We assist cybersecurity experts, managed service providers, and business leaders like you with their Information Technology Asset Disposal (ITAD) initiatives. Scroll down to keep reading to learn more, or jump right in
Request a Pick-upWe can lighten your workload by removing the storage media from each device designated for recycling and returning the media to you for reuse.*
After removing the storage media from each device designated for recycling, we will test it to ensure it is in good working order before erasing the file system information.**
After removing storage media from recycled devices, we test and erase it per NIST 800-88 standards—keeping auditors satisfied without destroying the drive.**
When you absolutely, positively need data gone forever, we physically destroy the media before recycling it, ensuring no chance of recovery.***
* When requested, the return of storage media is free unless shipping is required. ** We can return erased devices to you for a service fee based on the number of devices and the level of secure erasure requested. However, if the media does not need to be returned, the service is free if you authorize us to extend its usefulness through resale. In either case, we will provide documentation of the process. *** Physical destruction is free for all storage media removed from devices designated for recycling. For other storage media not associated with a designated recycling device, the first 50 are free. Beyond that, a service fee may apply based on time and device types.
Preview our request for secure data destruction form for chain of custody process documentation.
Every business has their own unique needs. Some require hundreds of hoops and hurdles to jump through before a device is ready for recycling. Others just want it out of their way. Whatever the case, we're ready to accommodate.
We can remove storage media and perform physical data destruction on-site, right in your office. We’ll document the process and provide visual proof that the device is no longer readable. (Of course, we’ll need some space to work—keep in mind, this is a noisy and somewhat messy process.)
We’ll inventory every device and establish an official chain of custody before leaving your office. Once back at our facility, we’ll begin the data destruction process based on your preferred security level and provide digital and/or photographic evidence for each device.