Partnerships

Belkasoft
Elcomsoft
Legal & Other

Disclaimer
Cookies
Use of this website (T&Cs)    
Environmental Responsibility
Compliance
Data Privacy
Documentation

Articles
White Papers
Brochures
Press Releases
Subscribe to our Newsletter

Our Websites

Visit our sister websites
Copyright Strathclyde Forensics © 2009-2015. All Rights Reserved.
About us

Our People
Our Clients
What our Clients say
High Profile Cases
Contact us
Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB
Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor) Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor)
"Absence of evidence is not
evidence of absence"
Our Blogs

Check out our Blogs
Terrorist Alerts

MI5 (UK)
Department of Homeland Security (USA)

Cyberattacks (real time)
Kaspersky
FBI Cyber Most Wanted

Home
ICTTF logo ICTTF logo
ACPO Guidelines ACPO Guidelines
Scottish Legal Aid logo Scottish Legal Aid logo
The American Society of Digital Forensics & eDiscovery The American Society of Digital Forensics & eDiscovery
Limbus Studio Limbus Studio
DFS Logo DFS Logo
Data Removal Certification
Strathclyde Forensics provides Certified Data Erasure for businesses and individuals who need to provide evidence that sensitive business or personal data is not stored in their devices.

For Businesses

When an entire server and network infrastructure or individual laptops and desktops enter an End-of-Life stage (like the end of support of Windows XP in 2014), the transfer to the next generation systems requires the transfer of crucial data. We can make sure that the data that you do not want to be present in particular media have been removed permanently.

The same apply when a business is sold to a new owner and certain personal pieces of data need to be removed before the change of ownership. Another application for our services is when a business sells its old computers in the second hand market.

Our data destruction methods comply with the following standards:

1. Infosec Standard 5 (Her Majesty's Government standard)
2. DOD 5220.22-M  (United States Department of Defense)

For Individuals

If you are leaving your company, facing a electronic exit interview or want to permanent destroy personal data