Data Security

The data an organization collects and stores must be handled with the utmost care, both on network and off network. In fact, once an IT asset is removed from the organization’s network, its data no longer resides within the protection of network or firewall security and is at higher risk for loss.

To protect our clients’ data, GCI performs proven processes to protect data-bearing devices during the IT asset disposition process. We apply the most current sanitization methods available to ensure complete erasure of all data-bearing devices. As a leader in the industry, GCI is constantly pursuing and implementing the latest sanitization technology available in order to provide the most comprehensive data security to our customers.

Data Erasure and Sanitization


All data erasure is done in strict accordance with NIST SP 800-88 standards at our R2 RIOS certified facility. Our data-erasure lab uses the most technologically advanced equipment and processes in order to ensure that data-bearing equipment is properly sanitized and erased to the most stringent standards.

To ensure the highest level of quality, all asset types are separated and erased according to their unique requirements. All assets are system audited for successful erasure.  If a device is nonfunctional or cannot be successfully sanitized, it will be destroyed to prevent any data exposure.  Our data overwrite process is audited on a daily basis to ensure compliance and quality, and certificates of erasure and destruction are issued for your permanent records.


Onsite Data Erasure

For the highest level of data security, all our data destruction and erasure services can be performed on-site at the customers’ location.


When erasure of hard drives and data devices is not secure enough, GCI offers extreme data protection by destroying and shredding disk drives in accordance with strict requirements. All shredded particles are properly recycled.


There are a litany of federal and state laws and regulations that require companies to follow processes and procedures to ensure compliance.  GCI will manage your data security in a manner that not only meets  compliance standards, but provides you with an extra layer of assurance that reduces your company's risk of data breaches.

We are experts in data compliance including the following:



  • HiTech

  • PCI

  •  Gramm-Leach-Bliley Act