Securely erasing hard drive and SSD from your old devices is the top priority. We have already prepared all contracts for this and offer a legally compliant, BSI and DSVGO compliant and certified solution.

Companies have not only had a duty to data protection since the introduction of the new GDPR. You have to handle sensitive data responsibly and in compliance with the law, for example if you sell a laptop or PC and have the data deleted. Nevertheless, it often happens that internal company data is not correctly deleted. The data scandals are increasing - and the resulting damage can quickly run into the millions. Therefore, you should check carefully who you are leaving your used hardware with. We offer you a comprehensive, state-of-the-art BSI-compliant concept to protect you!

Data security when deleting data

Safety has priority in every process section


With highly sensitive data, the security factor plays a central role as soon as it leaves your company. With our certified partners, we can guarantee secure handling from the first minute.


The data destruction is carried out by selected, trained specialists in a special security area with specially developed software.


The security of your data from the moment it arrives is part of our services. All buildings are VdS alarm-secured, video-monitored and access-controlled. IT security audits confirm that this is an above-average 96%.


Despite the necessary data protection officer, data protection is still a top priority. It is not enough to hire a suitable person internally or externally. The sole responsibility for data processing and data protection lies with the company itself. This makes it clear that the management is liable for violations. Therefore, we ensure a legally secure contractual basis and error-free data cleansing.

Data protection is a top priority

Outsourced data processing

Required for processing directories and agreements with service providers and storage and processing providers for company data. Also in the area of ​​marketing used IT, an ADV is an absolute MUST and the legal basis. Background: If there is data on the data carrier, you need a clear regulation on how it is handled and what obligations and rights result from it. Without this ADV, no hard drive may be removed from a device or even deleted.


A suitable storage location and safe transport should be clarified before the start. Lockable and sealable Transport boxes are standard with us. These are provided free of charge or, depending on the period, for a rental fee. Not only the safety, but also the integrity of the goods is important for high sales. In the course of logistics, for example, we offer GPS monitored transports or unpacked collection. If you wish, we can record the serial numbers for you.


We help protect our building so that your goods and data are secure until the transfer of ownership VdS certified alarm systems. The electronically monitored access control also offers additional protection. One Insurance concept protects you in the worst-case scenario against theft, vandalism or environmental damage.


In addition to Intrusion alarm system are all security-relevant areas with a room monitoring fitted. As soon as the goods arrive, we can comprehend all movements seamlessly and, if necessary, provide evidence of video recordings of several days.

Qualified data destruction company

ZN data destruction company

Certification with testing and monitoring based on the requirements of the Federal Data Protection Act according to DIN 66399-3.

blancco ITAD partner

bb-net is a blancco Silver ITAD partner

IT refurbishers with a high volume of data erasure have Blancco ITAD partner status and thus reflect the professionalism you need.

IT security audit

It security audit

Carrying out a voluntary audit by certified IT security auditors and IT compliance managers confirm a security level of 96%.


Many competitors advertise that you can erase your devices' data, but data erasure is not always data erasure. A complete security and software concept is part of a sensible data deletion. Hence, you shouldn't just focus on the service Data deletion pay attention, but question exactly what is behind it and how it works. Here bb-net has an almost unique approach in the industry. The combination of a three-stage system and the in-house developed Software solution SAM offer you absolute security.

Security concept data security


SAM is the abbreviation for a specially developed software that automatically carries out all partial processing steps and guides the employee LEAN. At bb-net, Manufacturing 4.0 is not a vision, but a reality. An absolute highlight is the area of ​​data within the environment. You keep reading sentences like: "We use trained staff to delete data." But everyone knows that software works flawlessly and reliably. We have a trained control team, but the real work is done by the computer-controlled software. All data and media are recognized and logged fully electronically and automatically. For this purpose, the devices are controlled by the innovative software from the point at which they are connected to the network, so that almost no human intervention is necessary.

notebook with software sam




In order to Data deletion or destruction of data carriers all contents of Data are recognized. In the case of a laptop, for example, this could be SIM cards with telephony and contact data, media cards such as SD cards, security cards for data applications, USB adapters acting as dongles, optical data carriers such as CD or DVD, internal hard drives (HDDs) or SSDs stickers and notes can also be directly on the device. There is also a multitude of possible storage locations in other units such as computers, servers, cell phones or even printers. We as market leaders have developed own software applicationswho find all the building blocks, these report seamlessly, remove from the device and then send for quenching or shredding. A pure four-eyes principle (as is often the case with competitors) based on work instructions is not sufficient here, as the error rate is too high.


With blancco we have the best method to securely erase data on storage devices regardless of technology. Each The extinguishing procedure used is checked and certifiedto ensure compliance with national and global data protection regulations. You end up with a signed, tamper evident and digital data erasure protocol are available for each individual data carrier. Within our We use SAM software in the background on applications and data connections by blancco. As a Silver Partner, we can draw on significantly more resources and receive the latest technologies and information first hand.


Destruction of data media is necessary if due to Defects cannot be deleted. This is the only way to guarantee security. There are also data carriers, such as hard drives that cannot be marketed due to their age, as well as mobile and smartphones, LTO tapes and media cards. The only way to meet even the highest needs is to be shredded and destroyed with certified DIN 66399-2, ISO 21964-2 media shredders. These systems are also located in our absolutely secure technology center. Transport to a service provider is not necessary.

hard drives
DIN 66399 H4 and H5

SSD, smartphone and tablet
DIN 66399 E4

Tape drives and media
DIN 66399 T5

Destruction of hard drive with shredder
DIN 66399_H4
DIN 66399 H4
DIN 66399_H5
DIN 66399 H5
DIN 66399_E4
DIN 66399 E4



You might also be interested in these additional pages and articles on the subject of IT acquisitions and IT remarketing.

Scroll to Top