Due Diligence in Data Destruction
Why "Off-Site" is No Longer Good Enough
What every organisation needs to understand about third-party risk, regulatory exposure, and the only solution that truly eliminates it.
Introduction
When you send your IT assets off-site to be destroyed by a third-party processor, you're not just outsourcing a task.
You're outsourcing trust.
For years, this model has been accepted as "industry standard." But in today's climate of rising cyber threats, regulatory scrutiny, and public accountability, it's no longer good enough. And recent events prove just how dangerous blind trust can be.
The Real-World Case That Changed Everything
In early 2025, it was revealed that an employee at Wisetek (now owned by Iron Mountain) had stolen thousands of devices from government agencies and private organisations during off-site ITAD processes. Some of those devices were still linked to cloud systems.
Source https://resource-recycling.com/e-scrap/2025/02/13/itad-employee-admits-to-stealing-and-reselling-devices/
To cover his tracks?
He issued fake certificates of destruction.
This wasn't a single incident. It happened over multiple years, involved co-conspirators, and went undetected across multiple clients.
This breach highlighted a critical truth:
Once your data leaves your premises, you no longer control it.
The Flaw is in the Model, Not the Provider
Even the biggest names in the industry cannot remove the fundamental weakness of the off-site model:
- Devices must be transported before destruction
- Certificates are only issued after-the-fact
- You're forced to trust that the job was done
No matter how strong the contract, how familiar the brand, or how good the intentions — you are exposed.
The Legal and Regulatory Implications
Under GDPR, the UK Data Protection Act, and industry-specific standards (e.g. NHS DSPT, FCA, ISO 27001), organisations are expected to demonstrate:
- Risk-based decision-making
- Transparent data handling
- Verifiable records of data destruction
Failing to act on known risks—especially when safer solutions exist—could be interpreted as negligence.
Why Data Safe Solutions is Different
We don’t replace your ITAD provider. We remove the risk they can't eliminate.
- Data is destroyed on-site before anything leaves your premises
- Our Smart Wipe Engine generates certificates at the point of destruction
- Every certificate is immediately verifiable via QR code or our secure cloud platform
- No transport. No delay. No forgery possible
- Certified to NIST 800-88, the globally recognised standard for secure data sanitisation
- Accredited with ADISA Product Assurance Certification at the Highest Level, independently audited for IT data destruction security
- Trusted and used by NHS Trusts, Local Government, and Financial Institutions across the UK
This is not an incremental improvement.
It’s a complete redefinition of trust and control.
What Boards, DPOs, and IT Leaders Must Now Consider
- Are we comfortable sending sensitive data off-site, knowing the risks?
- Can we prove to a regulator or auditor that our destruction process is verifiable?
- Do we have total visibility from device decommissioning to final certificate?
- If a breach occurred tomorrow, could we stand behind our process?
This is not an incremental improvement.
It’s a complete redefinition of trust and control.
Take Control. Prove Compliance. Eliminate the Risk.
This is no longer a future consideration.
The risk has been demonstrated. The solution exists.

