Frequently Asked Questions

Below, please find our Frequently Asked Questions About IT Asset Disposition and Frequently Asked Questions for Securis.  We also have a few more FAQ pages, as linked below:

General E-Waste Recycling Questions

Acceptable Items & Fees for Electronics Recycling Event

Degaussing FAQ’s

FAQ about HIPAA Requirements and IT Recycling

Securis team

General FAQ’s for IT Asset Disposition

IT Asset Disposition (ITAD) describes the last phase of IT Asset Management in which IT Assets are securely and responsibly disposed of. The ITAD process provides compliant NAID AAA-certified data sanitization (data destruction) using various techniques, such as wiping hard drives to NIST 800-88 standards, degaussing, hard drive shredding, and media disintegration. This process can occur onsite via our mobile service, or assets can be picked up and sanitized at our secure facilities.   After sanitization or destruction, IT Assets are recycled or resold while ensuring environmental compliance and data security.    

IT Asset Disposition (ITAD) is crucial for several reasons. First and foremost is data security.  ITAD done right means any sensitive data is completely erased from retired devices. Sometimes, it calls for shredding or disintegrating data-bearing devices if they contain classified information.  It is also essential for companies to comply with industry, Federal, and local E-waste compliance standards. Many companies also have internal standards for environmental governance.  A company needs to choose an IT Asset Disposition company that can assure compliance, security, and the highest environmental standards to avoid potential breaches or non-compliance, which can result in extreme fines and reputational damage. In addition, IT asset disposition is cost-effective as companies can recover value from obsolete assets through resale, recycling, or donation. 

When selecting an ITAD provider, consider the following:

  1. Certifications and compliance with industry standards
  2. Secure data destruction methods
  3. Environmental responsibility practices
  4. TransparencyTimliness and accuracy in reporting and 
  5. Range of services offered (e.g., on-site data destruction, recycling, resale)
  6. Reputation and customer reviews

For more detailed advice on what to look for in a responsible E-Waste recycling partner, please read our blog post, and for our look at the top IT asset disposition companies, please click here

NIST 800-88 is a guideline published by the National Institute of Standards and Technology that outlines best practices for media sanitization. The guidelines categorize data based on sensitivity, which helps determine the appropriate sanitization method. Highly sensitive information, such as classified or confidential data, requires more stringent sanitization than less sensitive data. The guidelines categorize media sanitization into three levels: Clear, Purge, and Destroy. Each level corresponds to different methods and levels of assurance in data sanitization. For a deeper dive into NIST 800-88 and the guidelines recommended for media sanitization, please read our blog NIST 800-88: Secure Data Destruction Standards for Media Sanitization.

Standard data destruction methods include:

  • Software-based data wiping: This data destruction method employs software to purge a data-bearing device to NIST 800-88 standards.  Wiping is the most sustainable option, as equipment can be safely reused or donated while ensuring data has been irretrievably destroyed.
  • Degaussing is a powerful demagnetization process (for magnetic media) that is a proven method for removing data from magnetic storage hard drives and tapes.

Physical destruction (shredding or disintegration):  This destruction process involves physically destroying data-bearing devices.  The shredding method is chosen based on the physical size of the data-bearing device and the sensitivity level of the media on the device. The most sensitive information and the smallest devices, such as Solid-state drives (SSDs), flash drives, smartphones, SIM cards, memory cards, and micro SD cards, are usually shredded using a disintegrator capable of shredding these items to 2mm pulp.  

Media sanitization means permanently removing all data from a storage device to prevent unauthorized access. This can involve overwriting, degaussing, or physically destroying the media to ensure data cannot be recovered.

The National Security Agency (NSA) has established stringent standards for data destruction to protect classified information. These standards typically involve physical destruction methods, such as disintegration, incineration, or pulverization, to ensure that sensitive and classified data cannot be recovered. The NSA issues a list of evaluated products that meet NSA specifications as well as an FAQ page that answers questions about media destruction. Securis employs several products from the evaluated products list. 

R2v3 certification is a reliable indicator that a vendor meets stringent electronics recycling and refurbishment requirements. This certification is not merely a management system but a comprehensive sustainability standard to achieve positive outcomes in electronic waste management. As an R2v3 Certified Facility, Securis undergoes independent audits to ensure compliance with the highest global electronics reuse and recycling standards. Please read our blog post to learn why you should choose an R2v3-certified e-waste recycling company for your ITAD needs.

A Certificate of Destruction (CoD) is more than just a document; it’s your assurance that your IT assets have been securely and permanently destroyed to NIST 800-88 standards, protecting your sensitive information from potential breaches. This vital certificate proves compliance with data protection regulations, helping your organization meet legal and industry standards while safeguarding your reputation. At Securis, we are committed to providing comprehensive and transparent documentation with every CoD, ensuring you have complete confidence in our meticulous processes. Our certificates detail the destruction of your assets, reinforcing your compliance and strengthening your security posture. They are available online in our Client Portal 24/7.

The Responsible Recycling (R2v3) certification is a globally acknowledged electronics recycling and refurbishment standard. Developed by Sustainable Electronics Recycling International (SERI), the R2v3 standard mandates that certified facilities adhere to strict environmental, health, safety, and data security protocols. It is the most widely adopted sustainability standard for electronics recycling and refurbishment, applicable to facilities of all sizes and locations.  R2v3 certification is a reliable indicator that a vendor meets stringent electronics recycling and refurbishment requirements. This certification is not merely a management system but a comprehensive sustainability standard designed to achieve positive outcomes in electronic waste management. As an R2v3 Certified Facility, we undergo independent audits to ensure compliance with the highest global electronics reuse and recycling standards. Please read our blog to learn why you should choose an R2v3-certified e-waste Recycling Company for your ITAD

Data center decommissioning is the process of closing down and dismantling a data center, which includes the removal of IT assets from the data center and the subsequent media sanitization, disposal, and recycling of those assets. ITAD is a broader term that is an acronym for IT Asset Disposition, which describes the  last phase of the IT Asset Management cycle in which IT Assets are securely and responsibly disposed of. Data center decommissioning is more specialized and should be handled by companies experienced with the unique challenges and requirements of decommissioning large-scale data center environments which may include electrical and HVAC systems.

FAQ’s about IT Asset Disposition (ITAD) with Securis

Securis has proudly been in business since 2020.  You can learn more about our Company History here. 

Our Standard data destruction methods include:

  • Software-based data wiping employs software to purge a data-bearing device to NIST 800-88 standards.  Wiping is the most sustainable option, as equipment can be safely reused or donated while ensuring data has been irretrievably destroyed.
  • Degaussing is a powerful demagnetization process (for magnetic media) that is a proven method for removing data from magnetic storage hard drives and tapes.
  • Physical destruction (shredding or disintegration) involves physically destroying data-bearing devices.  The size of the shredded materials depends on the kind of device and the sensitivity of the media contained in the device. The most sensitive information and the smallest devices, such as Solid-state drives (SSDs), flash drives, smartphones, SIM cards, memory cards, and micro SD cards, will be shredded using a disintegrator capable of shredding these items to 2mm pulp. 
  • Smelting is an option but only sometimes used.

Yes, Securis provides Certificates of Destruction (CoD) for all destroyed assets as evidence that your IT assets have been securely and permanently destroyed to NIST 800-88 standards. Our certificates detail the destruction of your assets and are available online in our Client Portal 24/7.

Yes, we capture serial numbers for all assets (if available) and provide detailed reporting.  The average inventory accuracy rate in the ITAD industry is just 85% due to challenges such as damaged or missing asset tags, difficulty scanning large quantities of assets, and the appearance of multiple barcodes on electronic assets. At Securis, our thorough triple-checking process and use of AI uncover data-bearing devices that customers miss.  Our inventory documentation reflects our commitment to accuracy throughout the ITAD process and promises a leak-proof chain of custody for every asset.  After project completion, your inventory documentation will be available online via our Client Portal so that you will be audit-ready at any time.

Yes, Securis employs several products on the National Security Agency (NSA) evaluated products list. The (NSA) has established stringent standards for data destruction to protect classified information. These standards typically involve physical destruction methods, such as disintegration, incineration, or pulverization, to ensure that sensitive data cannot be recovered. The NSA issues a list of evaluated products that meet NSA specifications as well as an FAQ page that answers questions about media destruction. 

Yes, Securis always follows NIST 800-88 standards when deciding which data destruction methods would be most appropriate for a client.  NIST 800-88 is a guideline published by the National Institute of Standards and Technology that outlines best practices for media sanitization. It provides recommendations for the most appropriate method for securely erasing data from various storage devices to prevent unauthorized access to sensitive information. The guidelines categorize data based on sensitivity, which helps determine the appropriate sanitization method. Highly sensitive information, such as classified or confidential data, requires more stringent sanitization than less sensitive data. The guidelines categorize media sanitization into three levels: Clear, Purge, and Destroy. Each level corresponds to different methods and levels of assurance in data sanitization. For a deeper dive into NIST 800-88, please read our blog NIST 800-88: Secure Data Destruction Standards for Media Sanitization.

Securis uses NAID AAA-certified mobile trucks to extend service across the United States. Our physical locations are in Northern Virginia, Norfolk, Virginia, Central Carolina, Provo, UT and Richmond, Virginia

Securis’ industrial shredding services are the foundation of our secure and certified data destruction processes. Our proprietary trucks allow us to safely destroy traditional hard drives (HDD) and smaller items such as  Solid State Drives (SSD), flash drives, smartphone SIM and memory cards, and micro SD cards on-site at the customer’s location or securely in our access-controlled facilities. Depending on the destruction standards that need to be met, we can offer traditional shredding as well as a disintegration option that goes beyond traditional shredding and pulverizes devices into 2mm e-crumbs as recommended by the NSA, rendering all data completely illegible.

Yes, Securis is R2v3 certified and dedicated to green recycling practices for each piece of equipment – whether intact, refurbished, or broken down for scrap to ensure harmful chemicals do not end up in landfills. Even our downstream vendors must follow strict standards to prevent environmental harm. Global stewardship and a commitment to serving others are at the core of Securis’ beliefs. As an electronic recycler, refurbisher, re-integrator, and data destruction firm, Securis’ mission is to provide environmentally sound solutions for the secure, effective management and removal of any organization’s end-of-life electronic assets while providing the most secure IT data destruction services in the industry. Securis’ commitment to improving the environment expresses our guiding principles and demonstrates our “think globally and act locally” sensibilities.  Please read our blog to learn why you should choose an R2v3-certified e-waste Recycling Company for your ITAD. 

There’s no need to completely write off the value of IT equipment in today’s environment. Along with secure data destruction, IT asset value recovery should be a consideration when decommissioning a data center or business environment. Securis technicians have over 20 years of experience identifying value in retired IT assets. This leads to a quick, efficient, and maximally profitable liquidation process, helping you maximize your assets’ residual value and offset the decommissioning process’s costs.

Our specialized mobile truck is equipped with machines that allow us to provide quiet, speedy, and secure software-based wiping, degaussing,  hard drive shredding, and Data Disintegration services wherever you are, allowing us to serve clients nationally. Performing on-site electronic media shredding at the client’s location enables their personnel to witness the process, thus maintaining the highest level of security.  Our mobile trucks are NAID AAA Certified, so you can be sure that your ITAD projects will meet the strict information disposal standards established by the National Association of Information Destruction (NAID).

Yes, we do.  If you do not have enough equipment to warrant a site visit or need a secure place to keep equipment until your service window arrives, Securis has a variety of Pelican Storm Cases that our clients can use to store or securely send equipment to Securis.  These cases are military tough and designed to be safe and secure in the harshest conditions.  Classified information can be transported via storm cases from USPS or courier as long as protocols are followed.  In this video, our Director of Operations, Sal Salvetti, explains how Securis clients use  Pelican storm cases.

Securis is NAID AAA certified for mobile operations and at our main facility in Northern Virginia.  An NAID AAA certification provides several important assurances about an ITAD (IT Asset Disposition) vendor.  NAID AAA-certified vendors must adhere to rigorous standards for secure data destruction, following strict protocols and employing robust security measures to safeguard confidential information during the entire ITAD process, including safe transportation, controlled facility access, and secure destruction methods. NAID AAA certification involves comprehensive auditing and compliance verification, as vendors must undergo scheduled and unannounced audits by trained, accredited security professionals to verify compliance with data protection laws and NAID standards. The certification process includes rigorous audits in 20 operational and security requirements areas. NAID auditors verify employee screening processes, validate employment and training records, and randomly test employees’ knowledge of data erasure policies. Auditors verify quality control logs and inspect security systems like CCTV and alarm logs. Vendors must have appropriate written policies and procedures in place for all aspects of data destruction.  NAID AAA certification signals that the vendor will keep sensitive information secure until it is properly destroyed, helping protect against data breaches.

Securis posts inventory reports and certificates of destruction on average 72 hours of project completion.  These reports and certificates are available to our clients 24/7 via our Client Portal.

Secure On-Site services begin at the client location. Securis‘ professionally trained and certified staff members scan, tag, and inventory all electronics slated for destruction or recycling to establish a chain of custody. Once inventory is complete, media sanitization begins.  This often takes place onsite at our clients’ offices but can also occur at the Securis facilities, depending on the particulars of the agreement.  Securis performs wiping, degaussing, shredding, and disintegration services during sanitization using our NSA-approved equipment. Sanitized equipment is then loaded onto a Securis GPS-traceable truck and securely transported to one of Securis’ processing facilities, where a client-approved recycling plan is executed.  Inventory lists are updated with records of all processed items for audit and accountability purposes.  At the end of the process, a complete inventory list is provided to the client, as well as a Certificate of Destruction, a nationally recognized legal document of performance.

Securis has been an IT Asset disposition (ITAD) leader for over 24 years. Over that time, we have worked with some of the country’s largest data centers, healthcare facilities, government contractors and agencies, and financial institutions

Secure: Our vast experience with large IT Asset Disposition (ITAD) projects has helped us streamline the ITAD process to ensure we are using the most secure data destruction methods for your hard drive destruction and IT asset disposal needs. Our numerous certifications, including NAID AAA, ensure strict compliance with all Federal, state, and local data destruction standards.  

Accurate:   The average inventory accuracy rate in the ITAD industry is just 85%. At Securis, we achieve greater than 99% accuracy in our ITAD processes. Our thorough triple-checking process uncovers data-bearing devices that customers miss.  Our inventory documentation reflects our commitment to accuracy throughout the ITAD process and promises a leak-proof chain of custody for every asset.  Learn more about Why Inventory Matters in Electronics Recycling and Data Destruction Policy.

Sustainable: We are R2v3 certified and dedicated to green recycling practices for each piece of equipment – whether intact, refurbished, or broken down for scrap. Even our downstream vendors must follow strict standards to prevent environmental harm. To learn why you should choose an R2v3-certified e-waste Recycling Company for your ITAD, please read our blog on that subject. 

Our North Virginia facility and mobile operations are NAID AAA-certified, ensuring that security protocols are strictly followed. Our employees are pre-screened through background checks and fingerprinting. Each goes through rigorous and ongoing training and is drug tested.

Yes, our trucks are GPS-monitored and driven by screened employees, including through background checks, fingerprinting, and drug testing.  

The most environmentally friendly way to recycle computers is to sanitize the data using a NIST 800-88 purge. To purge the data, customers should leave the drives in the computer. If a customer requires the drives to be shredded, the customer can remove them, or Securis technicians can remove them. We charge an additional fee to remove drives from computers or caddies.

We require that servers and network equipment be powered off and can remove servers from racks for an additional fee.

We can recycle Lithium Ion batteries and uninterruptable power supplies (UPS).

Our schedule is usually booked out two or more weeks in advance. While it is best to contact us 3-4 weeks ahead of time, we may be able to schedule sooner if you are flexible on the date and time.

Networking gear will be returned to factory settings unless the customer requests the data-bearing devices be shredded. Our best practice is to destroy data-bearing devices in firewalls. If we can not return switches to the factory setting for any reason, we destroy data-bearing devices before recycling them as a requirement of our certifications. Clients are welcome to witness the entire process if they wish.

Yes.  Some customers request that we match drive serial numbers to servers before shredding and we can do this for an additional charge.   Our photo AI scanning service significantly increases the accuracy of hard drive scanning. Learn more about our AI scanning technology in this video. 

If you don’t have a complete inventory, one of our account representatives may be able to visit your site before scheduling your job. If that is not possible, pictures can help estimate quantities. Securis will do its best to assist you with estimating your inventory and charge for the number of recycled items.

Unlike single-use plastics, electronics can be recycled in an environmentally friendly way without breaking the bank. This is because some equipment can be re-sold after proper data sanitization, which offsets some of the high labor and machinery costs associated with older equipment that is disassembled and scrapped.

We don’t shred paper, only hard drives and electronics. We have referred companies to www.trueshred.com and received positive feedback.

Securis is not a minority-owned company, but we can make referrals to several minority-owned partner companies.   Securis has a program that employs people with intellectual disabilities, which many companies report on as part of supplier diversity, ESG, and DEIB initiatives

SECURIS FACILITY SECURITY 

Secure Access Controls
Escorts for Visitors
Dedicated areas for data destruction