ITAD

Source Authority’s ITAD services can help you extract maximum value from your assets, which can help bolster your IT budget.

 

Source Authority’s national ITAD practice is automated and easy to use. When we take possession of your equipment, securing your data is our number one priority. Our secure data destruction meets Department of Defense (DoD) standards and we provide you with a certificate of destruction (CoD).

All assets that we process for your organization can be tracked and verified. You have full visibility into all your assets and you can see that they are disposed of or resold. Our service is R2 certified and we guarantee that none of your equipment will enter a landfill.

Our ITAD Areas of Focus

CERTIFIED DATA DESTRUCTION

Every organization stores sensative information on their devices. We ensure that your data never falls in the wrong hands with our data data destruction that meets DoD standards. For added security, hard drive shredding is available.

L

ASSET COLLECTION AND PROCESSING

Source Authority will tailor the ITAD solution to suit your needs. We will work with your team to coordinate logistics, inventory equipment, provide packaging and provide detailed reporting on how your assets are resold, repurposed or recycled.

L

EXTRACT MAXIMUM VALUE

Your organization has made a significant investment in technology. That equipment still has value even when your company no longer needs it. Source Authority will help you extract the maximum value from your investment.

L

Provide additional value-added services to your customers and increase stickiness with Source Authority Services’ Buyback and IT Asset Disposition (ITAD) program. ITAD services are focused on increased data security and ensuring all data is handled responsibly and destroyed appropriately. The Buyback Program enables you to capture value from old hardware you are replacing and provide additional value back to your customers.

We’ve designed this program to help you:
  • Receive funds for eligible hardware you no longer have a use for.
  • Add more margin to your new equipment deals.
  • Gain a competitive advantage when selling new equipment that is displacing old equipment.
  • Optimize the two-to-three-year resale window on most hardware.
  • Provide clients a value-add service for equipment that is taking up space or no longer needed.
  • Have minimal involvement in the buyback and ITAD process.
The Buyback and ITAD program provides:
  • Onsite technicians to collect, palletize, and ship hardware.
  • Logistics services to pick up and transport pre-palletized equipment to a processing facility.
  • Onsite technicians or offsite services to perform data erasure, degaussing, or physical destruction to devices needing data destruction.
  • Guaranteed data security and compliance – DOD, HIPAA, SOX, GLBA, FACTA, and NIST Compliant • Nationwide secure electronics collection, transport, destruction, data eradiation, and reporting.
  • Global onsite data eradication services for all data bearing devices, which includes data liability and
    breach insurance and electronic waste recycling where needed.
  • Global reach into over 140 countries.

ITAD Recycling

Provide additional value-added services to your customers and increase stickiness with Source Authority Services’ Buyback and IT Asset Disposition (ITAD) program. ITAD services are focused on increased data security and ensuring all data is handled responsibly and destroyed appropriately. The Buyback Program enables you to capture value from old hardware you are replacing and provide additional value back to your customers.

ITAD FAQ

What is IT Asset Disposition (ITAD)?

ITAD is the practice of securely reusing, repairing, recycling or disposing of unwanted IT equipment.

What are the benefits of ITAD?
  • Remove old equipment from your existing space
  • Safe, secure and environmentally-friendly
  • Reduce the amount of IT equipment in landfills
  • Repurpose parts and equipment for future use
What security protocols do you take?

We follow strict DoD and NIST compliance standards to ensure data confidentiality and integrity when reusing or recycling retired IT equipment.