Data Security for ITAD, Corporate & Consumer Electronics

Size: px
Start display at page:

Download "Data Security for ITAD, Corporate & Consumer Electronics"

Transcription

1 Up cy cle \ ŭp-sỳ-kil\ v (ca. 2011) 1. the action of giving devices a second life 2. the mission to keep electronics out of landfills 3. to fund important causes without writing a check 4. to nearly double the environmental impact of recycling Data Security for ITAD, Corporate & Consumer Electronics Eliminate e Waste for Good Upcycle to bridge environmental stewardship, corporate & social responsibility, sustainability, and philanthropic giving.

2 Data Security IT Asset Disposition Service IT Asset Disposition CI provides IT Asset Disposition services for companies interested in redeploying, Upcycling, remarketing, breaking down commodities, and recycling their end-of-life IT equipment. We are committed to achieving the maximum Upcycle value, while guaranteeing security throughout the process. Every step of the LEAN service is committed to processing your IT Assets efficiently and securely, from time of pick up to the final disposition. The IT Asset Disposition services provide numerous benefits to our partners, including: LEAN chain of custody and reporting provide our partners with a clear understanding of their assets processed Peace of mind... all hard drives and memory storage systems are completely wiped or destroyed before final disposition. Elimination of recycling costs for all qualified equipment Upcycled electronics nearly doubles the environmental impact of recycling Chain of Custody The chain of custody ensures your security. Each asset is tagged from the moment it is received at our facility and entered into the system. Using the products unique serial numbers, each item will be asset tagged in order to provide accurate tracking through the entire IT Asset Disposition process. Convenient Pick-Up: Piece Count Verification/Serialized Asset Tag Secure Shipping Receiving: Piece Count Verification/Receive each Asset Tag into Customized Inventory System for Meticulous Tracking Locked Storage: Placed in Locked, Secure Area Audit: Serial/Piece Count Verification Data Erase/Destruction via Digital Wiping, Secure Degaussing, and Physical Destruction Processed for Upcycling, Commodities or Recycling Reporting Tracked Through the Chain of Custody Convenient Customized Pick-Up Schedules Pick-Up and Received Dates Data Erase/Destruction Dates and Certificates Issued Testing and 4 Point Product Evaluation Process Report Upcycle/Recycle Reconciliation Report

3 Data Security IT Asset Disposition Service (cont.) Reporting The advanced inventory management system tracks and tags each piece of equipment throughout the entire IT Asset Disposition process. We provide customized reporting to our partners within 45 business days. IntelliTrack Inventory Management System The IntelliTrack (WMS) Inventory Management software manages the flow of product as it moves through the IT Asset Disposition process with a focus on data metrics from product receipt to final disposition. Our partners benefit from increased efficiency resulting from: Increased inventory accuracy Increased order fulfillment capacity and accuracy Ability to meet our partners specific requirements Increased inventory turns Detailed reporting Asset Tags Reports will be provided with detailed information including the make, model, corresponding serial numbered asset tags, and all applicable end destination information for each asset. Compliance Reports CI understands the importance of keeping our partnerʼs information secure. Therefore, we go beyond the governmental standards. Our processing facility is NAID certified, which means we not only follow the government standards, but we also work to ensure we are always using the industryʼs current best practices. In order to guarantee the certification background checks are performed on all employees, as well as enrolling them in Data Security Training. The technology, systems, and security are secure and up to date for providing the best IT Asset Disposition service. All of our procedures for data handling and destruction, as well as, all documentation for services provided are audited twice a year. For data security processing, only DoD and NIST compliant erasure software is used. We require all recycle partners to be audited and certified with the following: ISO 14001, OSHAS 18001/ISO 18001, CHWMEG, and E-Stewards and/or R2.

4 Data Security IT Asset Disposition Service (cont.) Minimizing Risk Why Our Partners Choose CI as a Trusted Partner All downstream is: ISO 9001:2008 certified NAID Certified DoD NIST Compliant Erasure Software Audited and Certified R2 and/or e-steward Recycle Partners Commitment to quality Quality Control Process Inspection, Test, Refurbish & Repair 4-Point Product Evaluation Process (PEP) for product Upcycling: Package Condition, Cosmetic Condition, Functionality, and Package Contents. Expertise in merchandising and Upcycling products for on-line domestic sale with the worldʼs largest e-commerce sites ebay Platinum Top Rated Seller (TRS) operating 3 seller profiles Amazon.com Gold Tier Seller Newegg, Rakuten, and Sears Increase sales velocity using B2B Resellers, Value Added Resellers, and Broker Channels National and International commodities solutions Quality, responsive customer service. Honest and ethical we are proud of our relationships and value each partner served. Highest Standards for Data Destruction & Recycling CI processing places significant importance on protecting all data held on IT equipment and hard drives, whether the product is intended for reuse, parts, or recycling. Using several methods including digital wiping, degaussing, and physical shredding we are able to guarantee secure data destruction of all IT equipment and hard drives. We ensure your brand, outreach, and employees are protected by using the highest standards of data destruction. We only partner with Recycling companies which operate within ISO standards and hold e-steward and/or R2 certifications. These certifications ensure all end of life equipment is properly recycled domestically with a ZERO landfill policy.

5 Data Security IT Asset Disposition Service (cont.) Maximizing Upcycle Value Upcycle Platform for IT Assets By design, our Upcycle process has been created with our partners in mind, ensuring the highest value combined with the quickest resale technology can provide. Our systematic process of research is unparalleled in choosing which channel will produce the highest Upcycle value for each product. Data Destruction CIʼs customized service allows us to perform data destruction on range of product lines. Using a single partner can save time, and eliminate the cost of retiring IT assets, corporate equipment, and employee consumer electronics. Most corporate equipment qualifies. The below highlights a sample of categories: Desktop Computers Laptops Servers Storage Media LCD Monitors (Non-Functioning and Functioning) Routers and Switches Hard Drives Photocopiers Smartphones Tablets Point of Sale Equipment Network/Telecom Systems Switches/Hubs PC Docking Stations Routers Li-ON, Cellphone, NICAD, & NMHD Batteries Programs for surplus inventory and customer returns

6 Data Security IT Asset Disposition Service (cont.) Data Destruction (cont.) Digital Wiping Processing permanently and securely erases ALL data from hard drives using WipeDrive Enterprise and MediaWiper. WipeDrive is the ONLY disk-wiping technology that has been certified to NIAPʼs EAL4+ standard and is approved and used exclusively by the Department of Defense and is a trusted provider for many Fortune 100 companies such as GM & Humana. WipeDrive meets or exceeds ALL major certifications and standards including HIPAA, Sarbanes-Oxley and the Common Criteria standard. Environmentally & Socially Responsible WipeDrive contributes towards CIʼs commitment to the Eliminate E-Waste for Good initiative by providing a secure alternative to end of life recycling. This not only positively impacts the carbon footprint, but gives hardware a second life avoiding further contribution to e-waste. Degaussing Using degaussing methods processing ensures all hard drives and data storage are stripped of all sensitive data. Methods use a degausser to generate a powerful magnetic field which destroys all data from the magnetic media storage devices. Processing ensures there is insufficient magnetic reminisce, therefore rendering the hard drive and storage media useless. Using very powerful magnetic fields all data is destroyed from magnetic media storage devices, rendering the degaussed hard drives and data storage media useless. Physical Crushing / Shredding Hard Drives that will not be Upcycled are shredded and responsibly recycled. Any data containing media that our partners do not want to Upcycle is physically destroyed using high-capacity shredders. The shredding removes the different metals and metal-bearing components making it impossible to reconstruct the data. MicroSD and SIM cards are removed from cellphones and tablets and physically destroyed, shredded and pulverized. Reporting & Certification CI provides thorough and robust reporting options for our partners. Secure reports show internal drive data and confirm information about the wiping process. Reports are produced automatically and are unable to be manipulated, eliminating human error.

7 Data Security IT Asset Disposition Service (cont.) Upcycle Revenue Returns Quality Standards, Consistent Results Our procedures are documented and our quality is constantly measured. Our processing facility has adopted an efficient Quality Management System (QMS) that saves time and cost, improves efficiency and enhances our partner relationships. Upcycling Our experts perform a 4-Point Product Evaluation Process on each asset, rating the condition of the product on four attributes: Package, Condition, Cosmetic Condition, Functionality, and Package Contents. Our testing, refurbishment, and 4-Point Evaluation process are then combined with extensive research to identify the best disposition channel, resulting in the highest Upcycle value for each asset. A detailed report identifying each item down to the serial number is provided to our partners. IT Refurbishing Each asset has hidden value. Our programs ensure results by finding the opportunities in each asset with the highest Upcycle value. Experts evaluate each asset and determine whether to refurbish hardware as a complete unit OR dismantle to resell most valuable parts to achieve the highest Upcycle value. We protect your company from risk and liability by using the certified data destruction solutions. Additionally, with our facility being a Microsoft Registered Refurbisher it preinstalls every computer with genuine Microsoft Windowʼs software before it is cleaned, repackaged, and sold. Commitment to Eliminating e-waste, We Uphold a Zero-Landfill Policy Sustainability and environmental stewardship is the core of who we are and major contributor the menu of services that CI provides to our partners. CIʼs commitment to environmental stewardship provides our business partners with sustainable options while being environmentally responsible. We uphold a NO LANDFILL policy for ALL products processed through our programs. We manage the recycling process in a manner that minimizes the environmental impact for end-of-life product We screen all product and components to determine best practices for reuse, refurbish for intended original purpose, breakdown to commodities, or end-of-life recycling. The processing of all hard drives and data storage devices is done in a way that renders all data unrecoverable We are able to systematically track data required by our partners

8 Data Security Corporate & Consumer Electronics Data Security Privacy Maintaining our partners privacy as well as their trust and confidence is one of our highest priorities. We respect their right to keep personal information confidential and understand the desire to avoid unwanted solicitations. We do not sell, trade, or transfer personally identifiable information. Our site encrypts personal information using Secure Socket Layer (SSL) technology to provide for the most secure transmission of information from our partners. Data Removal Processing permanently and securely erases ALL data from hard drives using WipeDrive Enterprise and MediaWiper. WipeDrive is the ONLY disk-wiping technology that has been certified to NIAPʼs EAL4+ standard and is approved and used exclusively by the Department of Defense and is a trusted provider for many Fortune 100 companies such as GM & Humana. WipeDrive meets or exceeds ALL major certifications and standards including NIAP, HIPAA, Sarbanes-Oxley and the Common Criteria standard. Environmentally & Socially Responsible WipeDrive contributes towards our commitment to environmental stewardship by helping re-use and recycle storage hardware, rather than physically destroying it. This not only helps the environment, but gives this hardware a second life complimenting our zero landfill policy, stopping e-waste from poisoning the environment, and when Upcycled, nearly doubles the environmental impact of recycling. Data Wipe Solutions Removable Media 1. Laptops & Desktops Media is removed from DVD drives, card readers, floppy drives and USB ports and physically destroyed. 2. Cellphones, Smartphones & Tablets MicroSD and SIM cards are removed from cellphones & tablets and are shredded and pulverized. 3. Digital Cameras & Media Players Memory cards are removed and physically destroyed and internal memory files are removed and/or deleted.

9 Data Security Corporate & Consumer Electronics Data Wipe Solutions (cont.) Computers Laptops & Desktops All hard drives are erased using WipeDrive. WipeDrive completely erases ALL hard drive and external storage information including personal data, programs, viruses and malware. A clean installation of the appropriate Windows OS / Mac OS X is completed to optimize the Upcycle value. Smartphones & Tablets 1. Apple ios All settings and information are removed from the iphone, ipad, or ipod touch by tapping "Erase All Content and Settings" in Settings > General > Reset. Devices that support hardware encryption (iphone 3GS or later, ipad - All models, ipod touch 3rd generation or later): Erases user settings and information by removing the encryption key that protects the data. Devices that overwrite memory (Original iphone & iphone 3G, ipod touch & ipod touch 2nd generation): Overwrites user settings and information, writing a series of ones to the data partition. When the device is factory-reset, the passcode and encryption key are securely deleted and all data is scrambled. 2. Android Android devices are set up differently from Apple devices, and they vary from manufacturer to manufacturer. In general the default options are mostly secure. Option 1 - The device is factory reset (located in different places depending on the device, but should be under "Backup & reset") which will wipe ALL user-accessible area of storage. Option 2 - The device is encrypted (usually found in Settings under "Security") before performing a factory reset (Option 1 above) ensuring the highest level of data security.

10 Data Security Corporate & Consumer Electronics Data Wipe Solutions (cont.) Gaming Consoles There is not an easy way to perform a secure wipe of game-console storage, so we rely on the standard factory reset for most devices. As noted earlier, any media, game or memory cards are removed from the device and physically shredded, pulverized, and destroyed. 1. Xbox 360 After parental controls have been removed, this device can be factory reset / formatted. Hard drive can be physically removed and erased using WipeDrive. 2. Nintendo Wii After the Wii Shop Channel account has been deleted, this device can be factory reset / formatted. 3. Sony PlayStation 3 After each account with device access has been deactivated; this device can be factory reset / formatted. Hard drive can be physically removed and erased using WipeDrive. 4. Nintendo 3DS After the Nintendo eshop account has been deleted, you can format the system memory of this device. Exceptions 1. Apple devices with ios 7 that have been Apple ID linked and are unable to be wiped, are disassembled and data bearing parts are physically destroyed, shredded, and pulverized. Non-data bearing parts are Upcycled. 2. Devices with non-removable memory that have defects preventing operation of the device and subsequently the factory resetting / wiping of the memory are recycled, parted out and/or physically destroyed.

11 Data Security Corporate & Consumer Electronics Additional Information about White Canyon Wipe Drive data removal software: Regarding the data destruction software: The data destruction software is noted to be the worldʼs most highly-certified data erasure software as well as the most highly certified wiping technology on the planet. It is the only data erasure that has been certified by the NIAPʼs (National Information Assurance Partnership) EAL 4+ Standard. This rigorous, costly, and time-consuming certification was created by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) and is the most comprehensive certification currently available. It is the only disk-wiping technology that: Has been approved by NIAPʼs EAL 4+ Standard Is listed on the Armed Forces Approved Product List. Has passed rigorous tests performed by the U.S. Air Force on IT security and efficacy. Software Certifications: The NIAP Certification means that it complies with all the following international disk wipe standards US DoD M NIST Rev 1 Compliant NIAP EAL 4+ Meets the Common Criteria Evaluation and Validation Scheme HIPAA NATO NIAPC Sarbanes-Oxley FACTA standards Standard single pass overwrite US Army AR US Air Force System Security Instruction 5020 US Navy Staff Office Publication P US National Computer Security Center TG-025 Australian Defense Signals Directorate ACSI-33 (X0-PD) Australian Defense Signals Directorate ACSI-33 (X1-P-PD) Canadian RCMP TSSIT OPS-II Standard Wipe CIS GOST P GB HMG Infosec Standard #5 Baseline GB HMG Infosec Standard #5 Enhanced German VSITR CSEC IT

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services Destruction and Recycling Services An ISO 9002-compliant company Audited 100% data destruction and green recycling 2014 Commercial Catalog Edition 2014 www.cdrominc.com CD Rom, Inc. Table of Contents About

More information

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

Building an ITAD Program:

Building an ITAD Program: Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by

More information

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

Value Recovery Enterprise IT Asset Disposition

Value Recovery Enterprise IT Asset Disposition Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.

More information

Responsibly Retiring IT Assets, Medical or Laboratory Equipment

Responsibly Retiring IT Assets, Medical or Laboratory Equipment Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security

More information

SJSU Electronic Data Disposition Standard

SJSU Electronic Data Disposition Standard SJSU Electronic Data Disposition Standard Page 1 Executive Summary University data is at risk as long as it is persistently stored on electronic media. This means that data must be properly cared for during

More information

How To Destroy Data From A Hard Drive

How To Destroy Data From A Hard Drive Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization

More information

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6 GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE 899-ENVIRONMENTAL SERVICES AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms and conditions, up-to-date

More information

Value Recovery. arrow.com

Value Recovery. arrow.com Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,

More information

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET

More information

Recycling Electronics to Create Local Jobs for People with disabilities

Recycling Electronics to Create Local Jobs for People with disabilities A 501c3 Social Enterprise COLORADO SPRINGS ENVIRONMENTAL HEALTH & SAFETY REPORT Recycling Electronics to Create Local Jobs for People with disabilities www.bluestarrecyclers.com 2016 Blue Star Recyclers

More information

Office Equipment Disposal Policy

Office Equipment Disposal Policy Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

Understanding Data Destruction and How to Properly Protect Your Business

Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business I. Abstract This document is designed to provide a practical

More information

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number: State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2

More information

E-waste Challenges & Solutions

E-waste Challenges & Solutions E-waste Challenges & Solutions December 2013 SIMS at a glance Global 6 continents, 46 countries Over 500,000 tonnes processed annually #11 on the list of Global 100 Most Sustainable Companies Quality ISO

More information

Hard Drive Retention Offering for Xerox Products in the United States

Hard Drive Retention Offering for Xerox Products in the United States Hard Drive Retention Offering for Xerox Products in the United States November 19, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the

More information

Fujitsu Asset Lifecycle Management Services

Fujitsu Asset Lifecycle Management Services Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools

More information

Other terms are defined in the Providence Privacy and Security Glossary

Other terms are defined in the Providence Privacy and Security Glossary Subject: Device and Media Controls Department: Enterprise Security Executive Sponsor: EVP/COO Approved by: Rod Hochman, MD - President/CEO Policy Number: New Date: Revised 10/11/2013 Reviewed Policy Owner:

More information

Digital Data Destruction D3 Services, Inc.

Digital Data Destruction D3 Services, Inc. Audited 100% Data Destruction and Green Recycling An ISO 9002 Compliant Company GSA Catalog Nov 2009 Edition 9-03 General Service Administration Federal Supply Catalog Digital Data Destruction Services,

More information

PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013

PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013 PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013 CONTENTS Introduction... 3 System Requirements... 4 Install PrivaZer... 5 Uninstall PrivaZer... 9 Scan and Clean C Drive... 11 Scan Options... 20 Cleanup

More information

Secure Data Destruction

Secure Data Destruction Secure Data Destruction Secure Data Elimination (Degauss) Onsite Magnetic Degaussing service eliminates data from Tape and Magnetic Hard Disk media Portable machines allow for degaussing to be competed

More information

Samsung WEEE Management Policy (US and Canada)

Samsung WEEE Management Policy (US and Canada) Samsung WEEE Management Policy (US and Canada) 1. Purpose These requirements aim to minimize environmental impacts caused by all Electronic Waste generated by Samsung's US and Canadian operations and programs,

More information

HARD DRIVE REMARKETING

HARD DRIVE REMARKETING A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS

More information

Value Recovery. arrow.com

Value Recovery. arrow.com Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,

More information

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those

More information

Mobile Network Operators and the Used Mobile Device Market: SAFELY CAPTURING VALUE WITH ADVANCED DATA ERASURE

Mobile Network Operators and the Used Mobile Device Market: SAFELY CAPTURING VALUE WITH ADVANCED DATA ERASURE Mobile Network Operators and the Used Mobile Device Market: SAFELY CAPTURING VALUE WITH ADVANCED DATA ERASURE Blancco White Paper Published 21 February 2014 Table of contents Introduction...3 Drivers for

More information

Arrow IT Asset Disposition Trends Report

Arrow IT Asset Disposition Trends Report IT Asset Disposition ITAD Trends Report Arrow IT Asset Disposition Trends Report The data is in, and IT-industry practitioners have made it clear that concern over data security is the number one reason

More information

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc.

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc. DCAG Data Center Assistance Group, Inc. Revision Date: 5/20/2013 Asset Management Redeployment And Termination Services A Service Offering From Data Center Assistance Group, Inc. (DCAG) Prepared by: Thomas

More information

McGill University IT Asset Management Regulation

McGill University IT Asset Management Regulation Publication Date May 8, 2015 Revision V 1.1 McGill University IT Asset Management Regulation OVERVIEW McGill University seeks to provide its community with the necessary IT equipment, infrastructures and

More information

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder

More information

IT Asset disposition services

IT Asset disposition services IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

Media Disposition and Sanitation Procedure

Media Disposition and Sanitation Procedure Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...

More information

Chapter 4. Operating Systems and File Management

Chapter 4. Operating Systems and File Management Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup

More information

Asset recovery Balancing risk and opportunity

Asset recovery Balancing risk and opportunity Asset recovery Balancing risk and opportunity Table of contents Executive summary...2 Risks and rewards in the asset recovery process...2 Opportunities in asset recovery...2 The challenge of the IT lifecycle...3

More information

WipeDrive & WipeDrive PRO Quick Start Guide 2-6. Copyright 2006 WhiteCanyon Inc. All rights reserved

WipeDrive & WipeDrive PRO Quick Start Guide 2-6. Copyright 2006 WhiteCanyon Inc. All rights reserved WipeDrive & WipeDrive PRO Quick Start Guide 2-6 Copyright 2006 WhiteCanyon Inc. All rights reserved WipeDrive User Guide 1. INTRODUCTION. 3 1.1 Purpose..... 3 1.2 System Requirements.. 3 2. BEFORE WIPING

More information

Sustainability. Your Partner In Green IT & Bottom Line

Sustainability. Your Partner In Green IT & Bottom Line Electronic Greenscape Waste Eco Management & Sustainability Your Partner In Green IT & Bottom Line Industry Background Greenscape Eco Management was incepted in late 2007 with an aim to formulate new value

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures to protect and secure a covered entity s electronic information

More information

Challenges and Solutions for Effective SSD Data Erasure

Challenges and Solutions for Effective SSD Data Erasure Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional

More information

COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125

COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 Minnesota State Colleges & Universities and Asset Recovery Corporation COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 CONTRACT EFFECTIVE UNTIL: SEPTEMBER 15, 2014 http://www.finance.mnscu.edu/contracts-purchasing/collaborative/index.html

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

We are the solution. erecycling. We have the solution. made easy.

We are the solution. erecycling. We have the solution. made easy. We have the solution. erecycling made easy. Nowadays, business and technology go hand in hand. But what happens to those old or unwanted electronics? The answer, more often than not, is: nothing. We stack

More information

ICT Remanufacturing in the European B2B market. Questions + Answers. www.bitkom.org

ICT Remanufacturing in the European B2B market. Questions + Answers. www.bitkom.org ICT Remanufacturing in the European B2B market www.bitkom.org 2 ICT Remanufacturing in the European B2B market Global ICT»Original Equipment Manufacturers«(OEMs) are actively engaged in the effective reuse

More information

DOCUMENT CURRENT VENDORS AND CONTRACTS 2014 IT ASSET DISPOSITION PLAN

DOCUMENT CURRENT VENDORS AND CONTRACTS 2014 IT ASSET DISPOSITION PLAN DOCUMENT CURRENT VENDORS IT ASSET AND CONTRACTS DISPOSITION 2014 PLAN ASSESSMENT Organizations that lack an actively managed and well thought-out IT asset disposition (ITAD) program may be exposing themselves

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide

Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide This guide applies to the following Lexmark devices: Printers C780 C782 C935 T640 T642 T644 Multifunction Products X646

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

LOCAL E-CYCLING RESOURCES

LOCAL E-CYCLING RESOURCES LOCAL E-CYCLING RESOURCES Best Buy Dell Inc. Gateway Location: 217 Independence Blvd and 3334 Princess Anne Road What they accept: In store recycling programs include: cell phones, rechargeable batteries

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

Security Solutions. Concerned about information security? You should be!

Security Solutions. Concerned about information security? You should be! Security Solutions Concerned about information security? You should be! Various security threats surrounding the office Ricoh s proposal for a security management system. Information technology is the

More information

Dell Service Description

Dell Service Description Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

IT Quick Reference Guides How to Find Your MAC Address

IT Quick Reference Guides How to Find Your MAC Address IT Quick Reference Guides How to Find Your MAC Address Various Systems / Network Guides From time to time, especially when trying to attach a network device to the network, you may be asked to provide

More information

Mobile Phone & Laptop Recycling Programme with Your Company Mobiles

Mobile Phone & Laptop Recycling Programme with Your Company Mobiles Mobile Phone & Laptop Recycling Programme with Your Company Mobiles Tel: 01283 516259 Email: info@emceurope.eu.com Website: www.emceurope.eu.com 1 Contents About emc europe Page 3 Sustainability and CSR

More information

BACKUP AND RECOVERY File History + Push Button Reset + Advanced Recovery Tools + System Image Backup

BACKUP AND RECOVERY File History + Push Button Reset + Advanced Recovery Tools + System Image Backup BACKUP AND RECOVERY File History + Push Button Reset + Advanced Recovery Tools + System Image Backup The new Windows includes tools that can help you protect your documents and other important data, restore

More information

Preventing Final Disposition Data Breaches

Preventing Final Disposition Data Breaches Preventing Final Disposition Data Breaches How to Evaluate an ITAD Vendor for Your Organization By: Jim Kegley Founder, President and CEO, U.S. Micro Corporation The IT asset disposition (ITAD) industry

More information

Property Accounting Procedure Manual

Property Accounting Procedure Manual Property Accounting Procedure Manual Property Accounting Procedure 06-2013 1 Table of Contents Property Accounting Responsibilities... 3 General Guidelines Concerning Capital Equipment... 3 Acquisition...

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

Cloud Computing for Education Workshop

Cloud Computing for Education Workshop Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability

More information

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization

Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization TECHNICAL REFERENCE DOCUMENT Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization Recommendations Key Points: of the National Real world compliance

More information

School of Nursing Research Seminar. Data Security in The Academic Health Center. Presented By Jon Harper AHC Information Systems

School of Nursing Research Seminar. Data Security in The Academic Health Center. Presented By Jon Harper AHC Information Systems School of Nursing Research Seminar Data Security in The Academic Health Center Presented By Jon Harper AHC Information Systems 1 Overview of AHC-IS and Supported Services Provide desktop support to ~8500+

More information

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and

More information

Mobile Application Testing

Mobile Application Testing Mobile Application Testing Whitepaper Author: Scott Aziz Date: June 1, 2012 This whitepaper outlines the critical areas of testing needed to certify mobile enterprise applications Best practices from UST

More information

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised: NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Mobile Tablet Devices

Mobile Tablet Devices Document Owner: Page 1 of 5 Mobile Tablet Devices Purpose The purpose of this document is to provide guidance for the appropriate purchase and usage of Mobile Tablet Devices (devices running ios and Android

More information

CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN

CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE THE COVER. NO USER SERVICABLE PARTS INSIDE. REFER SERVICING TO QUALIFIED PERSONNEL. The lightning flash with

More information

Information Systems. Connecting Smartphones to NTU s Email System

Information Systems. Connecting Smartphones to NTU s Email System Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات - البحرين الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات Agenda The problem Traditional Methods Case Study Recommendation The problem What

More information

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues Doing Business in Oregon Under the Oregon Consumer Identity Theft Protection Act and Related Privacy Risks Privacy Data Loss www.breachblog.com Presented by: Mike Porter March 10, 2009 2 Privacy Data Loss

More information

IT asset disposal for organisations

IT asset disposal for organisations ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

More information >>> HERE <<<

More information >>> HERE <<< More information >>> HERE http://dbvir.com/pcpandora/pdx/cc131/ Tags: pc pandora scam or work?-- vmware

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

Best Practices for Responsible Disposal of Tape Media

Best Practices for Responsible Disposal of Tape Media Best Practices for Responsible Disposal of Tape Media The Environmental and Economic Benefits of Recycling vs. Destruction White Paper The Data Media Source San Jose, CA Data Media Source 2006 For use

More information

Asset Disposition and Data Destruction Solution

Asset Disposition and Data Destruction Solution A Di i i d D Asset Disposition and Data Destruction Solution E-Waste Recycling/Disposal "...we guarantee that 100% of your equipment will be recycled or reused staying out of our world s landfills..."

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using it right away.

More information