How Do I Get a Data Destruction Certificate?

Data Center Decommissioning: A Security Checklist

Why Is Data Destruction Important?

Facts About E-waste You Should Know

Maximizing Asset Recovery Value in Data Center Decommissioning

Who is Responsible for the Disposal of Old IT Equipment?

Why is a Data Destruction Policy Important?

IT Asset Disposal Requirements Businesses Should Be Aware of

How to Choose a Data Destruction Service Provider

What Does R2v3 Mean?

What is Computer Liquidation? A Complete Guide

What Happens to Shredded Hard Drives?

Ensuring Data Integrity & Access During Data Center Decommissioning

ITAD: What is IT Asset Disposition? Definition and Services Explained

Post-Migration Optimization: Maximizing Performance and Savings

Lessons Learned from Data Center Decommissioning Projects

Overcoming Tech Debt: Strategies for Legacy Application Modernization

On-Prem to Cloud Migration: Governance, Risk, and Compliance

IT Spring Cleaning: 5 Steps to Creating an Effective ITAD Plan

Maximizing Value and Security: 8 Elements of a Strong ITAD Policy

Common Business Devices That Become E-waste

How to Record Disposal of IT Assets

What is the IT Asset Decommissioning Process?

How to Select an IT Asset Disposition Vendor

What is IT Asset Disposition (ITAD)?

A Guide to E-waste and the Environmental Impact

How Can E-Waste Lead to Health and Safety Issues?

E-Waste Solutions for a Global Problem

Examples of E-Waste: A Business Perspective

A Guide for Businesses on Recycling Computers

What is E-Waste Recycling: A Guide For Businesses

Love Your Planet: Top 5 Benefits from Sustainable ITAD Practices

Future-Proofing ITAD: MSA's, Long-Term Relationships and Reliability

MSAs and Risk Management: A Shield in ITAD Operations

Tailoring MSAs to ITAD Needs: Customization for Comprehensive Coverage

MSA's 101: Your First Step in ITAD Excellence

Secure Media Destruction and Fostering the Circular Economy

The Circular Economy: The Power of Reuse in E-Waste Management

The Impact of E-Waste: Why Decycle Matters

The Power of Giving Back: Supporting Students in Need

The Effect of Tech-Giving: How Donating Laptops Promotes ESG Goals

Bridging the Digital Divide Through ITAMG Cares

The NIST 800-88 r1 Explained: Your Data Security Compass

5 Tips on Choosing the Right Data Destruction Method

Data Destruction 101

The Line of Trust in ITAD

IT Asset Management Group Joins Podcast Episode of Defense in Depth: Data Destruction

A Big Lesson From a $60M Fine for Poorly Performed Data Disposition

Lowering the Carbon Footprint of IT Asset Disposition

Evaluating Data Destruction and Data Protection Compliance

Lessons from Arrow’s Closure of IT Asset Disposition Business

Maintaining Rational Policies in the Face of Failure

Add NIST 800-88 to Your DoD Data Destruction Playbook

Bidding a Project to Computer Liquidators

Three Quick IT Liquidation Tips

Hard Drive Disposal Options

The 4 Knows of IT Asset Disposition

4 Lessons from Star Wars About Data Destruction and IT Asset Liquidation

3 Myths About IT Asset Disposal and Electronics Recycling

5 Tips for Computer Disposal and Data Destruction

Performing IT Asset Disposal Vendor Due Diligence (Part 2)

Performing IT Asset Disposal Vendor Due Diligence

Hard Drive Shredding New York Style

IT Asset Disposal and Data Destruction Program Management

Networking Device Erasure and Data Destruction

Calculate the Value of Used Computer Equipment

ITAMG Celebrates 15 Years in IT Asset Disposal Services

5 Attributes of a Successful IT Asset Disposition Program

5 Lessons CIOs Can Learn from Star Trek: The Next Generation

IT Asset Management Group Becomes EPEAT Champion

Beyond Computer Recycling Initiatives

Electronic Waste Problem to Increase a Dramatic 1/3 by 2017

The End of Windows XP Support: Refresh and Computer Disposal Planning

Intro to NIST 800-88: Data Destruction Best Practices

SSD Secure Erasing Methods and OEM Instructions for Data Destruction

Three Tips for Hiring an IT Professional

Project Management is Key to Safe IT Asset Disposition

One CIO's Trash, Is The Same CIO's Liability

It’s Smart to Watch Your Electronic Waste Habits

Revisiting "What Does A Gigabit Network Really Mean?"

The Frightening Impact of Theft, Loss, and Data Breaches

5 Ways an IT Pro Can Succeed as a Manager

World’s Biggest Physical Data Breaches: Visualized

ITAM: The most boring thing….

The Repercussions of the Poor Electronic Recycling Decisions of our Past

Winding Down and Virtualization Study

Top 10 Virtualization Project Killers

Data Privacy Safeguards and Process Evaluation


ITAD Guidance

Stay informed on important IT asset management topics.

Our posts focus on IT management, data security, and computer hardware from the unique perspective of IT asset disposal experts.

Subscribe and you will stay on top of:

  • IT procurement trends and analysis
  • Data security methods and best practices
  • Compliance tools and updates

Subscribe to Email Updates

Responsible Recycling logo

Recent Posts

Visit our Main Site at: