top of page

Industries We Work With:

Healthcare Team Collaboration

Healthcare
Industry

We offer specialized shredding services designed for the healthcare sector. We ensure customers are compliant with HIPAA regulations and secure patient information. 

Financial Report

Financial
Industry

Financial institutions fall under the Gramm-Leach-Bliley Act (GLBA) and Fair and Accurate Credit Transaction Act (FACTA). We offer specialized on-site shredding services to protect customer sensitive data.

Capitol Building

Federal
Government

We are one of very few companies which can achieve the IT destruction standards for National Security Classified Information. (NSA PM 9-12 and DOD SAP) We do our part to ensure our nations most sensitive secrets are protected.

police-team-investigation-and-documents-for-filin-2023-11-27-05-13-37-utc.webp

Law
Enforcement

The FBI requires all law enforcement data be destroyed under the Criminal Justice Information Services Security Policy (CJIS). We offer shredding services which achieve this standard. 

School

Education
Industry

Educators are entrusted with highly sensitive data about those most vulnerable, children. We help education organizations stay compliant under the Family Educational Rights and Privacy Act (FERPA) and Protection of Pupil Rights Amendment (PPRA).

Servers

Data
Centers

Companies who operate their own data centers or Co-Location (COLO) providers have large amounts to sensitive IT hardware. Our mobile destruction trucks can process up to ten thousand hard drives in a single day. 

Image by Bovia & Co. Photography

Local
Government

Governments of all sizes are entrusted with citizen sensitive data. We help local governments securely sanitize their old data at affordable rates. We help them understand NIST 800-88 guidance and protect their citizens.

military-network-technician-in-server-room-2023-11-27-05-19-47-utc.webp

Defense
Industry

The DOD's Cyber Security Maturity Model Certification (CMMC) process is inspecting companies IT sanitization and disposal practices. We help companies achieve the disposal outcomes required by CMMC.

Frequently Asked Questions

  • HOW MUCH DOES DATA DESTRUCTION COST?
    While rates differ by location, destruction standard required, number of drives you have, and urgency of required services; most customers pay between $5 and $20 per drive. The more hard drives you have to destroy, the lower of cost per drive. Please email us at contact@mansfieldtech.us for a detailed cost estimate.
  • WHAT ABOUT OVERWRITING? (DoD 5220.22)
    Overwriting hard disk drives with patterns of ones and zeros was a common method of data sanitization. In 1995 the Department of Defense published 5220.22-M which specified a "3 pass" method of sanitization. Then in 2001 due to rising security concerns this manual was updated to a 7-pass method. Eventually in 2011 the DoD abandoned allowing overwriting when sanitizing their sensitive data at the end of it's useful life. In 2021, the NISP Operating Manual became effective as a federal regulation. This is commonly refereed to as "NISPOM rule: and it no longer even refers to overwriting as a sanitization method. You occasionally still see companies claiming to follow this standard or to be DoD 5220.22 "compliant". This is a dead give away of an organization which has failed to keep up with modern sanitization standards. Why was overwriting abandoned? Primarily due to new storage technologies being developed and the time needed to implement 3 or 7 pass overwrite methods. Flash based media contain spare cells and perform wear leveling; this makes it infeasible for a user to sanitize all previous data using overwriting. Additionally the data storage capacity (number of read/write sectors) has grown exponentially. In 2002 a high end new hard drive was ~100GB, today 10TB hard drives are available. The time required to overwrite a 10TB hard drive makes the process unpractical. DoD 5220.22 was a government focused standard which many private sector companies latched onto during the 2000s. NIST 800-88 was developed to provide a larger scope of media sanitization guidelines for commercial organizations. NIST does still list overwriting as a method of sanitization, but the number of passes have been dropped. NIST 800-88 allows for other techniques such as encryption, factory resets, and block erasure to be viewed as sanitization. But 800-88 is full of caveats and references to different security levels. But All sanitization techniques (including overwriting) are not viewed as appropriate for all commercial security levels. NIST puts the responsibility upon organizations to select appropriate sanitization methods.
  • WHAT ABOUT CRYPTOGRAPHIC TECHNIQUES? (ENCRYPTION)
    Cryptographic Erasure is the digital equivalent of throwing your data in a safe and destroying the key to open that safe. The data isn't actually destroyed, just encrypted. The gold standard for encryption today is Advanced Encryption Standard and most organizations today use either 128 bit or 256 bit keys to protect their data. AES has been a fantastic standard and was selected in 2001 by the U.S. National Security Agency to protect classified data. However, Quantum computers are no longer far off science fiction. Both the NIST and the NSA are concerned if AES will hold up against Quantum attacks. While AES 256 is currently considered Quantum "resistant" by the NSA, nobody knows for certain. In 2022 the White House directed the heads of all executive departments and agencies to prepare for post-quantum encryption. In December of 2024 the Australian Signals Directorate set a goal to sunset many commonly used encryption standards today by 2030: The development and procurement of new cryptographic equipment and software ensures support for the use of ML-DSA-87, ML-KEM-1024, SHA-384, SHA-512 and AES-256 by no later than 2030." It is very possible all encryption available today could be easily broken by 2030. This is why Mansfield Tech recommends even private companies holding PII, PHI, and other sensitive customer information destroy their data and not rely upon encryption alone.
  • WHY IS HARD DRIVE DESTRUCTION IMPORTANT?
    Hard Drive destruction (including other forms of media such as solid state drives) is critical for protecting sensitive information from being accessed. Deleting files or formatting the drive does not completely remove the data. Other methods such as NIST 800-88 Purging are often difficult to scale and prone to human error. Physical destruction provides you the highest level of certainty that data is irrecoverable and protects against data breaches and identity theft.
  • WHICH DESTRUCTION STANDARD IS RIGHT FOR YOU?
    NIST 800-88 and 800-53 outline recommendations and security controls based upon the sensitivity of data, but your organization is responsible to evaluate and choose appropriate security controls. For classified data, Combined Federal Regulations require all organizations regardless of agency, military branch, and contract vehicle to follow NSA guidance. If you want to deep dive a specific regulation, please review our "Data Destruction Standards" page.

About Us

We specialize in high-security mobile data destruction and shredding of IT assets. With years of experience and a deep understanding of industry standards, we are committed to ensuring your sensitive information remains secure, compliant, and confidential.

Mobile Shredding

We come to you, equipped with state-of-the-art equipment to ensure fast, secure destruction of your drives without having to worry about shipping or sending your data off-site.

On-Site Destruction

Your assets are destroyed on-site under your supervision offering convenience, security, and transparency, while exceeding standards required by NSA, HIPAA, CJIS, NIST, GLBA and others.

Certificate of Destruction

After every job, we will provide your organization with a Certificate of Destruction (CODs) which can achieve the standards outlined in NIST 800-88 and NSA PM 9-12.

Responsible Recycling

We partner with R2 and E-Steward certified electronic recycling operations. We ensure all electronic waste is recycled responsibly.
 

Why Choose Us

Certified & Secure

We understand the importance of keeping your sensitive data safe. Our team follows strict, industry-approved standards to provide secure destruction services. Rest easy knowing your materials are handled by certified professionals.

Start Shredding Data

Compliant with Regulations

We are committed to helping you stay compliant with all relevant data protection laws and standards. Whether you need to destroy client records, financial documents, or other confidential information, we have you covered.

Talk to Our Experts

Eco-Friendly Practices

We don’t just protect your data – we protect the environment too. Our shredding process ensures that materials are properly recycled, and we adhere to sustainability practices every step of the way.

Learn More

Trustworthy

Reliable

Secure

IT ASSET DISPOSAL

We help good people

avoid bad headlines.

Disk Hard Drive Cutout

Sensitive
Data Securely
Destroyed

100

%

Compliance
with Security
Standards

100

%

Hard Drives
Safely
Destroyed

100

k

Years of
Experience
 

15

+

Clients We've Worked With:

We are the only company in Ohio which can offer mobile on-site IT shredding services up to NSA standards. Securely sanitize and dispose of sensitive IT assets at affordable rates.

We help good people

avoid bad headlines.

Client Testimonials

Senior Man Portrait

"Their service was fast, reliable, and professional. I feel confident knowing my sensitive data is in good hands."

Client Name

Client Company

Smiling Man in Suit

"We trust them to handle all our data destruction needs. The on-site service was efficient and secure."

Client Name

Client Company

Businessman

"The team was prompt and thorough, and their attention to security gave us peace of mind. Highly recommended!"

Client Name

Client Company

Woman in Suit

"I appreciate their commitment to both security and the environment. Our data is securely destroyed, and the process is eco-friendly."

Client Name

Client Company

Contact Us Today

Mansfield Technologies mobile IT asset disposal truck

Mansfield, Ohio | Columbus, Ohio | Cleveland, Ohio | Dayton, Ohio | Cincinnati, Ohio | Akron, Ohio | Canton, Ohio | Toledo, Ohio | Youngstown, Ohio | Pittsburgh, Pennsylvania | Erie, Pennsylvania | Detroit, Michigan | Grand Rapids, Michigan | Indianapolis, Indiana | Fort Wayne, Indiana | Chicago, Illinois | Buffalo, New York | Louisville, Kentucky | Lexington, Kentucky | Wheeling, West Virginia | Charleston, West Virginia

Service Area

For technical consultation services, media sanitization policy development, and lifecycle planning we will travel to your location anywhere in the lower 48 state of the United States.

If you are within 250 miles of Mansfield, Ohio we can often offer next day service if required.

 

Depending upon availability, if you are within 500 miles we can offer same week services. Locations beyond 500 miles away can still be serviced, but additional planning is required. If you need mobile on-site destruction services please contact us for an estimate.

Technical Consultation

Need help building data sanitization policies and electronics lifecycling planing? We have built data sanitization plans and policies for some of the largest tech companies in the world. Our experts will come to your location and help!

data engineer working
Disk Hard Drive Cutout
hard drive assets and ram
bottom of page