Manage your end-of-life IT assets securely and responsibly


Naarmate organisaties verder migreren naar nieuwe technologieën om te innoveren, aansturen op efficiëntie en nieuwe werkwijzen mogelijk maken, kunnen ze niet gewoon hun oude IT- en kantoorapparatuur in de prullenbak gooien. Beveiliging moet bovenaan de prioriteitenlijst blijven staan. Lees meer hierover in onze Secure ITAD brochure.

28 april 20176 min
Manage your end-of-life IT assets securely and responsibly
  • If you don’t follow a defined, responsible disposition process, you could be adding to the global e-waste problem.
  • If you aren’t partnering with a trusted supplier, you may not be getting the best residual income for your re-marketable assets.
  • If you don’t know how your IT assets are being disposed of, you can’t be confident that any remaining data is protected.
  • If you work with a supplier who doesn’t provide visibility of the end-to-end disposition process, you can’t be certain your equipment is being handled in a secure, compliant way.

Industry fact

The amount of E-Waste generated globally is increasing by two million tons a year and is predicted to reach 50 megatons by 2018.

United Nations University, 2015

Business Challenge

As organisations migrate to new technologies to innovate, drive efficiencies and enable new ways of working, they can’t simply throw their old IT and office equipment in the bin. Security must stay top of mind.

To meet government and organisational mandates on environmental protection, companies need to dispose of it responsibly — and be able to prove they’ve done so. Organisations also need to be sure that any data still held on those old assets won’t be compromised.

Not following defined processes for IT equipment disposal – or working with a supplier that doesn’t offer transparency across the disposition process – puts an organisation at risk of data breaches, regulatory penalties and a damaged brand reputation.

What If You Could...

  • Be confident your end-of-life equipment and assets are disposed of in a compliant, environmentally responsible manner?
  • Be sure that any remaining data is protected and deleted before asset disposition?
  • Track your equipment throughout the disposition process with a chain-of-custody audit trail, including certificates of data deletion and asset recycling and destruction?
  • Offset the costs of destruction and recycling by reclaiming residual competitive monetary value from equipment that can be remarketed?

What You Gain

  • A secure and structured IT asset disposition strategy that helps your organisation avoid adding to the global e-waste problem
  • Reduced risk of data being lost, stolen or compromised during asset disposition
  • Confidence that your end-of-life assets are handled in line with environmental protection regulations
  • Access to the residual value of any reusable equipment, to help offset the costs of destruction and recycling

Iron Mountain Secure IT Asset Disposition Service

Iron Mountain’s Secure IT Asset Disposition (Secure ITAD) service helps you destroy and recycle decommissioned and endof- life IT and office equipment in a secure, compliant and environmentally responsible way. It also helps you get the best market value for reusable assets.

Data deletion and asset destruction. We delete any remaining data from your media and hard drives using certified data erasure or degaussing methods. We then destroy the assets in a way that complies with mandates and regulations.

Asset remarketing. We’ll help you get the most competitive re-market pricing through our extensive reseller database.

Asset recycling. Assets which can’t be remarketed will be safely recycled in line with best practices, mandates and regulations.

Secure Transport

Our secure transport service protects your data and assets all the way from collection at your site through to arrival at the processing plant. It consists of:

  • Vehicles which are GPS tracked and secured with specially designed, proprietary locks and sensors that sound an alarm if they detect a lock malfunction
  • Drivers who are trained and screened, and carry RFID keyfobs that trigger an alarm if a vehicle is left unlocked

Chain Of Custody And Asset Tracking

To ensure a complete chain-of-custody audit trail from collection through to processing, we use Iron Mountain InControl™ scanning and tracking technologies. At any time, you can use the SecureSync® portal to track the movement of your assets, so you’ll always know their physical location and can be confident that your data is protected throughout the disposition process.

Environmental Responsibility

Iron Mountain is an ISO14001 company. This means we meet ISO 14001, the global environmental management system standard. So you can be confident that:

  • The recycling process is managed in an environmentally friendly way that helps minimise your organisation’s carbon footprint
  • Your IT asset disposition strategy is consistent with relevant mandates and regulations, including the EU WEEE Directive
  • Your e-waste won’t end up in landfill

Certificates And Reports

From the SecureSync® web portal you can download:

  • Certificates of data deletion
  • Certificates of asset recycling and destruction
  • Reports on compliance with environmental standards