the data removed from your disk drives without the use of expensive disk shredders. That means you can have more money in your IT budget for additional projects, or to purchase new hardware.


Secure erase procedure (also known as a “disk wiping”) is performed when it is for some reason necessary to irreversibly delete some data. This procedure is typically applied to “sensitive” (i.e. top secret) data only. When you erase the file by using normal means, the corresponding references are deleted, and the space formerly occupied by the file is marked as being free. However, the actual file data remains intact on the disk until the space is claimed by some other file (at which point the original data is overwritten). We consider data overwritten at least once beyond any recovery. While it was possible to recover previous layers of data from older generation media (like magnetic tapes), we consider this is impossible with the modern hard drives. Rumor has it the other way, referring to some obscure “government agencies” being able to recover previous layers of data. We believe such references are a hoax. For any kind of electronic memory (i.e. not involving magnetic surfaces, examples being RAM and SSD devices) the recovery of overwritten data is certainly impossible, because no remains of previous state are available by the very design of the storage.

There is a DoD (U.S. Department of Defense) standard of data wiping – DoD 5220.22-M

WipeDrive is the world leader in secure data destruction. It allows corporations and government entities to permanently and securely erase data from hard drives, removable media and mobile devices, providing a secure, cost-effective, and environmentally responsible way of recycling and retiring computer storage.


What is data erasure and how to do it

Data erasure

What is data erasure?

Data erasure is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by using zeros and ones to overwrite data onto all sectors of the device. By overwriting the data on the storage device, the data is rendered unrecoverable and achieves data sanitization.


Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to the data disk sectors and make the data recovery possible with common software tools. Unlike degaussing and physical destruction, which render the storage media unusable, data erasure removes all information while leaving the disk operable. New flash memory-based media implementations, such as solid-state drives or USB flash drives can cause data erasure techniques to fail allowing remnant data to be recoverable


Why should data be erased?

Companies, no matter whether they are part of a large corporation or a smaller business, would definitely need to use a professional data erasure method if they want to ensure that their data doesn’t fall into the wrong hands.


Due to legal and internal regulations, data should be erased at the end of its so-called lifecycle. There are a number of existing national rules, regulations and laws that already require companies to comply with data protection measures, and also with data erasure.


No matter what method of data erasure is used, it should always be part of a consistent process and take into account some basic points. A rule for the secure disposal of old devices should be put in place and – this is the actual core issue – also be respected. It should also be clearly specified who is responsible for the actual data erasure and who for checking it. Because from the perspective of compliance, these tasks should be the responsibility of different people. And finally, companies should never forget that data erasure is not a bothersome imposition but something crucial for the welfare of the company.


Methods of Data Erasure

  1. Degaussing

There are some reliable and inexpensive ways to have data erased securely, and above all, irrevocably. If the data storage device is no longer to be used after erasure, there are two possible methods: either demagnetization using a Degausser or mechanical destruction in a so-called shredder. Both solutions work well in case of defective equipment and when the hardware necessary to access the data no longer exists. However, those responsible have to understand clearly that afterwards the media become absolutely unusable.


Degaussing does, unfortunately, have a couple of disadvantages. For a start, it’s effective on magnetic media and magnetic media only. A degausser might be powerful enough to wipe a 100-terabyte hard drive but put a flash storage device in there and it’ll come out unharmed.

Secondly, degaussed hard drives can’t be reused, so it’s not an ideal solution for companies looking to recycle or sell their hardware.

Take a look at our degausser products 

  1. Software

One of the simplest ways to permanently erase data is to use software. Hard drives, flash storage devices and virtual environments can all be wiped without specialist hardware, and the software required ranges from free – such as the ‘shred’ command bundled with most Unix-like operating systems – to commercial products.


While different data destruction applications use different techniques, they all adhere to a single principle: overwrite the information stored on the medium with something else. So, a program might go over a hard drive sector by sector and swap every bit for a zero, or else with randomly generated data. In order to ensure that no trace of the original magnetic pattern remains, this is typically done multiple times – common algorithms include Scheier seven-pass, as well as the even more rigorous, 35-pass Gutmann method.


Unfortunately, there are a few drawbacks to software-based data erasure. For one, it’s fairly time-consuming. Then, perhaps more significantly, there’s the fact that if certain sectors of the hard drive become inaccessible via normal means, the application won’t be able to write to them. Nonetheless, it’ll be possible for someone with the right tools to recover data from a bad sector.


Obviously, software-based data erasure also hits a snag when you want to destroy information stored on media that can only be written to once, such as most optical discs.

WipeDrive is the world leader in secure data destruction. It allows corporations and government entities to permanently and securely erase data from hard drives, removable media and mobile devices, providing a secure, cost-effective, and environmentally responsible way of recycling and retiring computer storage.


  1. Physical Destruction

Finally, physically destroying the media is an option, but it is not always as fail-safe a method as it seems. A hard drive can sustain significant damage before the data contained therein is rendered irretrievable. In fact, even if the spinning platters inside are shattered, it’s theoretically possible that someone might put the parts together and recover the contents.


As such, simply snapping a hard drive in half isn’t a suitable technique for permanently erasing end-of-life data. If a company goes down the physical destruction route, it should ensure that the media is shattered into as many pieces as possible – most professionals would recommend using a specialist hard drive shredder.


For devices that use flash memory, the process is a little different. If the memory chip itself is destroyed, the data can’t be recovered. But if it survives, it can be transplanted into another circuit board with a fresh controller chip and the information can be accessed without much trouble.


In summary: it’s easy to assume that physically destroying media is a guaranteed way of securely erasing the data, but that’s not always the case. Doing the job properly is often as time-consuming as any other method and requires no less rigor.

You can use a crusher or a shredder for this particular method of data destruction.

What to Do After A Data Leak: 5 Critical Steps

No matter how many security procedures you follow, a data leak can still happen. Make sure you’re prepared in the event of an emergency with our five key steps.

There were almost 1600 data breaches in the United States during 2017. Despite increased security measures, many businesses and organizations faced a situation where a data breach occurred.

How you handle any data leak is important. Being prepared and taking immediate action can limit the damage caused by the incident as well as lower the cost of a data breach.

Here’s what you need to know about handling a security incident.

data leakKey Steps in Handling a Data Leak

There are 5 steps you can take in response to a data breach to lower the damage.

1. Assemble the Team

You’ll need to bring together a variety of experts to deal with the situation. This includes IT people, management, and legal counsel.

It’s important to identify how the leak happened, what information was exposed, and what measures need to be taken in response to the incident.

Dealing with the consequences of the data leak may require the use of outside forensic experts and legal counsel.

2. Secure Your IT Systems

Once you realize a breach has occurred, it’s important to secure all IT systems to make sure more data aren’t lost. This could mean pulling computers off the network until you can be sure they are not compromised and leaking more data.

Another key step is having all individuals authorized to access IT systems change their login credentials in case the hackers obtained access to this information during the breach.

Once the cause of the leak is known, you’ll want to be sure any machines connected to the network have security protections against a similar attack.

3. Create a Communications Plan

Nobody wants to tell the world they lost data but it’s important to notify all affected individuals about the incident. This includes your employees and any customers impacted.

If the data leaked are sensitive and could affect the privacy and security of individuals, it may be necessary to use a public relations campaign to help you reach the individuals whose data were lost.

If it was a large-scale breach, you’ll likely need a communications team in place to handle questions from impacted individuals as well as give relevant information to those affected.

4. Notify Law Enforcement and Government Agencies

Letting law enforcement know about the breach can help lower the risk of identity theft if personal information was part of the breach.

Depending on the type of data lost and relevant federal and state laws, you might need to notify specific government agencies about the data leak.

To find out who you need to notify, you’ll need to research state and federal laws. An easier approach is to hire legal experts who specialize in handling data breach incidents.

5. Fix the Problem

Data breaches happen when hackers exploit weaknesses in your IT systems. Whether it’s computer vulnerabilities or poorly trained employees, you’ll need to make sure the issue doesn’t happen again.

Often it will take some time and a security audit to find weaknesses in your IT systems or procedures.

Working with a cybersecurity expert can help you identify and address issues.

Moving Forward

Using strong cybersecurity protections can help avoid the loss of data to hackers. Destroying unneeded data can help prevent data leaks by reducing the amount of data retained.

If you haven’t set up a secure data destruction process, we can assist you in developing one.

Contact us today to find out how we can help you.