Skip to main contentSkip to navigation
Rossmann Repair Group logo - data recovery and MacBook repair

Secure Data Destruction Services

Retiring servers, decommissioning workstations, or replacing failed drives. We erase data using NIST 800-88 methods and issue a certificate of destruction for every drive. All work performed in-house at our Austin, TX lab.

Since 2008 | Single Location, No Outsourcing | Certificate of Destruction Included

Louis Rossmann
Written by
Louis Rossmann
Founder & Chief Technician
Updated March 2026
5 min read

What Is Secure Data Destruction?

Secure data destruction is the verified, irreversible removal of all data from storage media. NIST Special Publication 800-88 (Revision 1, 2014) defines three sanitization levels: Clear, Purge, and Destroy. We perform Clear and Purge-level sanitization on functional HDDs and SSDs using multi-pass overwrite and firmware-level erase commands. Each drive receives a certificate documenting the serial number, method, and verification result.

NIST 800-88 Sanitization Levels

Clear

Logical overwrite of all user-addressable storage locations. Uses one or more passes of fixed data patterns written to every LBA on the drive. Protects against simple file recovery tools. Suitable for drives being redeployed within the same organization.

Purge

Firmware-level commands that reach areas inaccessible to standard overwrite: reallocated sectors on HDDs, over-provisioned NAND on SSDs, and host-protected areas. For SSDs, this means ATA Secure Erase or NVMe Format with cryptographic erase. Protects against laboratory-level recovery techniques.

Destroy

Physical disintegration, incineration, pulverization, or shredding that renders the media unusable and data unrecoverable by any known method. Required for classified data and drives too damaged for software-based sanitization. We do not offer Destroy-level services; we refer these to certified ITAD shredding facilities.

What We Do and Do Not Offer

Services We Provide

  • Multi-pass overwrite on functional HDDs (NIST 800-88 Clear)
  • ATA Secure Erase and NVMe Format on functional SSDs (NIST 800-88 Purge)
  • Post-erasure verification via read-back sampling
  • Certificate of destruction with drive serial, method, and date
  • Volume processing for organizations retiring multiple drives

Services We Do Not Provide

  • Physical shredding or disintegration (no industrial shredder on-site)
  • Degaussing (modern high-coercivity HDDs require NSA-listed degaussers that cost $30,000+; we do not own one)
  • Erasure of non-functional drives (dead drives cannot accept write commands)
  • NSA/CSS EPL-listed destruction for classified media

If your drives require Destroy-level sanitization or you handle classified data subject to NSA/CSS guidelines, we will tell you that upfront and refer you to a facility with the right equipment. We will not pretend we offer something we do not.

HDD Erasure Process

For spinning hard drives, standard file deletion only removes the file system pointers. The actual magnetic patterns remain on the platters until overwritten. Recovery tools like PhotoRec, R-Studio, and our own PC-3000 can reconstruct deleted files from those remnant patterns. Secure erasure overwrites every addressable sector on the drive.

1

Drive intake and serial number logging

We record the drive manufacturer, model, serial number, capacity, and firmware revision. This data goes on the certificate of destruction.

2

Health check and functional verification

We verify the drive is functional and can accept write commands across its full LBA range. Drives with reallocated sectors, pending sectors, or mechanical issues that prevent full writes are flagged; those sectors may not accept overwrite, and the certificate reflects this.

3

Multi-pass overwrite

Full-disk overwrite with verified patterns. A single zero-fill pass is sufficient for modern HDDs per NIST 800-88 guidance, but multi-pass overwrite (typically 3 passes with alternating patterns plus verification) satisfies organizations that still reference the older DoD 5220.22-M standard.

4

Verification and certificate issuance

After erasure, we sample sectors across the drive to confirm overwrite completion. The certificate of destruction documents the drive identity, sanitization method, date, and pass/fail verification status.

Why SSDs Are Different

Traditional overwrite does not work on SSDs the way it works on HDDs. SSD controllers manage wear leveling, garbage collection, and over-provisioning. When you write to LBA 1000, the controller may map that to a different physical NAND block than before. The old block containing your original data sits in a reserve pool, unreachable by host-level write commands, until the controller garbage-collects it.

TRIM commands tell the controller to mark blocks as invalid, but TRIM is advisory. The controller decides when to erase those blocks. Issuing TRIM across the entire drive does not guarantee immediate physical erasure of all NAND cells.

How We Handle SSD Erasure

  • SATA SSDs: ATA Secure Erase command. The controller erases all NAND blocks, including over-provisioned areas and remapped blocks.
  • NVMe SSDs: Format NVM command with Secure Erase Setting = 2 (cryptographic erase). If the drive uses full-disk encryption internally, this destroys the encryption key, rendering all stored data permanently unreadable in a matter of seconds.
  • Self-encrypting drives (SEDs): PSID revert or crypto-erase destroys the internal media encryption key. All data on the drive becomes cryptographic noise.

Why Degaussing Is Not a Universal Solution

Degaussing uses a powerful magnetic field to randomize the magnetic domains on HDD platters. It was effective when drives used longitudinal recording. Modern perpendicular magnetic recording (PMR) drives and shingled magnetic recording (SMR) drives have higher coercivity media that requires proportionally stronger degaussers. An NSA-listed degausser rated for modern media costs $30,000 or more. A consumer or bargain degausser may not generate enough field strength to fully sanitize a modern high-density platter.

Degaussing has zero effect on SSDs. There are no magnetic domains on NAND flash; the data is stored as electrical charge in floating-gate transistors. Running an SSD through a degausser does nothing to the data. For SSDs, the only options are firmware-level erase (functional drives) or physical destruction (non-functional drives).

Recovery and Destruction in the Same Workflow

Corporate IT teams decommissioning servers often need both services at the same time: recover data from one failed drive, securely erase the others. Sending drives to two different vendors adds shipping risk, tracking overhead, and chain of custody gaps. We handle both under one roof.

Recovery scenario

A RAID array failed. One drive has a head crash and needs data recovery. The remaining drives in the array contain sensitive data and need secure erasure before disposal.

Destruction scenario

An organization is replacing all workstation SSDs. The old drives are functional and contain employee data, financial records, and email archives. Each drive gets a cryptographic erase and an individual certificate of destruction.

Frequently Asked Questions

What is a certificate of destruction?

A certificate of destruction is a document we issue after completing secure erasure of your drives. It includes the drive serial number, make, model, erasure method used, date of destruction, and verification status. Corporate IT departments and compliance officers use this for audit trails when decommissioning hardware.

Do you offer physical drive shredding?

No. We do not operate an industrial shredder or degausser. We perform software-based secure erasure on functional drives using multi-pass overwrite methods aligned with NIST 800-88 Clear and Purge levels. For drives that require physical destruction (failed SSDs, drives with classified data requiring Destroy-level sanitization), we recommend a certified ITAD vendor with NSA-listed degaussing or shredding equipment.

Can you securely erase SSDs?

Yes, with caveats. SSDs with functional controllers support ATA Secure Erase and, on NVMe drives, the Format NVM command with cryptographic erase. These commands instruct the controller to wipe all NAND blocks, including over-provisioned and wear-leveled areas that standard file deletion misses. If the SSD controller is dead, software erasure is not possible; physical destruction is the only option for a non-functional SSD.

How much does secure data destruction cost?

Pricing depends on drive count, drive type, and whether you need individual certificates per drive or a batch certificate. Contact us for a quote. Volume pricing is available for organizations retiring multiple drives.

Is NIST 800-88 the same as DoD 5220.22-M?

No. DoD 5220.22-M is an older standard that specified a fixed 3-pass or 7-pass overwrite pattern. NIST 800-88 (Guidelines for Media Sanitization, revised 2014) replaced it as the recommended framework. NIST 800-88 defines three levels: Clear (logical overwrite), Purge (firmware-level commands or block erase), and Destroy (physical disintegration, incineration, or shredding). The DoD standard is still referenced in contracts, but NIST 800-88 is the current federal guideline.

Can you erase data from a drive that already failed?

If the drive is functional enough to accept write commands, yes. If the drive will not spin up, will not enumerate on USB or SATA, or has a dead controller, software erasure cannot reach the media. In that case, physical destruction is required, and we will refer you to a certified destruction vendor.

Data Recovery Standards & Verification

Our Austin lab operates on a transparency-first model. We use industry-standard recovery tools, including PC-3000 and DeepSpar, combined with strict environmental controls to make sure your hard drive is handled safely and properly. This approach allows us to serve clients nationwide with consistent technical standards.

Open-drive work is performed in a ULPA-filtered laminar-flow bench, validated to 0.02 µm particle count, verified using TSI P-Trak instrumentation.

Transparent History

Serving clients nationwide via mail-in service since 2008. Our lead engineer holds PC-3000 and HEX Akademia certifications for hard drive firmware repair and mechanical recovery.

Media Coverage

Our repair work has been covered by The Wall Street Journal and Business Insider, with CBC News reporting on our pricing transparency. Louis Rossmann has testified in Right to Repair hearings in multiple states and founded the Repair Preservation Group.

Aligned Incentives

Our "No Data, No Charge" policy means we assume the risk of the recovery attempt, not the client.

LR

Louis Rossmann

Louis Rossmann's well trained staff review our lab protocols to ensure technical accuracy and honest service. Since 2008, his focus has been on clear technical communication and accurate diagnostics rather than sales-driven explanations.

We believe in proving standards rather than just stating them. We use TSI P-Trak instrumentation to verify that clean-air benchmarks are met before any drive is opened.

See our clean bench validation data and particle test video

Need Drives Securely Erased?

Send us your drives or drop them off at our Austin lab. Each drive gets verified erasure and a certificate of destruction.