Blog
Field guides for ITAD and data sanitization.
Expert guides on data sanitization, NIST 800-88 compliance, HIPAA and PCI DSS destruction requirements, and ITAD best practices.
·8 min read
What Is Data Sanitization? A Complete Guide for IT Professionals
Deleting files or formatting a drive does not remove data. Data sanitization permanently and irreversibly destroys it. This guide covers the three NIST categories, when to use each, and why documentation is critical.
·10 min read
NIST 800-88 Rev. 2 Explained: What Changed and What It Means for Your Organization
NIST published the updated SP 800-88 Rev. 2 in 2025, modernizing media sanitization guidance for SSDs, NVMe, cryptographic erasure, and cloud environments. Here is what changed and what your organization needs to do.
·7 min read
Hard Drive Destruction vs. Data Erasure: Which Is Right for Your Business?
Physical destruction and software erasure both achieve compliant data sanitization, but they differ in cost, environmental impact, and asset recovery value. This comparison covers when to use each and why most organizations benefit from a hybrid approach.
·9 min read
HIPAA Data Destruction Requirements: What Healthcare Organizations Must Know
HIPAA requires that ePHI be rendered unusable, unreadable, and indecipherable at disposal. This guide covers the specific rules, documentation requirements, penalty tiers, and best practices healthcare organizations need to follow.
·7 min read
Certificate of Data Destruction: What It Should Include and Why It Matters
A certificate of data destruction is the proof that data was actually destroyed. This guide covers what it should include, red flags in weak certificates, how tamper-evident QR verification works, and why seven-year retention is the standard.
·8 min read
Chain of Custody in ITAD: Why Every Step Needs Documentation
Gaps in your ITAD chain of custody create legal liability, compliance failures, and reputational risk. Learn what proper documentation looks like and how to automate it.
·8 min read
SSD Data Destruction: Why Traditional Methods Don't Work
Traditional overwrite methods leave data recoverable on SSDs. Learn why flash storage requires firmware-level sanitization commands and what NIST recommends.
·7 min read
Network Equipment Sanitization: Documenting Factory Resets with Revoke
Switches, routers, and firewalls store sensitive data too. Learn how Revoke automates network equipment sanitization and integrates with ExpungeData for tamper-evident documentation.
·9 min read
PCI DSS Data Destruction Requirements: Protecting Cardholder Data at End of Life
PCI DSS Requirements 3.1 and 9.4 mandate documented destruction of cardholder data. Learn what QSAs expect and how to produce audit-ready records.
·7 min read
The True Cost of DIY Data Destruction: Why In-House Isn't Always Cheaper
The hidden costs of in-house data destruction -- labor, software, equipment, and documentation gaps -- often exceed third-party services. Here is the true cost breakdown.