Frequently Asked Questions

TechR2 Sales can meet you and complete the Risk Assessment one on one or we can send you the Risk Assessment to fill out and send to us to place in the application. It takes about 2 hours. Your confidential results will be sent to you along with an action plan to address data security issues.

Confidential action plans are sent to you in 24 hours from the time the risk assessment is completed.

Again, if you have loose data, this should be processed today or by tomorrow the latest. Losing a hard drive or data tape constitutes a breach if the device has 250 records on it. We can schedule an immediate clean-out.

TechR2 has ISO 27001 for information security, ISO 20243 for Open Trusted Technology Providers, ISO 9001 for Quality Management System and processes, ISO 14001 for environmental control and recycling, ISO 45001 for Health and Safety. TechR2 is NIST compliant to 800-53R5 and 800-171R2. TechR2 is a registered minority owned and woman owned corporation.

TechR2 follows your implementation plan which typically has Tear-A-Byte® Appliances installed in 2 weeks at all the company’s datacenters. We follow your implementation plan until the entire enterprise is covered.

Each company has access to their TechR2 Customer Portal cloud-based data. Audit reports show all the records for the destroyed data bearing devices. Green reports show how much e-waste was processed.

Managers on the Customer Portal can add new users. They can also de-activate user accounts.

The TechR2 cloud-based Customer Portal also has the Certificate of Destruction with each audit report.

TechR2 cloud-based Customer Portal has a Project page and you can see each Tear-A-Byte® Appliance and the number of devices located in it. TechR2 also monitors the Tear-A-Byte® Appliances for you.

TechR2 sends two certified System Engineers to your site and performs data destruction within the four walls of your facility which meets all local, state, federal and global requirements that demonstrate control of data.

The organization’s NIST or Breach insurance requirements would determine that once the data leaves your control, in essence there is a potential breach already. A NIST required Certificate of Destruction requires you to destroy the data while it is under your control.

General Data Protection Regulation known as GDPR goes into effect on May 24, 2018. It is the most pro-active data security regulation in our lifetime. Fines amount from $20 million Euros for a small infraction to 4% of your company’s annual income. In 2023, the EU was collecting over 4B Euros a month in cybersecurity fines.

Controllers (like large companies) and Processors (the third-party data holders) are required to update their data security solutions to protect European Union (EU) citizen’s data. Projected fines worldwide are expected to be in the billions of euros.

Starting in 2024, the SEC requires a report that a public company has had a data breach within 96 hours. Presently, companies not using electronic methods are being fined millions of dollars for late reports. TechR2 Tear-A-Byte® is a solution that tracks your failed and decommissioned hard drives to prevent data loss.

Company’s Risk and Compliance officers are the most interested parties for securing loose media devices. CISO and CIO are being held responsible for the organization’s data security processes.

It is the top patented data destruction solution in the industry. With its four layers of data security, it is often referred to as the gold standard in data eradication.

The TechR2 24U Tear-A-Byte® Appliance holds approximately 400 – 3.5 hard drives. Excellent for the datacenter.

The TechR2 10U Tear-A-Byte® Appliance holds approximately 50 – 3.5 hard drives. Made for installing inside the customer’s rack at a co-location datacenter.

Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience 

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation