Disposal Management

The latest ITAD and Disposal Management News from IAITAM

5 Steps to Protect Your Data When Disposing of IT Assets

When you get rid of your organization’s old electronic devices, it’s important to make sure you’re not also getting rid of valuable data. Here are a few steps to protect your data when you’re disposing of your old IT assets recommended by the International Association of Information Technology Asset Managers. Make sure your data is wiped If done the right way, ...

Read More »

Are MDM and MAM software strong enough to protect smartphone?

Growth of bring-your-own-device (BYOD) policies in the late 2000s prompted many organizations to develop security protocols for employee-owned equipment. In response, software companies specializing in the securitization of mobile devices quickly gained acceptance. Today, 65 percent of enterprises have adopted mobile device management software to control smartphones and tablets.1 Often this control includes remote erasure of the units once they ...

Read More »

Electronics Recycling: Compliance Without Compromise

As the amount of e-waste across the globe continues to grow, secure electronics recycling and disposal is more important than ever. A recent report from United Nations University (UNU) reveals that the planet produced 41.8 million metric tons of e-waste in 2014 — an amount that could fill a line of 18-wheelers more than halfway around the earth. Your organization’s ...

Read More »

The Measure of Value Adding Asset Disposition

The inherent risks of technology retirement have led many companies to be satisfied merely if nothing bad happens. At the same time, industry consolidation has removed many best-in-breed ITAD vendors from the field, eliminating competition and further diminishing customer expectations. Today the common denominator for value recovery, lifecycle service options, and environmental results has never been lower. Asset managers often ...

Read More »

Checklist: Protecting Data During IT Asset Disposition

While not every business is required to protect each speck of data stored on their IT equipment, most companies find it’s in their best interest to do so anyway. However, without structure or guidance along with the large variety of devices storing data such as servers, hard drives, mobile devices, printers and more, some data can be overlooked by accident. ...

Read More »

The Dirty Problem of CRT Glass

By Dan Ingouf While attending the 2015 IAITAM ACE in San Diego, CA, I found myself in the midst of enjoyable and informative conversations with members and vendors.  In one conversation about disposal, the topic of types of IT equipment and disposal methods came up and my curiosity was piqued by the comment “we don’t see many CRT (cathode ray ...

Read More »

Turning Up the Heat on E-Waste

Cleaning up the planet is a big job and unfortunately, electronic waste (including organizational IT equipment) is a major contributor to the problem.  Although the exact amount of illegal e-waste is unknown, the United Nations Environmental Programme (UNEP) suggests that 60 – 90% of e-waste is being illegally traded or dumped, costing countries as much as $18.8 billion.   UN Under-Secretary-General ...

Read More »

Erasure Method for Mobile Devices – Understanding the Options by Type of Device

Mobile Device Erasure

By Ryan Laber & Steve Manalac, Arrow Value Recovery The proliferation of smartphones and tablets within the enterprise is prompting many asset managers and other IT professionals to examine their data destruction strategy.  According to a recent Gartner report, by 2017 the majority of end-point data breaches will shift from personal computing to smartphones and tablets. Of those breaches, 75% ...

Read More »

FTC as Data Security Watch Dogs – Data Security Enforcement on the Rise

By Matt MacLean, Cascade Asset Management ITAK V10 I4 Unfortunately, 2014 was another banner year for data breach incidents, resulting in numerous class actions and government investigations.  Data security protection was thought to be coming from the Department of Homeland Security, in the form of its Framework for Improving Critical Infrastructure Cybersecurity developed by the National Institute of Standards and ...

Read More »