Transcript

As technology advances, your devices multiply—and older electronics and IT assets become obsolete.

You know you need to protect the confidential data on these devices, but how?

With a secure, eWaste and IT Asset Disposition service from Iron Mountain you can safely destroy, recycle or repurpose obsolete electronics and IT assets while staying compliant with regulations and privacy laws.

So how does it work?

First, we assign an electronic destruction specialist that will work with you to customize a service that meets your specific business needs.

IRM security expert: [We help our customers understand the value of their devices and find cost-effective ways to either destroy, recycle or resell them]

From there, simply schedule your service online and de-install your devices and IT assets

Once your devices are ready, they’ll be picked up by our local, uniformed driver before being sent to a processing plant for service. If your devices have value, we’ll remove all your data with an erasure process that is DOD compliant and follows NIST standards.

The materials are then refurbished and sold using a partner network that adheres to the same standards of security and certifications.

Obsolete devices are dismantled and sorted for destruction or recycling.

Consultant: [Because we’re an e-Stewards enterprise, we ensure that our process is compliant with regulations and environmental standards.]

Finally, you’ll receive a certificate of destruction providing auditable verification that your materials were safely destroyed, recycled or repurposed—ensuring that your devices and more importantly, your information are never compromised.

Simply put—at Iron Mountain we take care of your information as if it were our own.