eTronic-eWaste | Our Process
12418
page-template-default,page,page-id-12418,ajax_fade,page_not_loaded,smooth_scroll,,wpb-js-composer js-comp-ver-4.12,vc_responsive

OUR PROCESS

Depending on the age, condition, and overall value, we will try to maximize your return with these available options for asset disposition.

 

qode

Customer Site Process

Data security starts at pickup location. eTronic eWaste utilizes its own GPS-tracking secured vehicles and a professionally trained team. For area pickups, eTronic eWaste will provide background–checked employees to package and coordinate shipping with approved national freight carriers.

  • On Site Arrival
  • Perform Asset Count
  • Separate Data Destruction Media (Separate Pallet)
  • Pack Assets on Request Order
  • Shrink Wrap an Palletize assets
  • Perform total final pallet count
  • Execute a Bill of Lading with piece count
  • Load, secure truck and transport to one of eTronic eWaste secure facilities

 

eTronic eWaste, LLC Site Process

This  process  begins  once    the  assets  arrive  at  a  secure  eTronic eWaste   facility.  It includes the serialized    asset    tracking    throughout the auditing and testing   process.

  • Truck arrives at one of our eTronic eWaste facilities
  • Pallets are unloaded and an asset count will be assessed
  • Data Destruction media moves to secure data erase cage
  • Audit & Test Hardware
  • Provide Full asset audit report
  • Perform total final pallet count
  • Refurbish/Re-market Re–usable assets
  • We provide on-line tracking and status accessibility

.

Data Security Process

At eTronic eWaste, LLC Site: This is a specific process for destroying all data and media devices. Our process utilizes a seven pass pseudo random number overwrites process in accordance with DoD 5220.22-¬M regulations and in clouds physical destruction if any drive has failed within such mitigation process.

 

In addition to securing your assets all of our locations are fully designed with advance security protocols, including:

  • Walk-through metal detectors
  • Strict control of visitor access
  • CCTV systems
  • Central security alarm systems, and  fire control methods

.