Data destruction to NIST 800-88 & IEEE 2883-2022.
Every job ships with a per-job Certificate of Destruction listing serial numbers, methods, witness sign-off, and PDPA Section 24 alignment statement. Wipe, degauss, or shred — chosen per device per the NIST 800-88 decision tree.
Clear, Purge, Destroy — chosen per device.
NIST SP 800-88 Rev. 1 defines three sanitisation categories: Clear (software-based overwrite for re-use), Purge (firmware-level cryptographic erase or specialised wiping), and Destroy (physical destruction). The right method depends on (a) the device's storage class, (b) the data classification, and (c) the intended disposition.
Our per-device decision is documented on the Certificate of Destruction so your auditor can see exactly which method was applied to which serial number, with the operator and witness who signed off.
Sanitisation methods supported
- ♦ NIST 800-88 Clear — single-pass overwrite, suitable for re-use within the original organisation.
- ♦ NIST 800-88 Purge — cryptographic erase, secure-erase command, or specialised firmware wiping.
- ♦ NIST 800-88 Destroy — physical destruction (shred, disintegration) for end-of-life or high-sensitivity media.
- ♦ IEEE 2883-2022 Clear / Purge / Destroy — current storage-sanitisation standard.
- ♦ DoD 5220.22-M overwrite passes — available for legacy-compatibility workflows.
- ♦ Degaussing — for legacy magnetic media when degaussing strength matches media coercivity.
- ♦ Particle-size shred — to <2mm particle size for high-sensitivity loads.
Per-job Certificate of Destruction — what's in it
- ♦ Job reference number (Maxicom format: MXSG-YYYY-XXXXX).
- ♦ Customer name and PO / contract reference.
- ♦ Per-device row: serial, make, model, capacity, method, completion timestamp.
- ♦ Wipe log per device for Clear/Purge methods (pass count, completion, operator).
- ♦ Shred batch ID per device for Destroy method (with photo evidence).
- ♦ Operator + witness signatures (two-operator destruction is standard).
- ♦ Standards citation: NIST SP 800-88 Rev. 1 + IEEE 2883-2022.
- ♦ PDPA Section 24 alignment statement.
If your kit is X, then we do Y.
Which method applies to which storage class — at a glance.
NIST SP 800-88 Rev. 1 defines three sanitisation categories: Clear, Purge, Destroy. IEEE 2883-2022 mirrors them with updated language for modern storage. Both standards expect the method to fit the storage technology and the data classification.
Magnetic HDDs. Clear is single-pass overwrite, suitable for re-use within the original organisation (e.g. internal redeployment to a different team). Purge for HDDs typically means cryptographic erase if the drive supports SED, otherwise specialised firmware-level wiping (the OEM secure-erase command, or a tool like Blancco / WipeDrive). Destroy is physical destruction — degauss-then-shred for high-sensitivity loads, particle-size shred for everything else.
SSDs and NVMe. Overwriting an SSD does not actually erase the data because of wear-levelling — the drive's internal mapping abstracts away the physical blocks the OS sees. NIST 800-88 was updated specifically to address this. Default for modern SSDs and NVMe drives is Purge via cryptographic erase (the drive's internal AES key is destroyed; the data becomes unrecoverable instantly) or the SATA/NVMe secure-erase command. Destroy via shred is also supported.
Tape and optical. Tape is not realistically wipeable in any reasonable time. Optical media (CD, DVD, Blu-ray) is similarly impractical to wipe. Both are Destroy by default — degauss for magnetic tape (where the magnetic strength matches the media coercivity), particle-size shred for everything else.
Hybrid arrays. Storage arrays often mix HDDs, SSDs, and NVMe drives — and sometimes tape backup integrated into the same chassis. The decision is per-drive against the actual storage technology, not array-wide.
Sections and required fields, in order
- ♦ Maxicom job reference: MXSG-YYYY-A-XXXXX (A = sell, B = service, C = buy).
- ♦ Customer name + customer reference (PO / contract number).
- ♦ Pickup date(s) + pickup location(s).
- ♦ Destruction date(s) + destruction location (in-facility / on-site).
- ♦ Per-asset row: serial number, make, model, capacity, classification, method, completion timestamp, operator ID.
- ♦ Wipe log per device for Clear / Purge: pass count, completion, operator.
- ♦ Shred batch ID per device for Destroy: batch reference, photo evidence reference.
- ♦ Operator name + signature (electronic).
- ♦ Witness name + signature (electronic).
- ♦ Standards citation: NIST SP 800-88 Rev. 1 + IEEE 2883-2022; DoD 5220.22-M if used.
- ♦ PDPA Section 24 alignment statement.
- ♦ MAS TRM-aware citation — banking / fintech engagements only.
- ♦ CCoP 2.0 chain-of-custody citation — CII-sector engagements only.
- ♦ Downstream-recipient log: where any residual material went, with their licence reference.
- ♦ Format: PDF + PDF/A archival; both delivered.
Mobile shred + witnessed-wipe at customer premises.
Some engagements require destruction at the customer's premises — typically hospital data-locality policies, bank trading-floor sensitivity, government-cleared facilities. Two on-site formats supported.
Mobile shred unit. Truck-mounted industrial shredder, particle-size to <2mm. Positioned at the loading bay or designated outdoor area; operator loads media; shred runs continuous; output captured in sealed bins for downstream recycling. Standard for HDDs, SSDs (with appropriate care for lithium), tape, optical. Two-operator + witness sign-off identical to in-facility.
Witnessed-wipe operator. NIST 800-88 Clear / Purge performed on-site by our trained operator with a member of your team witnessing the start and end of each device. Wipe log captured in real time on the operator's secure terminal and signed both sides at completion. Used where physical destruction isn't required but the media cannot leave the premises in media-bearing form.
On-site cost is typically 15–25% higher than in-facility to cover the additional vehicle, operator, and time. Lead time is 5–10 business days from SoW to on-site execution — slightly longer than in-facility because of mobile-unit availability.
Visual reference.
Data destruction in Singapore — frequently asked
Can destruction happen on-site at our office or DC?
Yes — for sites where data cannot leave the premises in media-bearing form. Mobile shred unit or witnessed-wipe operator can be deployed; the document pack is the same as in-facility destruction.
What happens to the residual material after destruction?
Destroyed material goes to a downstream recycler. The Certificate of Destruction lists the downstream recipient. We work with NEA-licensed downstream recyclers; recipient name and licence reference are documented per job.
What is NIST 800-88 data destruction and which method applies to which storage class?
NIST SP 800-88 Rev. 1 categorises sanitisation as Clear (single-pass overwrite for re-use within the original organisation), Purge (cryptographic erase, secure-erase command, or specialised firmware wiping for moderate-to-high classification or resale), or Destroy (physical destruction for end-of-life or high-classification). The choice depends on storage technology and data classification. Magnetic HDDs: Clear / Purge / Destroy as appropriate. SSDs and NVMe: Purge via cryptographic erase by default (overwrite is not reliable on SSDs because of wear-levelling). Tape and optical: Destroy by default. Self-encrypting drives: cryptographic erase under Purge.
Can Maxicom Singapore perform data destruction on-site at our office?
Yes. On-site destruction supports two formats. Mobile shred unit: truck-mounted industrial shredder with particle-size <2mm, suitable for HDDs, SSDs, tape, optical media. Witnessed-wipe operator: NIST 800-88 Clear / Purge performed on-site with a member of your team witnessing the start and end of each device, wipe log captured in real time. Document pack is identical to in-facility destruction. Cost is typically 15–25% higher; lead time 5–10 business days.
How long does Maxicom retain the Certificate of Destruction?
At least 7 years, supporting your retention timeline plus an audit-tail buffer. The Certificate is delivered to you as PDF and PDF/A archival; we retain a counter-signed copy on file. PDPA itself does not set a fixed retention period for disposal-evidence; in practice retain for as long as the underlying data was retained, typically 5–7 years for personal data.
Does Maxicom Singapore support DoD 5220.22-M overwrite for legacy compatibility?
Yes. DoD 5220.22-M overwrite passes are available as a method option for legacy-compatibility workflows where your auditor expects the citation. Note that for modern storage the underlying destruction is still chosen via the NIST 800-88 decision tree — DoD 5220.22-M is largely superseded by NIST 800-88 for modern media but the citation can be added to the Certificate alongside NIST and IEEE 2883-2022.
What is NIST 800-88 data destruction?
NIST Special Publication 800-88 Revision 1 is the leading global standard for storage-media sanitisation, published by the US National Institute of Standards and Technology. It defines three sanitisation categories: Clear (single-pass overwrite for re-use within original organisation), Purge (cryptographic erase, secure-erase command, or specialised firmware wiping for moderate-to-high classification or resale), and Destroy (physical destruction for end-of-life or high-classification). Maxicom Singapore performs every job to NIST 800-88 + the complementary IEEE 2883-2022 standard.
How is SSD destruction different from HDD destruction?
SSDs and NVMe drives use wear-levelling — the OS-visible blocks are abstracted from the physical NAND cells by the drive's controller. Single-pass overwrite isn't reliable on solid-state media because the controller may write new data to a different physical cell, leaving original data in the original cell. NIST 800-88 default for SSDs and NVMe is Purge via cryptographic erase (the drive's internal AES key is destroyed) or the SATA Secure Erase / NVMe Sanitize command. Magnetic HDDs support all three NIST categories.
Can Maxicom destroy data on Apple Mac and MacBook hard drives?
Yes. Apple Mac / iMac / MacBook drives — typically NVMe SSDs on recent generations, SATA SSDs on older generations, magnetic HDDs on legacy kit — are destroyed to NIST 800-88 + IEEE 2883-2022 with the appropriate method per storage class. Cryptographic erase via the Apple-supported secure-erase mechanism for SSDs / NVMe; physical destruction for end-of-life or high-classification. Per-device wipe-log or shred-batch-ID captured. Certificate of Destruction lists each device by serial.
How long does data destruction take per server?
For NIST 800-88 Purge via cryptographic erase: typically 5-15 minutes per drive (the cryptographic key destruction itself is instant; the time is spent on operator workflow, verification, log capture). For NIST 800-88 Clear via overwrite: 30 minutes to several hours per drive depending on drive size and method (single-pass vs multi-pass). For NIST 800-88 Destroy via shred: 1-2 minutes per drive once the shredder is loaded. Two-operator + witness sign-off discipline adds operator-coordination time on top.
Does Maxicom provide a Certificate of Destruction for every job?
Yes. Every Maxicom Singapore engagement ships with a per-job Certificate of Destruction in PDF and PDF/A archival format. Sections: header (job ref MXSG-YYYY-{A|B|C}-XXXXX), pickup details, destruction details, per-asset table (serial, make, model, capacity, classification, method, completion timestamp, operator), wipe-log or shred-batch-ID per device, operator + witness signatures, standards citation (NIST 800-88, IEEE 2883-2022, DoD 5220.22-M if used), alignment statements (PDPA Section 24, MAS TRM-aware where applicable), downstream-recipient log.
What is IEEE 2883-2022 storage sanitisation?
IEEE Standard 2883-2022 is a current storage-sanitisation standard published by the IEEE in 2022. It mirrors NIST 800-88's Clear / Purge / Destroy categorisation but with updated language reflecting modern storage technologies (NVMe, self-encrypting drives, persistent memory). Maxicom Singapore cites IEEE 2883-2022 alongside NIST 800-88 on every Certificate of Destruction — the two standards are complementary rather than alternative; satisfying one typically satisfies the other for modern storage.
Is DoD 5220.22-M still a valid data destruction standard?
DoD 5220.22-M is largely superseded by NIST 800-88 for modern storage media. Single-pass overwrite isn't reliable on SSDs because of wear-levelling, which DoD 5220.22-M predates. Maxicom Singapore supports DoD 5220.22-M overwrite passes as a method option for legacy-compatibility workflows where a customer's auditor specifically expects the citation, but the underlying destruction is still chosen via the NIST 800-88 decision tree. The citation appears alongside NIST and IEEE 2883-2022 on the Certificate.
How is data destroyed on networking switches and routers?
Networking kit (Cisco Catalyst / Nexus, Juniper EX / MX / QFX, Arista, HPE Aruba, Fortinet, Palo Alto) typically holds configuration rather than user data — but configurations carry sensitivity (route maps, VPN configs, ACLs, RADIUS / TACACS+ shared secrets, BGP credentials, MPLS configs). Configuration sanitisation runs on every networking buyback: factory-default reset via OEM-specific commands (Cisco 'erase startup-config' + 'reload' from ROMmon; Juniper 'request system zeroize'; Arista 'erase startup-config' + 'erase flash:'). NIST 800-88 Purge applied to any non-volatile flash holding logs.
What's the difference between data destruction and data erasure?
Different terms, often used interchangeably. Strictly: data erasure typically means software-based methods (overwrite, cryptographic erase, secure-erase command) that leave the storage medium intact for re-use. Data destruction typically means physical methods (shred, disintegration, degauss-then-shred) that render the medium unusable. NIST 800-88 collapses both into Clear / Purge / Destroy, where Clear and Purge are erasure variants and Destroy is physical destruction. Maxicom uses the appropriate method per device per the NIST decision tree.