Monthly Archives: October 2011


Updating data breaches due to computer IT Disposal

By |October 26th, 2011|

There exists an urgent need to pro-actively promote regular updates about data breaches. In order to provide the richness of functionality, usability and scalability to allow system to be developed it is important that a feature-rich Internet middleware software platform is used to develop the system. From the technical consultancy advice it has been decided […]

Computer Disposal, Consumerism and the false dichotomy of the experts GDP aims

By |October 25th, 2011|

Last night on BBC News there was two experts pontificating about the risks of world population growth, and you may wonder how this relates to computer recycling and IT disposal – let me explain.

The experts were running through worst case scenarios and best case scenarios involving technology development, birth control in the developing world and […]

IT Disposal Companies in and around London

By |October 24th, 2011|

There are a number of IT disposal and computer recycling companies in and around London. However there is only one with the ability that allows clients to bring their media tapes or IT hardware and watch it being shredded there and then – and that is Terabyter Central London Walk-in Computer Recycling Centre. This is […]

IT Disposal in the midst of a recession

By |October 21st, 2011|

We are all careful with our data and hardware carrying data devices when there is sufficient resources and time to deal with it properly. However computer recycling can be one of these areas where shortcuts are tempting. If there is a batch of WEEE to go out and the IT manager or Purchasing Manager is […]

IT Disposal Companies would fair much worse than Oliver Letwin

By |October 19th, 2011|

The problem with Oliver Letwin’s little dumping escapade this last week is not that the papers were carrying anything important – not to him anyway – but rather it is the example he sets. We in the Computer recycling industry understand and are reminded on a daily basis about the need for secure data destruction.

We […]

Secure IT disposal at a Central London Walk-in Centre – Witness your media being shredded

By |October 18th, 2011|

Laptop & Computer recycling in London is always a problem of those that don’t want to see their confidential or Government classified data being transported to some industrial estate in the country. For Computer Recycling in London Data Eliminate has set up a specialist project in Central London to accommodate secure computer recycling and disposal. […]

IT Disposal for the most security conscious in the UK

By |October 17th, 2011|

If you are in the capital and running a business or an IT department it is always a worry when it comes to IT disposal services. Secure computer recycling can be promised by any metal recycler that has a truck and a waste transfer licence but as some people have found out to their cost […]

Secure IT Disposal in London and the risks that it poses

By |October 13th, 2011|

There have been a number of recyclers or rather scrap metal merchants working in the capital of late. These recyclers will certainly take away your redundant IT and computers for a small fee and provide you with a certificate to comply with the Environment Agency. However there is a huge risk when using […]

Building the Terabyter IT Disposal Brand in London

By |October 12th, 2011|

Terabyter IT Disposal was started back in 1980. The purpose of the company was to build an organisation whereby customers would be happy, the company would grow and the local community requiring computer disposal would benefit from security and the environmental community spirit. This vision has been largely achieved. And with the […]

Computer Recycling and Police data breaches

By |October 10th, 2011|

In December 2007 an Engineer in Devon found a computer hard drive in a recycling centre with confidential date from the Devon and Cornwall Police including telephone numbers ranks and qualifications of staff. The assistant chief constable apologised to staff for the breach of data security.
This was after a number of major data […]