Below, please find our Frequently Asked Questions About IT Asset Disposition and Frequently Asked Questions for Securis. We also have a few more FAQ pages, as linked below:
General E-Waste Recycling Questions
Acceptable Items & Fees for Electronics Recycling Event
Degaussing FAQ’s
FAQ about HIPAA Requirements and IT Recycling

General FAQ’s for IT Asset Disposition
What is ITAD (IT Asset Disposition)
IT Asset Disposition (ITAD) describes the last phase of IT Asset Management in which IT Assets are securely and responsibly disposed of. The ITAD process provides compliant NAID AAA-certified data sanitization (data destruction) using various techniques, such as wiping hard drives to NIST 800-88 standards, degaussing, hard drive shredding, and media disintegration. This process can occur onsite via our mobile service, or assets can be picked up and sanitized at our secure facilities. After sanitization or destruction, IT Assets are recycled or resold while ensuring environmental compliance and data security.
Why is IT Asset Disposition important?
IT Asset Disposition (ITAD) is crucial for several reasons. First and foremost is data security. ITAD done right means any sensitive data is completely erased from retired devices. Sometimes, it calls for shredding or disintegrating data-bearing devices if they contain classified information. It is also essential for companies to comply with industry, Federal, and local E-waste compliance standards. Many companies also have internal standards for environmental governance. A company needs to choose an IT Asset Disposition company that can assure compliance, security, and the highest environmental standards to avoid potential breaches or non-compliance, which can result in extreme fines and reputational damage. In addition, IT asset disposition is cost-effective as companies can recover value from obsolete assets through resale, recycling, or donation.
How do you choose an IT asset disposition company?
When selecting an ITAD provider, consider the following:
- Certifications and compliance with industry standards
- Secure data destruction methods
- Environmental responsibility practices
- TransparencyTimliness and accuracy in reporting and
- Range of services offered (e.g., on-site data destruction, recycling, resale)
- Reputation and customer reviews
For more detailed advice on what to look for in a responsible E-Waste recycling partner, please read our blog post, and for our look at the top IT asset disposition companies, please click here.
What is NIST800-88 as it relates to data destruction?
NIST 800-88 is a guideline published by the National Institute of Standards and Technology that outlines best practices for media sanitization. The guidelines categorize data based on sensitivity, which helps determine the appropriate sanitization method. Highly sensitive information, such as classified or confidential data, requires more stringent sanitization than less sensitive data. The guidelines categorize media sanitization into three levels: Clear, Purge, and Destroy. Each level corresponds to different methods and levels of assurance in data sanitization. For a deeper dive into NIST 800-88 and the guidelines recommended for media sanitization, please read our blog NIST 800-88: Secure Data Destruction Standards for Media Sanitization.
What are the different data destruction methods?
Standard data destruction methods include:
- Software-based data wiping: This data destruction method employs software to purge a data-bearing device to NIST 800-88 standards. Wiping is the most sustainable option, as equipment can be safely reused or donated while ensuring data has been irretrievably destroyed.
- Degaussing is a powerful demagnetization process (for magnetic media) that is a proven method for removing data from magnetic storage hard drives and tapes.
Physical destruction (shredding or disintegration): This destruction process involves physically destroying data-bearing devices. The shredding method is chosen based on the physical size of the data-bearing device and the sensitivity level of the media on the device. The most sensitive information and the smallest devices, such as Solid-state drives (SSDs), flash drives, smartphones, SIM cards, memory cards, and micro SD cards, are usually shredded using a disintegrator capable of shredding these items to 2mm pulp.
What does data or media sanitization mean?
Media sanitization means permanently removing all data from a storage device to prevent unauthorized access. This can involve overwriting, degaussing, or physically destroying the media to ensure data cannot be recovered.
What are NSA data destruction standards?
The National Security Agency (NSA) has established stringent standards for data destruction to protect classified information. These standards typically involve physical destruction methods, such as disintegration, incineration, or pulverization, to ensure that sensitive and classified data cannot be recovered. The NSA issues a list of evaluated products that meet NSA specifications as well as an FAQ page that answers questions about media destruction. Securis employs several products from the evaluated products list.
How can you be sure that an IT Asset Destruction partner will not harm the environment with their e-waste recycling?
R2v3 certification is a reliable indicator that a vendor meets stringent electronics recycling and refurbishment requirements. This certification is not merely a management system but a comprehensive sustainability standard to achieve positive outcomes in electronic waste management. As an R2v3 Certified Facility, Securis undergoes independent audits to ensure compliance with the highest global electronics reuse and recycling standards. Please read our blog post to learn why you should choose an R2v3-certified e-waste recycling company for your ITAD needs.
What is a certificate of destruction?
A Certificate of Destruction (CoD) is more than just a document; it’s your assurance that your IT assets have been securely and permanently destroyed to NIST 800-88 standards, protecting your sensitive information from potential breaches. This vital certificate proves compliance with data protection regulations, helping your organization meet legal and industry standards while safeguarding your reputation. At Securis, we are committed to providing comprehensive and transparent documentation with every CoD, ensuring you have complete confidence in our meticulous processes. Our certificates detail the destruction of your assets, reinforcing your compliance and strengthening your security posture. They are available online in our Client Portal 24/7.
What is R2v3 Certification, and why should we partner with an R2v3-certified vendor?
The Responsible Recycling (R2v3) certification is a globally acknowledged electronics recycling and refurbishment standard. Developed by Sustainable Electronics Recycling International (SERI), the R2v3 standard mandates that certified facilities adhere to strict environmental, health, safety, and data security protocols. It is the most widely adopted sustainability standard for electronics recycling and refurbishment, applicable to facilities of all sizes and locations. R2v3 certification is a reliable indicator that a vendor meets stringent electronics recycling and refurbishment requirements. This certification is not merely a management system but a comprehensive sustainability standard designed to achieve positive outcomes in electronic waste management. As an R2v3 Certified Facility, we undergo independent audits to ensure compliance with the highest global electronics reuse and recycling standards. Please read our blog to learn why you should choose an R2v3-certified e-waste Recycling Company for your ITAD.
Is Data Center Decommissioning the same as ITAD?
Data center decommissioning is the process of closing down and dismantling a data center, which includes the removal of IT assets from the data center and the subsequent media sanitization, disposal, and recycling of those assets. ITAD is a broader term that is an acronym for IT Asset Disposition, which describes the last phase of the IT Asset Management cycle in which IT Assets are securely and responsibly disposed of. Data center decommissioning is more specialized and should be handled by companies experienced with the unique challenges and requirements of decommissioning large-scale data center environments which may include electrical and HVAC systems.
FAQ’s about IT Asset Disposition (ITAD) with Securis
How long have you been in business?
Securis has proudly been in business since 2020. You can learn more about our Company History here.
What methods do you use for destruction?
Our Standard data destruction methods include:
- Software-based data wiping employs software to purge a data-bearing device to NIST 800-88 standards. Wiping is the most sustainable option, as equipment can be safely reused or donated while ensuring data has been irretrievably destroyed.
- Degaussing is a powerful demagnetization process (for magnetic media) that is a proven method for removing data from magnetic storage hard drives and tapes.
- Physical destruction (shredding or disintegration) involves physically destroying data-bearing devices. The size of the shredded materials depends on the kind of device and the sensitivity of the media contained in the device. The most sensitive information and the smallest devices, such as Solid-state drives (SSDs), flash drives, smartphones, SIM cards, memory cards, and micro SD cards, will be shredded using a disintegrator capable of shredding these items to 2mm pulp.
- Smelting is an option but only sometimes used.
Can you provide a certificate of destruction?
Yes, Securis provides Certificates of Destruction (CoD) for all destroyed assets as evidence that your IT assets have been securely and permanently destroyed to NIST 800-88 standards. Our certificates detail the destruction of your assets and are available online in our Client Portal 24/7.
Do you capture serial numbers and provide an inventory report?
Yes, we capture serial numbers for all assets (if available) and provide detailed reporting. The average inventory accuracy rate in the ITAD industry is just 85% due to challenges such as damaged or missing asset tags, difficulty scanning large quantities of assets, and the appearance of multiple barcodes on electronic assets. At Securis, our thorough triple-checking process and use of AI uncover data-bearing devices that customers miss. Our inventory documentation reflects our commitment to accuracy throughout the ITAD process and promises a leak-proof chain of custody for every asset. After project completion, your inventory documentation will be available online via our Client Portal so that you will be audit-ready at any time.
Can you destroy to NSA standards? Is your equipment on the NSA's EPL?
Yes, Securis employs several products on the National Security Agency (NSA) evaluated products list. The (NSA) has established stringent standards for data destruction to protect classified information. These standards typically involve physical destruction methods, such as disintegration, incineration, or pulverization, to ensure that sensitive data cannot be recovered. The NSA issues a list of evaluated products that meet NSA specifications as well as an FAQ page that answers questions about media destruction.
Do you destroy to NIST 800-88 standards?
Yes, Securis always follows NIST 800-88 standards when deciding which data destruction methods would be most appropriate for a client. NIST 800-88 is a guideline published by the National Institute of Standards and Technology that outlines best practices for media sanitization. It provides recommendations for the most appropriate method for securely erasing data from various storage devices to prevent unauthorized access to sensitive information. The guidelines categorize data based on sensitivity, which helps determine the appropriate sanitization method. Highly sensitive information, such as classified or confidential data, requires more stringent sanitization than less sensitive data. The guidelines categorize media sanitization into three levels: Clear, Purge, and Destroy. Each level corresponds to different methods and levels of assurance in data sanitization. For a deeper dive into NIST 800-88, please read our blog NIST 800-88: Secure Data Destruction Standards for Media Sanitization.
Where are your facilities located, and what locations do you cover?
Securis uses NAID AAA-certified mobile trucks to extend service across the United States. Our physical locations are in Northern Virginia, Norfolk, Virginia, Central Carolina, Provo, UT and Richmond, Virginia.
What types of items do you shred, and what particle size can you shred down to?
Securis’ industrial shredding services are the foundation of our secure and certified data destruction processes. Our proprietary trucks allow us to safely destroy traditional hard drives (HDD) and smaller items such as Solid State Drives (SSD), flash drives, smartphone SIM and memory cards, and micro SD cards on-site at the customer’s location or securely in our access-controlled facilities. Depending on the destruction standards that need to be met, we can offer traditional shredding as well as a disintegration option that goes beyond traditional shredding and pulverizes devices into 2mm e-crumbs as recommended by the NSA, rendering all data completely illegible.
Are you R2v3 Certified? What are your e-waste recycling practices?
Yes, Securis is R2v3 certified and dedicated to green recycling practices for each piece of equipment – whether intact, refurbished, or broken down for scrap to ensure harmful chemicals do not end up in landfills. Even our downstream vendors must follow strict standards to prevent environmental harm. Global stewardship and a commitment to serving others are at the core of Securis’ beliefs. As an electronic recycler, refurbisher, re-integrator, and data destruction firm, Securis’ mission is to provide environmentally sound solutions for the secure, effective management and removal of any organization’s end-of-life electronic assets while providing the most secure IT data destruction services in the industry. Securis’ commitment to improving the environment expresses our guiding principles and demonstrates our “think globally and act locally” sensibilities. Please read our blog to learn why you should choose an R2v3-certified e-waste Recycling Company for your ITAD.
Do you give any value back or pay for equipment?
There’s no need to completely write off the value of IT equipment in today’s environment. Along with secure data destruction, IT asset value recovery should be a consideration when decommissioning a data center or business environment. Securis technicians have over 20 years of experience identifying value in retired IT assets. This leads to a quick, efficient, and maximally profitable liquidation process, helping you maximize your assets’ residual value and offset the decommissioning process’s costs.
What services do you offer in your Mobile Trucks? Can you come to me and pick up the equipment?
Our specialized mobile truck is equipped with machines that allow us to provide quiet, speedy, and secure software-based wiping, degaussing, hard drive shredding, and Data Disintegration services wherever you are, allowing us to serve clients nationally. Performing on-site electronic media shredding at the client’s location enables their personnel to witness the process, thus maintaining the highest level of security. Our mobile trucks are NAID AAA Certified, so you can be sure that your ITAD projects will meet the strict information disposal standards established by the National Association of Information Destruction (NAID).
Do you provide locked totes?
Yes, we do. If you do not have enough equipment to warrant a site visit or need a secure place to keep equipment until your service window arrives, Securis has a variety of Pelican Storm Cases that our clients can use to store or securely send equipment to Securis. These cases are military tough and designed to be safe and secure in the harshest conditions. Classified information can be transported via storm cases from USPS or courier as long as protocols are followed. In this video, our Director of Operations, Sal Salvetti, explains how Securis clients use Pelican storm cases.
What can you tell me about your company's security? What are your credentials? Are you AAA NAID certified?
Securis is NAID AAA certified for mobile operations and at our main facility in Northern Virginia. An NAID AAA certification provides several important assurances about an ITAD (IT Asset Disposition) vendor. NAID AAA-certified vendors must adhere to rigorous standards for secure data destruction, following strict protocols and employing robust security measures to safeguard confidential information during the entire ITAD process, including safe transportation, controlled facility access, and secure destruction methods. NAID AAA certification involves comprehensive auditing and compliance verification, as vendors must undergo scheduled and unannounced audits by trained, accredited security professionals to verify compliance with data protection laws and NAID standards. The certification process includes rigorous audits in 20 operational and security requirements areas. NAID auditors verify employee screening processes, validate employment and training records, and randomly test employees’ knowledge of data erasure policies. Auditors verify quality control logs and inspect security systems like CCTV and alarm logs. Vendors must have appropriate written policies and procedures in place for all aspects of data destruction. NAID AAA certification signals that the vendor will keep sensitive information secure until it is properly destroyed, helping protect against data breaches.
What is the average turnaround time to receive inventory reports and Certificates of Destruction? Is there a Client Portal to access this information?
Securis posts inventory reports and certificates of destruction on average 72 hours of project completion. These reports and certificates are available to our clients 24/7 via our Client Portal.
What are your chain of custody procedures? What happens to my equipment once it leaves my facility/office?
Secure On-Site services begin at the client location. Securis‘ professionally trained and certified staff members scan, tag, and inventory all electronics slated for destruction or recycling to establish a chain of custody. Once inventory is complete, media sanitization begins. This often takes place onsite at our clients’ offices but can also occur at the Securis facilities, depending on the particulars of the agreement. Securis performs wiping, degaussing, shredding, and disintegration services during sanitization using our NSA-approved equipment. Sanitized equipment is then loaded onto a Securis GPS-traceable truck and securely transported to one of Securis’ processing facilities, where a client-approved recycling plan is executed. Inventory lists are updated with records of all processed items for audit and accountability purposes. At the end of the process, a complete inventory list is provided to the client, as well as a Certificate of Destruction, a nationally recognized legal document of performance.
What separates you from other vendors?
Securis has been an IT Asset disposition (ITAD) leader for over 24 years. Over that time, we have worked with some of the country’s largest data centers, healthcare facilities, government contractors and agencies, and financial institutions.
Secure: Our vast experience with large IT Asset Disposition (ITAD) projects has helped us streamline the ITAD process to ensure we are using the most secure data destruction methods for your hard drive destruction and IT asset disposal needs. Our numerous certifications, including NAID AAA, ensure strict compliance with all Federal, state, and local data destruction standards.
Accurate: The average inventory accuracy rate in the ITAD industry is just 85%. At Securis, we achieve greater than 99% accuracy in our ITAD processes. Our thorough triple-checking process uncovers data-bearing devices that customers miss. Our inventory documentation reflects our commitment to accuracy throughout the ITAD process and promises a leak-proof chain of custody for every asset. Learn more about Why Inventory Matters in Electronics Recycling and Data Destruction Policy.
Sustainable: We are R2v3 certified and dedicated to green recycling practices for each piece of equipment – whether intact, refurbished, or broken down for scrap. Even our downstream vendors must follow strict standards to prevent environmental harm. To learn why you should choose an R2v3-certified e-waste Recycling Company for your ITAD, please read our blog on that subject.
Are your facilities and employees cleared to handle classified data?
Our North Virginia facility and mobile operations are NAID AAA-certified, ensuring that security protocols are strictly followed. Our employees are pre-screened through background checks and fingerprinting. Each goes through rigorous and ongoing training and is drug tested.
Do you track your truck with GPS?
Yes, our trucks are GPS-monitored and driven by screened employees, including through background checks, fingerprinting, and drug testing.
Can you pull the hard drives from the devices, or do we need to do that?
The most environmentally friendly way to recycle computers is to sanitize the data using a NIST 800-88 purge. To purge the data, customers should leave the drives in the computer. If a customer requires the drives to be shredded, the customer can remove them, or Securis technicians can remove them. We charge an additional fee to remove drives from computers or caddies.
Can you de-rack servers, or do we need to do that?
We require that servers and network equipment be powered off and can remove servers from racks for an additional fee.
Do you recycle batteries?
We can recycle Lithium Ion batteries and uninterruptable power supplies (UPS).
How fast can you come and pick up our equipment for disposal?
Our schedule is usually booked out two or more weeks in advance. While it is best to contact us 3-4 weeks ahead of time, we may be able to schedule sooner if you are flexible on the date and time.
What is your process for routers & switches?
Networking gear will be returned to factory settings unless the customer requests the data-bearing devices be shredded. Our best practice is to destroy data-bearing devices in firewalls. If we can not return switches to the factory setting for any reason, we destroy data-bearing devices before recycling them as a requirement of our certifications. Clients are welcome to witness the entire process if they wish.
Can you match hard drives to servers?
Yes. Some customers request that we match drive serial numbers to servers before shredding and we can do this for an additional charge. Our photo AI scanning service significantly increases the accuracy of hard drive scanning. Learn more about our AI scanning technology in this video.
Can you come to do an audit (inventory count) and create an asset list?
If you don’t have a complete inventory, one of our account representatives may be able to visit your site before scheduling your job. If that is not possible, pictures can help estimate quantities. Securis will do its best to assist you with estimating your inventory and charge for the number of recycled items.
Do the economics of electronic recycling work?
Unlike single-use plastics, electronics can be recycled in an environmentally friendly way without breaking the bank. This is because some equipment can be re-sold after proper data sanitization, which offsets some of the high labor and machinery costs associated with older equipment that is disassembled and scrapped.
Do you shred paper?
We don’t shred paper, only hard drives and electronics. We have referred companies to www.trueshred.com and received positive feedback.
Is Securis a minority-owned company?
Securis is not a minority-owned company, but we can make referrals to several minority-owned partner companies. Securis has a program that employs people with intellectual disabilities, which many companies report on as part of supplier diversity, ESG, and DEIB initiatives
SECURIS FACILITY SECURITY




