News & Updates

  • R2: Self-Made Claims are Not the Same

    According to SERI, the organization behind the R2 certification program, many organizations have recently been advertising their services, touting their use of R2 Certified recyclers. While these companies certainly may offer valuable services, its important to understand the difference between using a company that says they use a certified partner, and a company who is actually certified themselves. […]

    Read More
  • 5 Crucial ITAD Elements Every Business Needs

    IT asset disposition, or ITAD, represents the end of the line for your outdated or unusable computer equipment and electronics. Whether your equipment no longer meets your needs, it’s broken down, or you’ve simply decided it’s time to upgrade, you have to take care in how you dispose of it. Protecting your business and your […]

    Read More
  • E-Waste Disposal: What You Need to Know

    According to the UNU-IAS Global E-Waste Monitor, 41.8 million metric tons of e-waste was generated on a global scale in 2014, a number predicted to rise to nearby 50 million by 2018. Only a portion of this mountain of equipment and electronics gets recycled, while the rest is sent to landfills. This is unfortunate because […]

    Read More
  • Planning for Responsible E-Waste Disposal

    E-waste has become a hot button issue for many companies looking to clean up their corporate image, comply with expanding environmental laws, and do their part for the planet. Everyone knows it is not only unacceptable, but dangerous to dump e-waste, not just because of the harm toxic components do to the environment, but because […]

    Read More
  • Managing Data Security Risks

    Data security used to mean simply placing sensitive information in locked file cabinets. Today, it’s a little more complicated, with all kinds of confidential data existing on devices and in the cloud, locked away behind digital protections that could be breached if you make mistakes. Managing data security risks has become a major concern for […]

    Read More
  • Elevating Your ITAD Management Strategy

    Successfully protecting data is no easy feat, and it requires a comprehensive approach that follows the life cycle of data and devices. In the fast-changing world of virtual security, you may need to pivot frequently to ensure you comply with privacy laws and keep company and consumer data safe. This can be a tall order […]

    Read More
  • Benefits of Keeping Your E-Waste Out of Landfills

    The invention of plastic straws dates back to the 1880s, but it wasn’t until recently that we started to realize the impact of this disposable convenience. It is estimated that 500 million straws are used each day in the U.S. alone, and approximately 8.3 billion of the tubes pollute the world’s beaches. This could be […]

    Read More
  • Challenges in CRT Recycling

    If you’ve been in business for a while and you’re just getting around to creating IT asset disposition (ITAD) policies and procedures, you could have a significant backlog of outdated equipment languishing in supply rooms or off-site storage warehouses. As you’re no doubt aware, you have to take care in disposing of old equipment and […]

    Read More
  • Advice for Implementing a Data Destruction Policy

    Your company collects all kinds of essential data that allows you to serve the needs of your clients and adeptly manage your operations. You take great pains to secure this sensitive data, not only to protect your clients and your business, but as a means of complying with applicable privacy laws. At some point, you’re […]

    Read More