The protection of your data is of paramount importance to us at Metro Data. Whether you are bringing in a computer for service or you want us to dispose of your computer in a secure manner, you can be sure that we will handle your data as if it were our own.
Your Data While We Service Your Computer
We respect each person's data regardless of the content. Whether it's pictures of your dog, your tax returns, or confidential information is irrelevant to us. We treat all data as equally important and strive to keep it safe, keep it secure, and keep it private.
Our approach to service is to solve whatever your underlying issue is and not just wipe the machine and reload from scratch. This allows us to even keep your program settings the same so that it's just as you remember it (except for being broken).
When purchasing a new computer, we copy each file and setting to its appropriate place on the new machine. There should be no searching for documents in some obscure location. The same goes for your program settings.
The Proper Destruction of Your Data
We constantly hear "I have this old computer and I have no idea what to do with it. Can you get rid of it for me?" Yes we can. It doesn't matter whether the data is top secret or your collection of cat videos. We take a double layered approach to the destruction of your data.
Securely Wiping the Hard Drive
When possible, we prefer to securely wipe a drive so that it is physically usable but the data is not recoverable. We routinely give away computers to those who do not have or cannot afford them. To do this, we overwrite the hard drive multiple times with random data before finally writing nothing but zeros to the drive. All data on a hard drive is stored in ones and zeros and this is called a low level format. By first overwriting it with random data and then by nothing but zeros, the original data is all but unrecoverable while the drive is still functional. Upon any request however, we will happily destroy the hard drive.
Destroying the Physical Hard Drive
Upon request, or any time we physically cannot overwrite the drive we opt to destroy it instead. We have two methods of destruction. The first method is to open the hard drive by taking the top of. The insides resemble a record player and a record. We take out the disc/platter out from the case and snap it in half. As data is read in the same manner as a record, circularly around the platter, it is impossible to recover any meaningful data from half a platter.
Likewise, we also subscribe to the method of putting multiple drill holes through the drive which has a similar destructive effect to the ability to retrieve your data.