Data Security You Can Verify
When you trust us with your devices, you’re trusting us with sensitive information—student records, patient data, business files. We take that responsibility seriously. That’s why every device receives NIST 800-88 compliant data erasure in our 100% US-based facility, with documentation proving complete data removal. At Second Life Mac, data security isn’t an add-on—it’s built into every step of our process.
Meeting compliance standards
We protect every device with certified data erasure standards designed to keep sensitive information safe across education, healthcare, and business environments. Our compliance-driven process meets or exceeds federal, international, and industry regulations—ensuring secure data handling from pickup through final processing.
HIPAA
We follow strict healthcare data protection protocols to ensure all patient-related information is completely erased, audited, and irrecoverable—meeting HIPAA requirements for medical data privacy.
FERPA
We safeguard student records, grades, and personal information through secure handling, complete tracking, and certified data erasure that meets FERPA’s federal privacy requirements for universities, schools and districts.
NIST Guidelines
We follow NIST 800-88 guidelines for data erasure, applying validated techniques that ensure safe, repeatable, and compliant data removal across all Apple devices.
OUR SECURE FACILITY
All devices are received, processed, and stored in our 100% US-based facility in Skokie, Illinois. From the moment your devices arrive until they’re completely erased and refreshed, they’re handled exclusively by our full-time team in our secure, controlled environment.
No third parties. No overseas processing. Just our dedicated team and proven process.
After processing, you’ll receive detailed audit reports for every device that include:
- Device serial number and model
- Data erasure method and completion status
- Erasure date and timestamp
- Device condition and grading
how we keep your data secure
- In-House Processing Only: Every device is processed exclusively by our full-time team in our secure Illinois facility. We never outsource to third parties. We never send devices overseas for processing. Your devices never leave our controlled environment.
- Certified Data Erasure Technology: We use PhoneCheck and MacCheck, the industry-leading diagnostic and erasure platform for Apple devices. PhoneCheck performs an 80-point diagnostic test on every device, verifies authenticity, detects locks and issues, and executes complete, irreversible data erasure—all while generating detailed audit documentation.
- Comprehensive Data Erasure: Every device undergoes complete data erasure that meets or exceeds major compliance standards, including NIST 800-88, HIPAA, and FERPA requirements.
- Device-Level Documentation: You receive detailed PhoneCheck or MacCheck audit reports for every device by serial number, showing diagnostic results, erasure completion, and device condition—giving you complete visibility and audit-ready documentation.
The Ghost in Your MacBook
Why Secure Device Erasure Is the Hidden Risk Schools Overlook
This white paper reveals why device security during Apple refresh cycles is one of the most underestimated risks facing schools today and how incomplete data wiping can quietly expose data long after devices leave your hands. You will learn what actually happens to residual data, why “factory reset” is not enough, and what standards schools should demand from any buyback or ITAD partner.
Thank you for your interest!
Your details have been successfully submitted.
You can download the white paper using the link below.
Download the White PaperWWDC25 Takeaways: What for Data Security
At WWDC25, Apple reinforced how seriously it takes privacy, security, and device management across its ecosystem. In this video, Second Life Mac connects those announcements to the real-world challenges schools face when retiring and refreshing Apple devices. Watch to understand how WWDC25 trends translate into practical data security decisions before, during, and after a device refresh.