Our Services

In addition to our suite of High-Security Data Destruction products, Phiston provides services that enable companies to properly manage destruction and disposition of electronic data storage media that have reached the end of their useful life.

Using Phiston’s High-Security hard drive destruction machines, we can securely destroy all your sensitive data storage media including:

  • Computer hard drives (HDDs and SSDs)
  • Optical Media (CDs, DVDs, BluRays)
  • Memory boards
  • Cell/Smart Phones
  • Magnetic stripe cards (drivers’ licenses, security badges, credit cards, etc.)
  • Other Electronic Data Storage Media

Your media will be destroyed at our secure facility in Miami, Florida. You may either deliver the media in person to us or send them to us via a bonded courier. After destruction, you will be provided with a Certificate of Destruction. We will dispose of the destroyed media debris with one of our recyclers, or you may choose to have the debris returned to you. Please contact us for a quote, or to answer any questions you may have.

Policies and Procedures to Ensure Your Company is in Regulatory Compliance

Is your company or department in compliance with regulations for responsible custodianship, security and destruction of data stored on IT assets and portable data storage devices and media?

Are you aware of your responsibilities for managing the sanitization and destruction of electronic data storage media, and the vast and intricate set of governing laws and regulations such as:

  • Federal Acquisition Regulation (FAR)
  • Federal Property and Administrative Services Act (FPASA)
  • Federal Property Management Regulations (FPMR)
  • Federal Information Security Act of 2002

Phiston’s experienced data security technical experts can work with you to:

  • Review and update, or create your corporate data destruction policies and procedures that are relevant to your company and industry, and meet regulatory compliance.
  • Identify appropriate products, procedures and/or service providers to achieve your high-security data destruction goals.