How to Vet Your IT Asset Disposition (ITAD) Vendor’s Reuse Process

Posted by on March 7, 2017

As data volumes increase, with an estimated 40 zettabytes of data expected to be created by 2020, security threats continue to be significant when it comes to dealing with data stored in any type of electronic device1. While majority of the focus remains on cyber security threats, physical security threats are proving to be worth investing time in preventing as well. Many overlook security measures that should take place to ensure data protection during device disposition.

Additionally, with upgrades occurring prior to device obsolescence there are opportunities for reuse and remarketing of equipment. Because replaced devices are, at times, still in working condition, ITAD providers are able to offer more valuable revenue-share options. However, newer models do affect the resale value of previous versions so turnaround time is critical. This is most advantageous if the ITAD service is efficient and strategic with remarketing opportunities.
40 zettabytes of data is expected to be created by 2020. Click To Tweet

In most cases, it’s ideal to work with one vendor. However even if you’re comfortable with the service your vendor provides, it is smart to do your due diligence and understand their full scope of services offered, as if you were using separate companies for each service. In the long run it will prove worthy of your time.

Potential risks include the following:

  • Selling equipment with data that remains or is recoverable,
  • Poor tracking of assets (leaving question to the inventory of remaining assets), and/or
  • Pricing items inaccurately (foregoing potential returns).

Here are a few ways you can evaluate the credibility of a vendor’s reuse processes:

  1. Determine how items are resold.
  2. If a company uses an ecommerce platform, such as eBay or Amazon, review their profile(s) to understand their user ratings and become familiar with the inventory and buyers.
  3. See the process firsthand.
  4. If possible, go to their location and witness their operation in action. Do the employees appear to have strict standards and protocol? Are the services being conducted in a secure environment? Are items being handled carefully and are they cleaned prior to being packaged and resold? You can’t be 100 percent confident unless you see it for yourself.

Often knowing and understanding the infrastructure can provide a better eye for questionable processes.

Download our white paper to learn more about how you can strengthen your ITAD security in 2017.

————————————

Sources:

  1. http://www.datacenterjournal.com/countering-threat-physical-security-breaches/

Professional On-Site Data Destruction. At Your Service.

Categories