614-322-2222 or 877-770-8324

IT Cleanout Services

IT Cleanout Services.
We locate, contain, track & destroy vulnerable loose media

Compliance for IT Cleanout

  • During a Tear-A-Byte® Risk Assessment, we locate loose media in the Datacenter, Enterprise Office, and, if necessary, in Co-Location sites. These loose data-bearing devices are immediately locked down and a Cleanout is scheduled
  • Non-Secure Assets are discovered during the assessment
  • Non-Secure Assets are contained, tracked, and destroyed
  • Management has real time reports and notifications that the clean out was completed to information security regulations

Why is TechR2 Certified?

  • Immediate access to data: Only Technicians for ISO 27001 or SOC compliant companies are permitted to immediately access critical data within a data-bearing device
  • Compliance auditors first assess data security – procedures and training. TechR2 is respected in the ITAD industry
  • Large OEM’s and government Agencies require the highest level of scrutiny when processing data

ISO 27001 Certification

“A model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.”

TechR2 Secure Transport Solution

  • Onsite audit of equipment and data-bearing devices into our Customer Portal
  • Reconciles equipment and data-bearing devices to the customer list
  • Data-bearing devices are sanitized and verified to NIST SP 800-88 R1 requirements per NIST SP 800-53 CSF
  • Securely contained and sent to an ISO 14001 recycler
  • Certificate of Destruction is issued on the same day
  • Online Customer Portal and Green Reports available 24/7

Products and Services Compliance

  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Sarbanes-Oxley Act
  • Fair Trade and Credit Transaction Act
  • GRAMM-Leach-Bliley Act
  • Payment Card Industry (PCI)
  • Meets the NIST 800-88 federal guidelines for media sanitization

TechR2 Products and Services

  • Patented Tear-A-Byte® solution for tracking, containing and destroying data-bearing devices
  • Data eradication services that are NSA compliant and environmentally friendly
  • Wiping Services using DoD 5220-22.M three (3) pass overwrite plus a fourth pass for verification
  • Secure Transport Services
  • Passive RFID IT Asset Tracking solution
  • Active Beacon IT Asset Tracking solution
  • IT Asset Retirement using the secure techBOX™ solution
  • Custom Hardware and Software solutions

Data Security Services

  • Data Security Risk Assessments
  • Datacenter and Enterprise
  • Data Security Training for your team
  • IT Asset Retirement Planning
  • Certificate of Destruction and reports comply with the NIST SP800- 88 R1 guidelines
  • Quarterly Checkups with quantitative summary and scorecard for each audit
  • Green Reports to show proper e-waste disposal

To get in touch with a friendly & experienced TechR2 Staff Member:

Call 614-322-2222

or use the form provided.