IT Asset Disposal Done Right

Optimize Your IT Asset Disposal Process
Get Our Free Guide Today

CERTIFIED

SECURE

ENVIRONMENTALLY FRIENDLY

HIGH VALUE RETURNS
CERTIFIED AND RESPONSIBLE IT ASSET DISPOSAL YOU CAN TRUST
r2 certified

OUR SERVICES

Rest easy knowing your IT asset disposal is taken care of
it liquidation icon

IT LIQUIDATION

Efficient disposition, liquidation, and data destruction services will ensure your privacy and maximize your returns.
it liquidation icon

DATA DESTRUCTION

Secure erasure and destruction services that meet or exceed NIST 800-88 and regulatory guidelines.

it liquidation icon

ELECTRONICS RECYCLING

Collection, dismantling, and Responsible Recycling (R2) of eWaste. Maintain a meticulously clean downstream and never illegally export or landfill focus materials.

hard drive shredding icon

HARD DRIVE SHREDDING

Plant based or client site destruction of electronic media that is certified, insured, and guaranteed with detailed certificates of destruction.
it liquidation icon

REMOVAL AND RELOCATION

Workforce and project management solutions for removal and transport of data center, telecommunications, and power systems. Shipping and moving services for all types of IT assets.
it liquidation icon

GLOBAL IT SERVICES

Customized and consistent ITAD solutions for national and global companies in need of a single point of contact to meet the disposal needs of a complex enterprise.

THE IT ASSET MANAGEMENT GROUP DIFFERENCE

Since 1999 our services are rooted in these pillars:

Secure

Expert handling of your redundant data containing devices that eliminates risk and liability. Stamp out situations that can lead to an exposure via on-site data destruction and secure transportation.

HIGHEST ROI

As seasoned experts at selling assets on a diverse array of secondary market channels, we can provide your firm a clear return rate for your retired assets on a pricing schedule, project rate, or consignment contract.

CERTIFIED AND INSURED

Certified to Responsible Recycling (R2) R2v3, NAID AAA, and RIOS standards. Heavily insured for general liability, cybersecurity, and pollution liability.

ENVIRONMENTAL COMMITMENT

Our primary goal is to ensure reuse of assets wherever possible. Any focus materials that cannot be reused are recycled appropriately and never illegally exported or deposited in a landfill

QUICK TURNAROUND

Quotes in 2 days from request, service within 10 business days of agreement and crews that work fast and efficiently to complete your project.

DOCUMENTATION

We utilize leading reporting tools and provide client portal access to disposal data. Our documentation will meet or exceed any audit or industry regulations. We also provide detailed data erasure reporting.

COMPLIANCE

Providing customized ITAD program management in compliance with NIST 800-88 and designed to meet HIPAA and other industry specific data privacy standards.

SOCIAL COMMITMENT

Providing employment opportunities to people with various developmental disabilities. Donating thousands of computers to organizations that provide education, and health and human services to high need areas.

HOW IT WORKS

We’re with you at every step

GET A QUOTE

Receive a quotation for asset recovery, disposal, or data destruction services with a detailed inventory or site survey performed by an IT AMG employee.

SoW Or Master Agreement

Approve a formal quote or detailed statement of work for a single project. Sign a Master Service Agreement for ongoing services.

SCHEDULING & COLLECTION

Setup white-glove removal services quickly and easily. We do all the heavy lifting.

Equipment Processing

Assets are received, tested, and asset attributes like serial numbers are captured. Equipment is prepared for sale or proper recycling.

Reporting & Reconciliation

Detailed reports including serial numbers, models, conditions and line item asset recovery prices are provided to client. IT AMG officer signed certificates of destruction and recycling are issued.

FREE GUIDE

IT and Data Disposition Program Management Guide

It is critical that your business has written policies and procedures for the management of retired data and surplus IT equipment.  

This guide is a template for creating a new ITAD program or to inform and improve a current program. 

With a formalized program you will:

  • Protect unauthorized access to sensitive data
  • Plan for and achieve financial performance goals
  • Achieve and remain in compliance with data protection regulatory requirements
  • Source vendors and partners that support your financial, environmental and security goals
  • Meet internal and external stakeholder requirements

Get the Free Program Guide