NIST SP 800-88r2 POPIA Section 19 South African Hosted

A decommissioned hard drive
is a POPIA ticking time bomb.

Safedisk automates certified data destruction for South African businesses. Every retired PC, laptop and server is cryptographically erased, verified, and documented — with a legally-defensible Certificate of Destruction issued the moment the job is done.

R10M Maximum POPIA fine
10yr Possible imprisonment
0 Recoverable data after Safedisk

Without Safedisk

  • Old PCs sold, donated, or binned with data intact
  • A quick format does not erase your data
  • Recovered data = POPIA Section 22 breach notification
  • No paper trail — no defence when the regulator calls
  • Fines up to R10 million per incident

With Safedisk

  • Every drive cryptographically erased to NIST SP 800-88r2 standard
  • Instant Certificate of Destruction — PDF, signed, tamper-evident
  • Full audit trail: who authorised it, when, from where
  • POPIA Section 19 obligation fulfilled and documented
  • Zero-touch — machine wipes itself on your command

From active PC to certified
clean asset in three steps

No technician visits. No USB fiddling. No guesswork. Your IT admin clicks Wipe — the machine does the rest.

01

Register Your Fleet

Sign up, add your company and register each PC, laptop or server in the Safedisk portal. The Safedisk agent installs in minutes and reports the machine's hardware fingerprint, drive inventory and encryption status.

Supports Windows, Linux and macOS. Works on any hardware from 2005 to today.
02

Authorise the Wipe

When a machine is ready for retirement, your IT admin opens the portal, selects the device and clicks Authorise Wipe. A confirmation dialog requires typing the machine's serial number — preventing any accidental erasure.

Full immutable audit log: operator name, IP address, timestamp — all recorded.
03

Certificate Issued Instantly

The machine erases itself and reports completion. A NIST SP 800-88r2 Certificate of Destruction is generated immediately — listing every drive, the sanitisation method used, and the operator who authorised it.

Store certificates permanently. Download anytime. Share with auditors, insurers or the Information Regulator.

A quick format doesn't erase
an SSD. Here's why.

Solid-state drives hide data from the operating system using a firmware layer that traditional overwrite tools never reach. Safedisk navigates this automatically.

Flash Translation Layer (FTL)

Your OS writes to logical block addresses. The SSD's firmware silently remaps those writes to different physical NAND pages for wear-levelling. Overwriting block 0x1A00 does not erase the data — it just writes to a new location. The old page sits untouched until the controller decides to garbage-collect it.

Standard overwrite: misses the physical data

Over-Provisioning & Spare Area

SSDs reserve a hidden portion of NAND — typically 7–28% — as spare area for background operations. This region has no logical block address. It is invisible to the OS and to every file-delete, format, or overwrite operation. Data remnants can persist here indefinitely.

Standard overwrite: can't reach spare area

Security Freeze Lock

BIOS and UEFI firmware commonly put drive security into a "frozen" state during the power-on sequence — before the OS loads. In this state, the drive silently rejects ATA Secure Erase commands without error. Most erasure tools miss this entirely and report success when nothing happened.

Standard erase commands: silently rejected

Safedisk's drive-aware erasure decision tree

Drive detected
SSD / NVMe
OPAL / TCG
encryption?
Yes
TCG Crypto Erase
New key generated — old data mathematically irrecoverable. Instant.
No
ATA Secure Erase
Check frozen state → hotplug unfreeze if needed → SECURITY ERASE UNIT
Verification pass
Write pattern to sampled LBAs. Read back. Confirm FTL mapping cleared.
HDD
Cryptographic Erase
BitLocker / LUKS / VeraCrypt — key escrowed then destroyed. NIST Purge.
Certificate of Destruction issued

Vendor support matrix

Vendor Primary method What Safedisk does
Samsung ATA Secure Erase, TCG Opal Identifies Opal state. Issues TCG crypto-erase if active; falls back to ATA SECURITY ERASE UNIT with frozen-state handling.
Micron / Crucial ATA Secure Erase, NVMe Sanitize, Crypto Erase For NVMe, issues nvme sanitize --sanact=4 (crypto-erase) then polls sanitize-log to confirm. SATA uses standard ATA path.
Intel Optane ipmctl / ndctl crypto-erase Detects Persistent Memory device type. Invokes ndctl --crypto-erase rather than standard ATA — avoids firmware rejections on Optane hardware.
ADATA ATA Secure Erase, TCG Opal 2.0 Queries Opal 2.0 lock status. PSID Revert used if drive is locked; otherwise TCG key rotation for instant erasure.
Kingston ATA Secure Erase Standard ATA path with post-erase pattern write/read verification to confirm firmware executed the command — not just logged it.
Any HDD Overwrite (not applicable) BitLocker / LUKS / VeraCrypt key-escrow path. Key destroyed at wipe time. NIST 800-88r2 Purge via Cryptographic Erase.
Apple T2 / M1 / M2 / M3 Secure Enclave key destruction Interfaces with Apple Bridge OS to trigger destroyFVKey. The Secure Enclave purges the media encryption key from dedicated internal SRAM — soldered NAND instantly becomes cryptographically scrambled. No NAND overwrite needed or possible.
USB / SD / CF Fill-to-capacity + 3-pass overwrite Fills device to 100% capacity to force controller OP-area cycling, then overwrites all LBAs with 0x00, 0xFF, and random data. Pattern read-back confirms every accessible block was reached.
VMware / Hyper-V VMs SCSI UNMAP + WRITE SAME via PVSCSI Communicates through the para-virtualised storage driver (PVSCSI) to issue SCSI commands to the physical datastore. Handles thin-provisioned VMDK/VHD/VHDX. Reclaims and scrubs blocks at the physical SAN/datastore level.

POPIA demands it.
NIST 800-88r2 proves it.

South African law does not name NIST SP 800-88r2 — but it is the international benchmark for how to fulfil POPIA's legal obligations for data destruction.

POPIA Section 14
Retention Limitation

Personal information cannot be kept longer than necessary. Once the purpose expires, data must be destroyed.

Safedisk automates scheduled destruction with full documentation.
POPIA Section 19
Security Safeguards

Responsible parties must implement "appropriate, reasonable technical and organisational measures" to prevent loss or unauthorised access to personal information.

Safedisk's NIST SP 800-88r2 Cryptographic Erase is the technical measure that satisfies this obligation.
POPIA Section 22
Breach Notification

A recovered hard drive sold on the secondary market is a notifiable security compromise — mandatory report to the Information Regulator and all affected individuals.

Safedisk eliminates this risk. Zero data survives.
POPIA Regulation 3
Deletion Requests (2025)

The April 2025 amendments give data subjects stronger rights to request deletion of all their personal information across your systems.

Safedisk's portal provides auditable proof that deletion was carried out and when.
Cryptographic Erase (CE) — the method Safedisk uses — is classified as Purge level under NIST SP 800-88r2. It renders data mathematically irrecoverable by destroying the AES-256 encryption key. Validated by the US National Institute of Standards and Technology and recognised internationally by NAID, ISO 27001 auditors and insurance underwriters.

Everything your IT team needs.
Nothing they don't.

📄

Certificate of Destruction

NIST SP 800-88r2 compliant PDF. Lists every drive, serial number, sanitisation method, operator and timestamp. Accepted by auditors, insurers and the Information Regulator.

📊

IT Asset Register

A complete, live inventory of every machine in your fleet — make, model, serial, assigned user, location and wipe status. Export to CSV or PDF for audits.

🔒

Hardware Fingerprinting

Each agent is cryptographically bound to its hardware. Wrong machine? Wrong fingerprint. The wipe is rejected before a single byte is touched.

Works on Any Hardware

Windows (BitLocker), Linux (LUKS), macOS (FileVault) and VeraCrypt as a universal fallback. HDDs, SSDs and NVMe drives. From 2005 Pentiums to 2025 workstations.

📶

Zero-Touch Wipe

On UEFI machines (2012+), the agent programs the firmware directly. One click in the portal and the machine reboots, wipes itself and powers off. No USB. No BIOS entry. No technician.

👤

Multi-User Portal

Role-based access: Company Admin, IT Operator and Read-Only (for auditors). Full activity log per user. Integrates with your existing IT workflow.

Immutable Audit Trail

Every action — registration, approval, wipe authorisation, certificate issuance — is logged with user account, IP address and timestamp. Cannot be edited or deleted.

🛡

Bare-Metal Wipe (iPXE)

For maximum assurance, boot the machine directly from our server. Linux loads into RAM. Every drive — including the OS drive — is overwritten with DoD 5220.22-M (7 passes) or NVMe Secure Erase.

Apple Silicon (T2 / M-series)

Macs with T2, M1, M2 or M3 chips store encryption keys inside the Secure Enclave — a dedicated hardware security module soldered to the SoC. Safedisk destroys the Secure Enclave keys, making soldered NAND chips instantly and permanently unreadable. No overwrite required.

💾

Removable Media

USB drives, SD cards and CF cards use flash controllers with limited FTLs. Safedisk fills the device to 100% capacity — forcing the controller to cycle through all spare blocks — then overwrites with a 3-pass pattern (0x00, 0xFF, random). Every worn-out replacement block is reached.

💾

Virtual Machine Disks

VMDK, VHD and VHDX files on VMware and Hyper-V platforms. Safedisk communicates through the para-virtualised storage driver, passing SCSI UNMAP and WRITE SAME commands to the physical datastore. Thin-provisioned space is reclaimed and scrubbed at the block level on the underlying array.

📄

File-Level Erasure

Target specific files, folders or user profiles without wiping the whole drive. Safedisk forces a physical overwrite of the exact LBA clusters the file occupies, including slack space — preventing recovery tools from reading residual data after a standard deletion.

Simple, transparent pricing.
No per-technician fees.

All plans include unlimited users, unlimited certificates, and South African data hosting.

Starter
R499/month
Up to 25 machines
  • ✓ Asset register
  • ✓ Agent-based wipe (crypto erase)
  • ✓ NIST SP 800-88r2 certificates
  • ✓ Immutable audit trail
  • ✓ Email support
Get Started
Enterprise
R3,999/month
Unlimited machines
  • ✓ Everything in Business
  • ✓ Dedicated onboarding
  • ✓ Custom Operator Agreement
  • ✓ API access
  • ✓ SLA guarantee
  • ✓ Phone support
Contact Us
No subscription needed? Pay per wipe at R199 per device. Certificates issued immediately. No commitment. Register free →

Your next PC retirement
should take 3 minutes, not 3 weeks.

Join South African businesses that have replaced spreadsheets and guesswork with certified, automated data destruction.