Industry and Regulatory Compliance

Solutions you can trust

Get A Quote

Data Protection Regulation

We Buy Used IT Equipment follows best practices for maintaining compliance with regulatory standards for personal data protection. We offer a number of services that completely destroy data across a wide variety of devices including magnetic tape media, hard disk drives, and solid-state drives.

Secure Shipping Solutions

Every organization has unique security requirements with shipments ranging from a few boxes to full truck loads. We have a shipping solution for every scenario with many options to ensure all shipments meet your specific needs.

Learn More

Secure Chain-of-Custody

We offer over half century of experience, ensuring you peace-of-mind after your shipment has left your premises. From efficient pickups, thorough communication, a 24 hour secured facility, and a secure chain-of-custody throughout processing.

Learn More

Guidelines for Media Sanitation

Published in December 2014. The National Institute of Standards and Technology Special Publication 800-88 r1 Guidelines (NIST 800-88r1), are the most commonly cited guidelines used in the United States.

Read the Guidelines Here

We Buy Used IT Equipment follows procedures that are in strict compliance with guidelines for data destruction including:

  • Hard copy (paper) storage sanitization
  • Networking device sanitization
  • Mobile device sanitization
  • Equipment sanitization
  • Magnetic media sanitization
  • Peripherally attached storage sanitization
  • Optical media sanitization
  • Flash memory-based storage device sanitization
  • RAM and ROM based storage device sanitization
  • Cryptographic erase considerations

Staying Compliant in the Healthcare Industry

Learn how healthcare professionals can further protect their internet connected devices.

Read the blog

3 Levels of Data Destruction to Ensure Your Data is Safe

Level I  (reuse allowed)

  • Appropriate for individual or business. Data Destruction Certificate provided at no charge
  • Degauss allowable media types before testing and certification
  • Reformat and single pass format of functional servo storage media and hard drives. Non-functional media will be degaussed (de-magnetized) and recycled
  • This is a green, eco-friendly solution
Learn More

Level II  (reuse allowed)

  • Appropriate for business and individuals desiring a higher level of security. Data Destruction Certificate provided at no charge
  • Compliant for mid-range data sensitivity. Covers many regulatory compliance issues and un-classified data.
  • Degauss allowable media types before testing and certification
  • Reformat and multiple-pass format of functional servo storage media and hard drives. Non-functional media will be degaussed (de-magnetized) and recycled
  • Low level DoD compliant – 7 pass wipe
  • This is a green, eco-friendly solution
Learn More

Level III (not for reuse)

Full Data Eradication and Media Destruction and Disposal

  • Appropriate for  organizations interested in the ultimate data destruction solution
  • Compliant with all standards and regulations
  • Full degaussing and physical destruction of storage media and hard drives
  • This solution is not as eco-friendly as other solutions – some parts may be recycled – but some may end up in landfills
Learn More

Certificate of Data Destruction

We provide a data destruction certificate for every order.

Sample Certificate

Securing your organizations data with the following regulatory laws

  • Health Insurance Portability and Accountability Act (HIPAA)
  • Sarbanes-Oxley Act (SOX)
  • Gramm-Leach-Bliley Act (Financial Services Modernization Act)
  • USA Patriot Act (Bank Security Act)
  • Homeland Security Information Sharing Act (Federal agencies security information)
  • D.o.D. (Department of Defense) standards
  • National Security Agency (NSA)
  • National Institute of Standards and Technology (NIST) Special Publication Series 800-88
  • National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M)
  • Health Information Technology for Economic and Clinical Health (HITECH)
  • Fair and Accurate Credit Transactions Act (FACTA)
  • Identity Theft and Assumption Deterrence Act
  • FDA Security Regulations (21 C.F.R. part 11)
  • Payment Card Information Security Standard (PCI)