Up cy cle \ ŭp-sỳ-kil\ v (ca. 2011) 1. the action of giving devices a second life 2. the mission to keep electronics out of landfills 3. to fund important causes without writing a check 4. to nearly double the environmental impact of recycling Data Security for ITAD, Corporate & Consumer Electronics Eliminate e Waste for Good Upcycle to bridge environmental stewardship, corporate & social responsibility, sustainability, and philanthropic giving.
Data Security IT Asset Disposition Service IT Asset Disposition CI provides IT Asset Disposition services for companies interested in redeploying, Upcycling, remarketing, breaking down commodities, and recycling their end-of-life IT equipment. We are committed to achieving the maximum Upcycle value, while guaranteeing security throughout the process. Every step of the LEAN service is committed to processing your IT Assets efficiently and securely, from time of pick up to the final disposition. The IT Asset Disposition services provide numerous benefits to our partners, including: LEAN chain of custody and reporting provide our partners with a clear understanding of their assets processed Peace of mind... all hard drives and memory storage systems are completely wiped or destroyed before final disposition. Elimination of recycling costs for all qualified equipment Upcycled electronics nearly doubles the environmental impact of recycling Chain of Custody The chain of custody ensures your security. Each asset is tagged from the moment it is received at our facility and entered into the system. Using the products unique serial numbers, each item will be asset tagged in order to provide accurate tracking through the entire IT Asset Disposition process. Convenient Pick-Up: Piece Count Verification/Serialized Asset Tag Secure Shipping Receiving: Piece Count Verification/Receive each Asset Tag into Customized Inventory System for Meticulous Tracking Locked Storage: Placed in Locked, Secure Area Audit: Serial/Piece Count Verification Data Erase/Destruction via Digital Wiping, Secure Degaussing, and Physical Destruction Processed for Upcycling, Commodities or Recycling Reporting Tracked Through the Chain of Custody Convenient Customized Pick-Up Schedules Pick-Up and Received Dates Data Erase/Destruction Dates and Certificates Issued Testing and 4 Point Product Evaluation Process Report Upcycle/Recycle Reconciliation Report
Data Security IT Asset Disposition Service (cont.) Reporting The advanced inventory management system tracks and tags each piece of equipment throughout the entire IT Asset Disposition process. We provide customized reporting to our partners within 45 business days. IntelliTrack Inventory Management System The IntelliTrack (WMS) Inventory Management software manages the flow of product as it moves through the IT Asset Disposition process with a focus on data metrics from product receipt to final disposition. Our partners benefit from increased efficiency resulting from: Increased inventory accuracy Increased order fulfillment capacity and accuracy Ability to meet our partners specific requirements Increased inventory turns Detailed reporting Asset Tags Reports will be provided with detailed information including the make, model, corresponding serial numbered asset tags, and all applicable end destination information for each asset. Compliance Reports CI understands the importance of keeping our partnerʼs information secure. Therefore, we go beyond the governmental standards. Our processing facility is NAID certified, which means we not only follow the government standards, but we also work to ensure we are always using the industryʼs current best practices. In order to guarantee the certification background checks are performed on all employees, as well as enrolling them in Data Security Training. The technology, systems, and security are secure and up to date for providing the best IT Asset Disposition service. All of our procedures for data handling and destruction, as well as, all documentation for services provided are audited twice a year. For data security processing, only DoD and NIST 800-88 compliant erasure software is used. We require all recycle partners to be audited and certified with the following: ISO 14001, OSHAS 18001/ISO 18001, CHWMEG, and E-Stewards and/or R2.
Data Security IT Asset Disposition Service (cont.) Minimizing Risk Why Our Partners Choose CI as a Trusted Partner All downstream is: ISO 9001:2008 certified NAID Certified DoD NIST 800-88 Compliant Erasure Software Audited and Certified R2 and/or e-steward Recycle Partners Commitment to quality Quality Control Process Inspection, Test, Refurbish & Repair 4-Point Product Evaluation Process (PEP) for product Upcycling: Package Condition, Cosmetic Condition, Functionality, and Package Contents. Expertise in merchandising and Upcycling products for on-line domestic sale with the worldʼs largest e-commerce sites ebay Platinum Top Rated Seller (TRS) operating 3 seller profiles Amazon.com Gold Tier Seller Newegg, Rakuten, and Sears Increase sales velocity using B2B Resellers, Value Added Resellers, and Broker Channels National and International commodities solutions Quality, responsive customer service. Honest and ethical we are proud of our relationships and value each partner served. Highest Standards for Data Destruction & Recycling CI processing places significant importance on protecting all data held on IT equipment and hard drives, whether the product is intended for reuse, parts, or recycling. Using several methods including digital wiping, degaussing, and physical shredding we are able to guarantee secure data destruction of all IT equipment and hard drives. We ensure your brand, outreach, and employees are protected by using the highest standards of data destruction. We only partner with Recycling companies which operate within ISO standards and hold e-steward and/or R2 certifications. These certifications ensure all end of life equipment is properly recycled domestically with a ZERO landfill policy.
Data Security IT Asset Disposition Service (cont.) Maximizing Upcycle Value Upcycle Platform for IT Assets By design, our Upcycle process has been created with our partners in mind, ensuring the highest value combined with the quickest resale technology can provide. Our systematic process of research is unparalleled in choosing which channel will produce the highest Upcycle value for each product. Data Destruction CIʼs customized service allows us to perform data destruction on range of product lines. Using a single partner can save time, and eliminate the cost of retiring IT assets, corporate equipment, and employee consumer electronics. Most corporate equipment qualifies. The below highlights a sample of categories: Desktop Computers Laptops Servers Storage Media LCD Monitors (Non-Functioning and Functioning) Routers and Switches Hard Drives Photocopiers Smartphones Tablets Point of Sale Equipment Network/Telecom Systems Switches/Hubs PC Docking Stations Routers Li-ON, Cellphone, NICAD, & NMHD Batteries Programs for surplus inventory and customer returns
Data Security IT Asset Disposition Service (cont.) Data Destruction (cont.) Digital Wiping Processing permanently and securely erases ALL data from hard drives using WipeDrive Enterprise and MediaWiper. WipeDrive is the ONLY disk-wiping technology that has been certified to NIAPʼs EAL4+ standard and is approved and used exclusively by the Department of Defense and is a trusted provider for many Fortune 100 companies such as GM & Humana. WipeDrive meets or exceeds ALL major certifications and standards including HIPAA, Sarbanes-Oxley and the Common Criteria standard. Environmentally & Socially Responsible WipeDrive contributes towards CIʼs commitment to the Eliminate E-Waste for Good initiative by providing a secure alternative to end of life recycling. This not only positively impacts the carbon footprint, but gives hardware a second life avoiding further contribution to e-waste. Degaussing Using degaussing methods processing ensures all hard drives and data storage are stripped of all sensitive data. Methods use a degausser to generate a powerful magnetic field which destroys all data from the magnetic media storage devices. Processing ensures there is insufficient magnetic reminisce, therefore rendering the hard drive and storage media useless. Using very powerful magnetic fields all data is destroyed from magnetic media storage devices, rendering the degaussed hard drives and data storage media useless. Physical Crushing / Shredding Hard Drives that will not be Upcycled are shredded and responsibly recycled. Any data containing media that our partners do not want to Upcycle is physically destroyed using high-capacity shredders. The shredding removes the different metals and metal-bearing components making it impossible to reconstruct the data. MicroSD and SIM cards are removed from cellphones and tablets and physically destroyed, shredded and pulverized. Reporting & Certification CI provides thorough and robust reporting options for our partners. Secure reports show internal drive data and confirm information about the wiping process. Reports are produced automatically and are unable to be manipulated, eliminating human error.
Data Security IT Asset Disposition Service (cont.) Upcycle Revenue Returns Quality Standards, Consistent Results Our procedures are documented and our quality is constantly measured. Our processing facility has adopted an efficient Quality Management System (QMS) that saves time and cost, improves efficiency and enhances our partner relationships. Upcycling Our experts perform a 4-Point Product Evaluation Process on each asset, rating the condition of the product on four attributes: Package, Condition, Cosmetic Condition, Functionality, and Package Contents. Our testing, refurbishment, and 4-Point Evaluation process are then combined with extensive research to identify the best disposition channel, resulting in the highest Upcycle value for each asset. A detailed report identifying each item down to the serial number is provided to our partners. IT Refurbishing Each asset has hidden value. Our programs ensure results by finding the opportunities in each asset with the highest Upcycle value. Experts evaluate each asset and determine whether to refurbish hardware as a complete unit OR dismantle to resell most valuable parts to achieve the highest Upcycle value. We protect your company from risk and liability by using the certified data destruction solutions. Additionally, with our facility being a Microsoft Registered Refurbisher it preinstalls every computer with genuine Microsoft Windowʼs software before it is cleaned, repackaged, and sold. Commitment to Eliminating e-waste, We Uphold a Zero-Landfill Policy Sustainability and environmental stewardship is the core of who we are and major contributor the menu of services that CI provides to our partners. CIʼs commitment to environmental stewardship provides our business partners with sustainable options while being environmentally responsible. We uphold a NO LANDFILL policy for ALL products processed through our programs. We manage the recycling process in a manner that minimizes the environmental impact for end-of-life product We screen all product and components to determine best practices for reuse, refurbish for intended original purpose, breakdown to commodities, or end-of-life recycling. The processing of all hard drives and data storage devices is done in a way that renders all data unrecoverable We are able to systematically track data required by our partners
Data Security Corporate & Consumer Electronics Data Security Privacy Maintaining our partners privacy as well as their trust and confidence is one of our highest priorities. We respect their right to keep personal information confidential and understand the desire to avoid unwanted solicitations. We do not sell, trade, or transfer personally identifiable information. Our site encrypts personal information using Secure Socket Layer (SSL) technology to provide for the most secure transmission of information from our partners. Data Removal Processing permanently and securely erases ALL data from hard drives using WipeDrive Enterprise and MediaWiper. WipeDrive is the ONLY disk-wiping technology that has been certified to NIAPʼs EAL4+ standard and is approved and used exclusively by the Department of Defense and is a trusted provider for many Fortune 100 companies such as GM & Humana. WipeDrive meets or exceeds ALL major certifications and standards including NIAP, HIPAA, Sarbanes-Oxley and the Common Criteria standard. Environmentally & Socially Responsible WipeDrive contributes towards our commitment to environmental stewardship by helping re-use and recycle storage hardware, rather than physically destroying it. This not only helps the environment, but gives this hardware a second life complimenting our zero landfill policy, stopping e-waste from poisoning the environment, and when Upcycled, nearly doubles the environmental impact of recycling. Data Wipe Solutions Removable Media 1. Laptops & Desktops Media is removed from DVD drives, card readers, floppy drives and USB ports and physically destroyed. 2. Cellphones, Smartphones & Tablets MicroSD and SIM cards are removed from cellphones & tablets and are shredded and pulverized. 3. Digital Cameras & Media Players Memory cards are removed and physically destroyed and internal memory files are removed and/or deleted.
Data Security Corporate & Consumer Electronics Data Wipe Solutions (cont.) Computers Laptops & Desktops All hard drives are erased using WipeDrive. WipeDrive completely erases ALL hard drive and external storage information including personal data, programs, viruses and malware. A clean installation of the appropriate Windows OS / Mac OS X is completed to optimize the Upcycle value. Smartphones & Tablets 1. Apple ios All settings and information are removed from the iphone, ipad, or ipod touch by tapping "Erase All Content and Settings" in Settings > General > Reset. Devices that support hardware encryption (iphone 3GS or later, ipad - All models, ipod touch 3rd generation or later): Erases user settings and information by removing the encryption key that protects the data. Devices that overwrite memory (Original iphone & iphone 3G, ipod touch & ipod touch 2nd generation): Overwrites user settings and information, writing a series of ones to the data partition. When the device is factory-reset, the passcode and encryption key are securely deleted and all data is scrambled. 2. Android Android devices are set up differently from Apple devices, and they vary from manufacturer to manufacturer. In general the default options are mostly secure. Option 1 - The device is factory reset (located in different places depending on the device, but should be under "Backup & reset") which will wipe ALL user-accessible area of storage. Option 2 - The device is encrypted (usually found in Settings under "Security") before performing a factory reset (Option 1 above) ensuring the highest level of data security.
Data Security Corporate & Consumer Electronics Data Wipe Solutions (cont.) Gaming Consoles There is not an easy way to perform a secure wipe of game-console storage, so we rely on the standard factory reset for most devices. As noted earlier, any media, game or memory cards are removed from the device and physically shredded, pulverized, and destroyed. 1. Xbox 360 After parental controls have been removed, this device can be factory reset / formatted. Hard drive can be physically removed and erased using WipeDrive. 2. Nintendo Wii After the Wii Shop Channel account has been deleted, this device can be factory reset / formatted. 3. Sony PlayStation 3 After each account with device access has been deactivated; this device can be factory reset / formatted. Hard drive can be physically removed and erased using WipeDrive. 4. Nintendo 3DS After the Nintendo eshop account has been deleted, you can format the system memory of this device. Exceptions 1. Apple devices with ios 7 that have been Apple ID linked and are unable to be wiped, are disassembled and data bearing parts are physically destroyed, shredded, and pulverized. Non-data bearing parts are Upcycled. 2. Devices with non-removable memory that have defects preventing operation of the device and subsequently the factory resetting / wiping of the memory are recycled, parted out and/or physically destroyed.
Data Security Corporate & Consumer Electronics Additional Information about White Canyon Wipe Drive data removal software: Regarding the data destruction software: The data destruction software is noted to be the worldʼs most highly-certified data erasure software as well as the most highly certified wiping technology on the planet. It is the only data erasure that has been certified by the NIAPʼs (National Information Assurance Partnership) EAL 4+ Standard. This rigorous, costly, and time-consuming certification was created by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) and is the most comprehensive certification currently available. It is the only disk-wiping technology that: Has been approved by NIAPʼs EAL 4+ Standard Is listed on the Armed Forces Approved Product List. Has passed rigorous tests performed by the U.S. Air Force on IT security and efficacy. Software Certifications: The NIAP Certification means that it complies with all the following international disk wipe standards US DoD 5220.22-M NIST 800-88 Rev 1 Compliant NIAP EAL 4+ Meets the Common Criteria Evaluation and Validation Scheme HIPAA NATO NIAPC Sarbanes-Oxley FACTA standards Standard single pass overwrite US Army AR380-19 US Air Force System Security Instruction 5020 US Navy Staff Office Publication P-5329-26 US National Computer Security Center TG-025 Australian Defense Signals Directorate ACSI-33 (X0-PD) Australian Defense Signals Directorate ACSI-33 (X1-P-PD) Canadian RCMP TSSIT OPS-II Standard Wipe CIS GOST P50739-95 GB HMG Infosec Standard #5 Baseline GB HMG Infosec Standard #5 Enhanced German VSITR CSEC IT