DATA THE CORE of every

Comprehensive Data Security in

IT Asset Disposition

page-image18 Data Security is the single most important aspect of any IT asset disposition program. Each PC, laptop, server, storage system, or mobile device retired poses a potential data security risk, presenting an opportunity for sensitive personal and corporate information to be compromised. Monetary fines and damage to brand equity can quickly mount, costing organizations millions of dollars. That's why risk-sensitive companies turn to JQ Reyccling to manage the proper retirment of IT Assets

The data an oranization collects and stores must be handled with the utmost care, both onnetwork and off network. In fact, once an IT asset is removed from the organization's network its data no longer resides within the protection of network or firewall security and is at higher risk for loss.

To protect our clients' brand reputation, JQ Reycling performs proven processes to protect data-bearing devices during the IT asset disposition process. We have assembled a team that includes experts from our quality, compliance, security, engineering, and operations team. We apply the most current sanitization methods available to ensure complete erasure of all data-bearing devices. And as a leader in the industry, JQ Recycling is constantly pursuing and implementing the latest sanitization technology available in order to provide the most comprehensive brand protection to our customers.

Data Erasure and Sanitization

All data erasure is done in strict accordance with NIST SP 800-88 standards at our certified facilities. Our data-erasue labs use the most technologically advanced equipment and processes in order to ensure that data-bearing equipment is properly sanitized and erased to the most stringent global standards.

To ensure the highest level of quality, all asset types are separated and erased according to their unique requirements. All assets are system audited for successful erasure, with random samples removed for further stand-alone compliance audits. If a device is nonfunctional or cannot be successfully sanitized, it will be destroyed to prevent any data exposure. Our data overwrite process is audited on a daily basis to ensure compliance and quality, and certificates of erasure and destruction are issued for your permanent records.

With reuse as our goal, we focus on retaining the residual value for all client devices. Once data is fully erased, devices may be remarketed through our robust global network. If remarketing is not an option, we ensure that drives are properly destroyed through our secure destruction process.

SSD - Solid-State Drives

SSDs can be successfully erased in order to promote reuse and provide customers with maximum residual value. These devices are erased in compliance with NIST 800-88 standards and backded by third-party forensic analysis.

Key benefits of SSD erasure:

  • Increased equipment value
  • Improved client satisfaction
  • Standardized solution for all JQ Recycling clients
  • Lab-verified data sanitization solution

Mobile Devices

Movile devices have a much shorter lifespan and require different data security processes than standard desktops and laptops require. JQ Recycling provides the most current sanitization methods available to ensure the erasure of data on mobile devices.

On-site IT Asset Disposition

For the highest level of data security, all our data destruction and erasure services can be performed on-site, at the customers' location.


When erasure of hard drives and data devices is not secure enough, JQ Recycling offers extreme data protection by destroying and shredding disk drives in accordance with strict requirements. All shredded particles are properly recycled. Hard-drive shredding usually occurs in highly regulated markets where optimal data security is a necessity. Drives designated for destruction are shredded into small particles, then properly recycled in an environmentally compliant manner. With your company's security and reputation at stake, take every measure possible to ensure that devices containing sensitive data are properly handled and data is thoroughly destroyed.

For more information, contact us.

Quote Form