Who is Responsible for the Disposal of Old IT Equipment?

Who is Responsible for the Disposal of Old IT Equipment?

The disposal of old IT equipment in a business is a collective responsibility involving the IT department, legal team, compliance officers, external vendors, and employees. However, it is important that the ultimate responsibility is assigned to a specific party and...

read more
Why is a Data Destruction Policy Important?

Why is a Data Destruction Policy Important?

Table Of Contents The Foundations of Data Destruction The Need for Data Destruction Policies Understanding HIPAA and Data Destruction Requirements Navigating State and Federal Requirements Developing and Implementing a Data Destruction Policy Conclusion FAQ A data...

read more
How to Choose a Data Destruction Service Provider?

How to Choose a Data Destruction Service Provider?

Table Of Contents Key Factors to Consider When Choosing a Data Destruction Service Provider Certifications and Compliance: Ensuring Legal and Regulatory Adherence Data Destruction Methods and Processes Ensuring Security and Transparency Throughout the Destruction...

read more
What is Computer Liquidation? A Complete Guide

What is Computer Liquidation? A Complete Guide

Computer liquidation is the process of selling off surplus or outdated IT assets for cash, focusing on financial return and environmental responsibility. Key Takeaways: Computer liquidation is a strategic process for businesses to convert surplus or outdated IT assets...

read more
What Does R2v3 Mean?

What Does R2v3 Mean?

R2v3 is the latest standard for responsible electronics recycling, emphasizing data security, environmental health, and safety, developed by Sustainable Electronics Recycling International. Key Takeaways: R2v3 is the latest standard in IT asset disposition, focusing...

read more
What Happens to Shredded Hard Drives?

What Happens to Shredded Hard Drives?

Shredded hard drives are reduced to tiny fragments, making data recovery an unreasonable endeavor. The waste remains are then recycled for precious metals and commodity recovery. Key Takeaways: Shredded hard drives are reduced to tiny particles, making data recovery...

read more

ITAD Guidance

Stay informed on important IT asset management topics.

Our posts focus on IT management, data security, and computer hardware from the unique perspective of IT asset disposal experts.

Subscribe and you will stay on top of:

  • IT procurement trends and analysis
  • Data security methods and best practices
  • Compliance tools and updates

Recent Posts

An Introduction to NIST 800-88 and Media Sanitization

Table Of Contents What Are the NIST 800-88 Guidelines? What Is Media Sanitization? Who Needs NIST 800-88? How Does the NIST 800-88 R1 Categorize Data? How Do You Decide on a Data Destruction Process? The Consequences of Inadequate Data Sanitization Partnering with...

7 Tips on Choosing the Right Data Destruction Method

Table Of Contents The Primary Data Destruction Methods The Pros and Cons of Each Data Destruction Method Tips on Choosing the Right Data Destruction Method Need help choosing the right data destruction method? Ask us! When planning an IT asset disposal project,...

A Business Guide: How to Prepare Computers for Recycling

Back up data, wipe hard drives securely, remove sensitive components, sort materials, and choose a certified recycling partner to ensure legal compliance and data security. Key Takeaways: Recycling computers helps businesses reduce their environmental impact, conserve...

IT Asset Disposal Requirements Businesses Should Be Aware of

Businesses must securely erase data, comply with environmental laws, maintain disposal records, and understand federal, state, and industry-specific regulations for IT asset disposal. Key Takeaways: Businesses must ensure secure data destruction, adhere to...

A Guide to Data Destruction for Hospitals

Hospitals must destroy data securely to maintain patient trust and comply with data protection regulations like HIPAA, using methods like shredding, degaussing, and data wiping. Key Takeaways: Hospitals must destroy sensitive data, such as patient medical histories...

How Do I Get a Data Destruction Certificate?

To get a data destruction certificate, hire a certified vendor to destroy data irreversibly and provide a certificate detailing the method and date of destruction. Key Takeaways: A data destruction certificate is a formal document confirming that sensitive data has...

Data Center Decommissioning: A Security Checklist

Create a decommissioning team, define objectives, audit assets, backup and sanitize data, ensure regulatory compliance, dismantle facilities, select ITAD vendors, and conduct a final audit. Key Takeaways: Data center decommissioning involves dismantling the facility...

Why Is Data Destruction Important?

Data destruction prevents unauthorized access to sensitive information, protecting against identity theft, financial fraud, and intellectual property theft. It ensures legal compliance and maintains business integrity. Key Takeaways: Data destruction is essential for...

Facts About E-waste You Should Know

E-waste contains harmful materials like lead and mercury, contributing to pollution and climate change. Global recycling rates are low, and proper disposal is crucial for environmental health. Key Takeaways: E-waste encompasses discarded electronic devices containing...