ITAD

How To Sell Your Used I.T. Equipment

0 Comments

Knowing the right steps to take when looking to sell IT equipment is an essential part of ensuring you get the most return on your IT investment.

First things first, the more used equipment you have to sell, the more you will most likely get in return. When selling used IT equipment, BULK IS KING!

These are the 5 steps to successfully sell your used IT equipment.

  1. Make a spreadsheet of the used IT equipment you want to sell

Spreadsheets are helpful when selling bulk IT equipment. We have included some common categories to include for all of your parts as well as the types of equipment that is usually sold.

Common information to include in your spreadsheet:

  • Always include your contact info
  • Age of equipment
  • Condition the equipment is currently in
  • Packaging (if you have original packaging)
  • Model(s)
  • Size (when applicable)
  • Quantities
  • Brand
  • Model or Serial numbers
  • Type (when applicable)

 

Types of equipment we frequently purchase and what to include when trying to sell them.

 Sell Used Servers:

  • System Model #s
  • Hard Drive or SSD part numbers and quantities
  • CPU part numbers or model numbers
  • RAM part numbers
  • Purchase Dates

 

Sell Used Storage:

  • Systems
  • System Model #
  • Disk Array Enclosure Model #
  • Setup: Unified or Block?
  • Drives
  • Physical Disk Inventory Report
  • OR List of Hard Drives by Part #

 

Sell Used Networking Gear:

  • System Model #s
  • Condition
  • Purchase Dates
  • Pictures if available

 

Sell Used Hard Drives:

  • Hard Drive Model Numbers
  • HD Densities
  • Connectors
  • Spindle Speeds
  • Condition

 

Sell Used CPUs:

  • Processor Model Number(s)
  • Quantity
  • Condition

 

Sell Used Memory:

  • OEM Part Number
  • Mfg Part Number
  • Quantity
  • Condition

 

  1. Take Pictures of the IT equipment you want to sell

This will help show the purchaser what condition the equipment is in. Also, pictures of the product numbers can help verify exactly what the equipment is, ensuring a more accurate valuation and quote.

Your pictures don’t need to be Wired Magazine quality, as long as it is clear enough to read.

Here is great example:

3. Choose an ITAD Vendor

When looking into an ITAD partner to work with, we urge you to consider the following:

  • How much do they charge?
  • What are their data erasure policies and procedures?
  • Do they have references readily available?

You should trust that the ITAD company you choose has your best interests in mind, as they should be helping you to get the most value out of your equipment so they can as well.

Learn more about choosing the ITAD partner that’s right for you

4. Ship your Used IT Equipment

It is always best to use the original packaging when you can. Shipping is an important part of the process, and shipping costs should always be discussed early on. If possible, look for an ITAD vendor that covers the cost of shipping or provides on-site services.

5. Get paid for your used IT equipment!

By this point you should be well on your way to getting paid for your old IT equipment. The ITAD vendor you work with, should have given you an accurate value on your equipment. But you’re probably wondering how long it will take until you get paid. That depends on the ITAD vendor you chose as they all have different payment policies. Some even offer a credit towards upgrading your old equipment, if that’s what your looking to do.

If you want help to sell IT equipment, start by submitting your list of equipment here!

Is ITAD a Weak Link in Data Security?

0 Comments

Is ITAD a Weak Link in Data Security?

Let’s face it, the amount of data currently being created on a day to day basis isn’t slowing down anytime in the near future.

With the increase in data comes newer, faster equipment with even more vast amounts of storage capacity.

Not only does that create a problem of what to do with the old assets, but more importantly how to keep them secure in the process.

A recent report from Experian revealed that nearly thirty percent of organizations don’t have plans in place to deal with data security threats.

You heard that right. According to their research that’s almost one third of businesses!

With cyber security threats from ransomware attacks to hard drives being sold online that still contain left behind data, how can any business not comprehend the risk that poorly managed data creates?

In more recent times, we’ve seen cyber security being prioritized as an area of great investment; especially with a majority of new businesses and startups in the data hosting sector.  

But ponder for a moment the amount of retired IT assets that end up in piles of scrap as new products are released on a continuous basis.

Whether it be an entire machine, such as laptops, desktops, and networking switches or individual components like SSDs, HDDs, memory, or tape cartridges, any small to mid-sized business produces a significant amount of physical data assets that need to be securely destroyed on a regular basis.

Unfortunately, end of life asset management and the secure destruction of data assets is often unnoticed.

An insufficient amount of businesses can guarantee or show proof that every measure possible was taken to prevent a data breach. 

Too few organizations can confidently state that all sensitive data was destroyed in a secure, accountable and socially responsible way.

When the General Data Protection Regulations (GDPR) came into legislature in May 2018, businesses began facing potential financial penalties if they didn’t comply with the data destruction guidelines.

 

data center energy efficiency

An organization that deal with or governs sensitive data should have an obligation to teach their staff about GDPR requirements and responsibilities. 

In order to stay ahead of the curve, businesses should also be making an effort to transform employee habbits when it comes to data asset destruction.

However, this can be a costly and timely process. Processes and policies in regards to asset and data disposition need to be communicated clearly to staff, resulting in the gradual education and behavioral change.

The decisions any organization has to make when choosing on an ITAD vendor are going depend on the size of the company and its equipment inventory.

Nevertheless, a business can adopt its own plan and strategy to fit its individual ITAD requirements, but the most important thing that must remain is taking an active part in the security of critical data.

Trusting the help of a reputable ITAD vendor makes a huge difference. There are countless security measures that a business may not think to take into account. 

A professional ITAD company will to ensure your data is properly secure from start to finish.

Since 1965, we’ve been in the business of helping organizations with all of their IT asset needs. 

With over 130 years combined industry experience, our equipment experts can assist in offloading old or retired hardware fast, easy, and even more importantly SECURELY.

When considering selling surplus IT equipment, visit one of our pages; We Buy Used IT EquipmentWe Buy Used MemoryWe Buy Used Hard Drives, We Buy Used Cisco, or We Buy Used Tape to get the highest market value and the greatest return on investment. 

Contact us today for a free quote and see why we’ve been trusted by businesses both large and small for over half a century.