Lowering the Carbon Footprint of IT Asset Disposition

Lowering the Carbon Footprint of IT Asset Disposition

We here at IT Asset Management Group (ITAMG) regularly come across regional organizations such as universities, hospitals, media companies and local banks that are engaged with disposal providers that ship their retired IT equipment several hundred or even a thousand...

read more
Evaluating Data Destruction and Data Protection Compliance

Evaluating Data Destruction and Data Protection Compliance

As a NAID Certified Secure Destruction Specialist my goal is to offer information security and compliance professionals objective advice backed by experience, industry best practices and a keen knowledge of the applicable regulatory requirements.  When working with...

read more
Maintaining Rational Policies in the Face of Failure

Maintaining Rational Policies in the Face of Failure

When we fail in life, especially at our security, we tend to overreact and make quick and sweeping changes. If you leave your door open and your home is burglarized, moving out of your neighborhood or installing a state of the art security system may be an irrational...

read more
Add NIST 800-88 to Your DoD Data Destruction Playbook

Add NIST 800-88 to Your DoD Data Destruction Playbook

It’s time your IT asset disposal program manager ditches a murky understanding of DoD data destruction(Department of Defense 5220.22-M) by adding a clearer understanding of the NIST 800-88 (National Institute of Standards and Technology 800-88 Guidelines for Media...

read more
Bidding a Project to Computer Liquidators

Bidding a Project to Computer Liquidators

If your IT department generates valuable surplus computer equipment whether through a regular refresh project, office relocation, staff reduction or merger it will be helpful to understand how to bid out an IT asset disposal project to computer liquidators.We suggest...

read more
Three Quick IT Liquidation Tips

Three Quick IT Liquidation Tips

Evaluating an IT liquidation provider to purchase your corporate IT equipment can be a difficult task to accomplish. There are a good deal of variables that can lead an IT manager down a path where he or she will be unable to accurately evaluate competitive...

read more
Hard Drive Disposal Options

Hard Drive Disposal Options

Proper handling of end of life computer equipment and electronic media is critical to avoiding costly data breaches and debilitating exposures to your business and client data. Your options for hard drive disposal should not be limited by archaic security...

read more

ITAD Guidance

Stay informed on important IT asset management topics.

Our posts focus on IT management, data security, and computer hardware from the unique perspective of IT asset disposal experts.

Subscribe and you will stay on top of:

  • IT procurement trends and analysis
  • Data security methods and best practices
  • Compliance tools and updates

Recent Posts

Secure Media Destruction and Fostering the Circular Economy

Striking a balance between secure media destruction and promoting the circular economy is crucial. Achieving this equilibrium is not only about protecting sensitive data but also about contributing responsibly to environmental sustainability. How can organizations...

The Circular Economy: The Power of Reuse in E-Waste Management

In an era where sustainability is no longer a choice but a necessity, the way we view and manage electronic waste (e-waste) is undergoing a fundamental shift. The rapid growth of e-waste calls for innovative approaches to e-waste management, steering us towards a more...

The Impact of E-Waste: Why Decycle Matters

The digital revolution, while driving global progress, has inadvertently given rise to a burgeoning environmental challenge: electronic waste (e-waste). The rapid turnover of electronic devices, driven by constant technological advancements and consumer demand for the...

The Power of Giving Back: Supporting Students in Need

Talking about giving often sounds cliché or disingenuous. We've all heard about the importance of giving back countless times. However, the reason this message persists is rooted in the profound impact that giving can have on the lives of those in need. The good...

Bridging the Digital Divide Through ITAMG Cares

Access to technology is not just about staying connected; it's a lifeline to education, economic opportunities, and a brighter future. Yet, for many low-income families, this lifeline remains out of reach. The digital divide is a chasm that separates those with access...

The NIST 800-88 r1 Explained: Your Data Security Compass

In the vast ocean of data security, having a reliable compass is crucial. For organizations and individuals alike, the NIST Special Publication 800-88 (often referred to as NIST 800-88 r1 and titled “Guidelines for Media Sanitization”) serves as a guide...

5 Tips on Choosing the Right Data Destruction Method

When planning an IT asset disposal project, you need to communicate to your vendor which data destruction method is required. While both data erasure and physical destruction have their merits, the best choice hinges on a few key considerations: Nature...

Data Destruction 101

Navigating the complexities of IT asset disposition (ITAD) can be challenging, especially when faced with the critical task of data destruction. This process is not only crucial in safeguarding sensitive corporate information but also personal data that could be...

The Line of Trust in ITAD

When it comes to IT asset disposition (ITAD), trust is paramount. But where do you draw the line? There are two pivotal questions to ponder: Where is your line of demarcation? What influences the placement of that line? For many, this line is driven by either...