We do not use external couriers to collect equipment as we believe that by using our own vehicles and drivers we can guarantee the security of the data that may be contained within the equipment. As we deal with large amounts of hardware this method is often more cost effective that external couriers and will maximise the funds available to our clients after reclamation. We will collect equipment from any mainland UK location at a pre agreed time to suit you. Every collection is returned to our processing facility.
Our flexible approach enables us to assess our customers' requirements on a case-by-case basis. We will log all equipment once received and tag it for our records. The equipment will be tracked from collection through the reclamation process and on to the resale. This information is then available for he client to view in our report and complete asset list.
Once returned to our facility, equipment is segregated into non-hazardous and hazardous WEEE. Equipment is further segregated into data baring and non-data baring. Every item of equipment is allocated its own unique asset number to facilitate future audit trails. Equipment make, model, serial number, customer asset number and specification are recorded and uploaded into the asset report.
Data baring equipment is processed accordingly and all hard drives are data erased and/or destroyed as appropriate with appropriate certification uploaded into the customer asset report. All other media is physically destroyed.
Under the WEEE Directive we will aim to reuse equipment wherever possible. Equipment that cannot be remarketed is stripped with metals, plastics etc segregated for recycling and reuse in recycled products. We will always aim for 0% landfill.
One of the greatest concerns faced by our customers when disposing of their redundant IT equipment is the removal and destruction of personal and/or sensitive data contained within them. As identity fraud attacks become more widespread and more sophisticated, it is imperative that businesses and organisations ensure that secure data destruction processes are in place prior to the disposal and recycling of computers, laptops and other obsolete IT equipment.
Failure to do so has obvious ramifications, not only to the public sector, but also to the company itself. There are several high profile organisations who have been prosecuted and heavily fined under the recently updated 1998 Data Protection Act for failing to ensure that secure data destruction had taken place prior to disposing of computer hard drives and other data-bearing equipment.
We provide secure data destruction services.. All processes are fully compliant with the WEEE Directive and full documentation is provided.
Through our extensive broker channel, we are confident that we can generate the highest revenue possible from our customers' redundant IT equipment. Revenue generated can then be used to purchase new equipment from us, donated to a charity of your choice or used for carbon offsetting via our partner scheme. Costs associated with reclamation are deducted from the sale, allowing us to provide this service free of up front charges.
We assign a unique job number for every collection.
A comprehensive asset report is produced for every collection. Every item of equipment with the exception of minor peripherals is logged into the asset report. Asset reports are forwarded to the customer in electronic format.
A typical asset report will include the following information as a minimum, although additional information can be added if required.