Compliance

  • Self-Made Claims are Not the Same

    According to SERI, the organization behind the R2 certification program, many organizations have recently been advertising their services, touting their use of R2 Certified recyclers. While these companies certainly may offer valuable services, its important to understand the difference between using a company that says they use a certified partner, and a company who is actually certified themselves. […]

    read more
  • 5 Crucial ITAD Elements Every Business Needs

    IT asset disposition, or ITAD, represents the end of the line for your outdated or unusable computer equipment and electronics. Whether your equipment no longer meets your needs, it’s broken down, or you’ve simply decided it’s time to upgrade, you have to take care in how you dispose of it. Protecting your business and your […]

    read more
  • E-Waste Disposal: What You Need to Know

    According to the UNU-IAS Global E-Waste Monitor, 41.8 million metric tons of e-waste was generated on a global scale in 2014, a number predicted to rise to nearby 50 million by 2018. Only a portion of this mountain of equipment and electronics gets recycled, while the rest is sent to landfills. This is unfortunate because […]

    read more
  • Elevating Your ITAD Management Strategy

    Successfully protecting data is no easy feat, and it requires a comprehensive approach that follows the life cycle of data and devices. In the fast-changing world of virtual security, you may need to pivot frequently to ensure you comply with privacy laws and keep company and consumer data safe. This can be a tall order […]

    read more
  • Challenges in CRT Recycling

    If you’ve been in business for a while and you’re just getting around to creating IT asset disposition (ITAD) policies and procedures, you could have a significant backlog of outdated equipment languishing in supply rooms or off-site storage warehouses. As you’re no doubt aware, you have to take care in disposing of old equipment and […]

    read more
  • How to Manage the ITAD Reporting Gap

    Ideally, your Sioux Falls, SD business will track every IT device within your organization from the moment you buy it until the moment it is destroyed. However, even with a tracking system in place, this isn’t always entirely feasible. Not only are you dealing with potentially hundreds or thousands of devices, including computers, laptops, tablets, […]

    read more
  • Why Businesses Must Comply with Data Disposal Regulations

    Data security has probably always been a paramount concern to businesses. It’s hard to believe that the first credit cards appeared nearly 100 years ago, although credit cards as we know them today (bank credit cards) wouldn’t appear and start to gain traction until the late ‘50s/early 60’s. Even social security didn’t exist until 1935. […]

    read more
  • Why Overwriting Isn’t Enough to Erase Data

    Data destruction is a tricky business. Computer and software manufacturers know that sometimes people accidentally delete things they didn’t mean to, and they may even save new data and accidentally overwrite what they deleted. For this reason, there are a variety of protections in place that allow users to recover lost data, even if it’s […]

    read more
  • Why You Should Leave Hard Drive Destruction to the Professionals

    We live in an era of unparalleled access to data. In many ways, this is a boon. When properly collected and collated, mass amounts of data can help us to improve dramatically, addressing problems on a global scale and planning for a better future. Unfortunately, collection and storage of data can also be dangerous. As […]

    read more