Tip Sheet ITAD

6 ITAD Tips Too Important to Ignore

Selecting a new IT asset disposition (ITAD) vendor can be daunting. No vendor will align perfectly to a single client. A successful ITAD program is built upon a proactive and informed client working with a competent vendor. If accomplished, clients will have confidence in knowing their IT and electronic devices are processed in a secure and environmentally responsible manner. To ensure a seamless and favorable transaction, it is recommended to evaluate your ITAD program with the following considerations:

1. Maintain a complete and accurate list of IT assets.

Many clients use their IT asset management software or their ERP inventory system to generate an initial list of assets in need of retirement. This becomes the master list used in their ITAD program. IT assets not on the network are not detected by the software. Unless this list is validated with a complete physical inventory and cross-checked thoroughly for inconsistencies, errors are introduced before the ITAD process begins. Without validation, it is almost impossible to fully reconcile asset tracking through final disposition.

2. Prioritize vendor selection.

Years ago, formalized selection processes for disposal of IT assets were rare and vendor vetting was mostly non-existent. Few questions were asked and most companies were satisfied with any service with the ability to quickly haul away their retired IT equipment. Gartner, a leading IT market research firm, released their “Market Guide for IT Asset Disposition” report in 2016. Since then, we have seen ITAD vendor selection processes mature.

Most large organizations today issue a detailed RFP to evaluate ITAD vendor capabilities and strengths.RFP data generally includes information regarding compliance, data security, sustainability and value recovery. It is recommended to not focus on only one capability because you could consequently compromise another. As an example, prioritizing value recovery can compromise data security, compliance and sustainability goals.

Compliance

Over the years final disposition of IT assets and digital data has taken on new significance to Corporate Officers, Risk Managers and compliance teams within organizations. IT assets inherently contain hazardous materials and ensuring all is responsibly managed and disposed of is critical to a successful ITAD program.

Industry standards, such as the Responsible Recycling (R2) and WEEELABEX standards, provide baseline assurance in the evaluation process. In recent years, there has been added interest in how the manufacture and disposal of electronics impacts a circular economy evaluation.

Data security requirements for disposing of IT and electronic devices have continued to develop since the United States created regulations such as HIPAA, GLBA, FACTA and PIPEDA forcing industries to think about controls, accountability, processes and security. The EU’s General Data Protection Regulation (GDPR) is one of the latest to make an impact on increasing regulatory requirements for international businesses.

As a result, most Corporate Risk Managers today require a defined plan outlining how data will be systematically destroyed with an audit trail. Audit trails show disposition routes, mass balance reporting, and certificates of data destruction and responsible recycling.

Data Security

A single instance of compromised data can be devastating for a company. Ensuring security of all data bearing assets is important. While no studies exist on the percentage of companies that allow data-bearing IT assets to leave their premises, Sims Lifecycle Services (SLS) estimates about 65 percent of clients require data destruction while assets are still in their custody. This percentage has increased significantly in the last three years.

“Partnering with a vendor who can support all of the organization’s needs in a streamlined manner can impact efficiency.

The increase in attention to on-site data destruction services comes as no surprise. It is one of the highest levels of security services on the market. Aside from on-site destruction services and security certifications, it is helpful to understand a company’s security management structure. Internal communications, certifications, trainings, assessments, and continuous site analysis will provide more of an indication of the level of attention a vendor is giving to data security on a daily basis.

Sustainability

As more companies incorporate circular and carbon reduction processes into their business models, IT asset lifecycle will feature as part of the journey. Your ITAD vendor should be able to help you conscientiously reduce waste, reclaim raw materials for remanufacturing, increase reuse levels and incorporate considerations for the entire lifecycle of a product into the design process.

Industry experts suggests companies who will thrive in the future will be those that partner effectively with the entire circular supply chain to optimize collections, efficiently process material and find sustainable homes for the recovered commodities. Working with a single provider can reduce logistics, and is often more carbon efficient than multiple suppliers due to having a large global network.

Partnering with the right ITAD vendor can also help companies with the increasing need to report corporate sustainability. Innovative vendors provide details of carbon avoided by reusing and recycling IT assets, which contributes to your environmental and Scope 3 reporting.

Value Recovery

The cost of a secure and responsible ITAD program is seldom budgeted in advance which leads many companies to seek revenue-neutral options. If a company depreciates their assets on their books to zero they also will hold a value of zero, even though they may have value when resold on the secondary market. This in some cases can allow an ITAD program to be self-funding or net positive. In order to do this, consider the following:

3. Understand lag times.

Problems with irresponsible disposal of IT assets can surface long after an asset has been removed from a company’s live environment. This lag time can be the cause of major data and compliance threats.

Data stored in an uncontrolled environment is only accumulating risk. The lag time between when a company removes an asset from their live environment and when downstream violations are identified, can be problematic for regulatory compliance audits. When an IT asset is removed from your workplace for IT asset disposition or recycling, your company is still at risk if it is improperly managed. The links below document how irresponsible ITAD and recycling vendors have put corporate clients at risk.

February 22, 2023Former head of Wisconsin processor sentenced to prison

July 7, 2022Businesses incorrectly dispose of 234,000 tons of WEEE each year

April 12, 2019Recycling executive sentenced to 3 years in prison for scheming to landfill and re-sell potentially hazardous waste

January 31, 2019Stone Castle CEO sentenced to prison

December 6, 2018Former GES head receives prison sentence

November 29, 2018Total Reclaim owners enter guilty pleas

August 31, 2018 Counties and landlord battle over e-scrap liability

July 19, 2018Business owner charged with improper disposal of hazardous e-waste

February 9, 2017 Microsoft settles lawsuit with Arizona processor

4. Ensure legislative compliance and audit-ready reports.

Mistakes can be made as IT assets are moved, packaged or transported. This multi-step chain of custody introduces risks and vulnerabilities that need to be effectively managed. Ensure your chain of custody is clearly defined, documented, secure and as streamlined as possible.

If one stray hard drive turns up during an audit or shows up years later in an unexpected place, your company’s ability to demonstrate consistent processes and attention to detail will be jeopardized. This might also greatly affect liability assessments.

Demonstrability

For audit purposes, it is critical to have defined processes to demonstrate discipline, due diligence and best practices in how IT assets are handled and data destroyed. Documentation (i.e. inventory audit trail, certificates of data destruction and financial settlement) provides proof that processes were followed and data was responsibly destroyed.

Statement of Work

When onboarding a new vendor, a written statement of work (SOW) often details how equipment is processed. This can be an important part of any corporate audit, as it demonstrates the use of a vendor who operates in a systematic and repeatable manner.

A vendor should be committed to ensuring a seamless service transition by making your onboarding experience a positive one. Particularly when managing multiple entities across the globe, vendors should be able to demonstrate their tried and tested onboarding process which might include an understanding of:

Transparency

Once your processes are defined and documented, ensure accountability of the process and have an understanding of how you will manage it. Find a vendor who offers full transparency. A web portal option can be used to search for any asset at any time, and view an item’s status. If assets have been processed, a quick search using an identification number (i.e. serial number or asset tag) should provide details on the service, location and certificates if needed.

5. Maintain full accountability and make it integrated.

Final retirement of technology assets involves several departments within an organization, each with unique requirements. Partnering with a vendor who can support all of the organization’s needs in a streamlined manner can impact efficiency. Department requests might include:

An ITAD partner with broad capabilities can reduce administrative overhead, simplify vendor relations, assist in hitting environmental targets, maximize value recovery and improve overall accountability. Vendor selection should consider immediate and future corporate requirements.

6. Create and implement a standardized program, then optimize.

For large companies many ITAD programs were initiated as site-specific processes. Today national and global companies are eliminating these fragmented regional programs, and consolidating and standardizing to a single program managed holistically and consistently.

Most publicly-traded companies set and enforce requirements for the management and tracking of IT assets within their corporate environment. This discipline supports secure and documented destruction of digital data, and ensures IT assets are reconciled in accounting and IT records.

Change is never easy so you can expect resistance from local teams, however a competent vendor can take the lead and offer solutions that deliver tangible business value. The goal should not be to replicate individual programs with a single vendor.

It should be to reimagine how you are handling the assets, leverage efficiency gains and improve your solutions, responsibly and efficiently. Benefits of a competent single vendor to manage a national or global program will typically include:

Working with a strong IT asset disposition program can help your company ensure data security, brand protection and maximum IT value recovery

Contact Us

Contact us today to start building a compliant global program.

Send Us a Message