Knowledge Center

May 23 , 2017 | Posted by TechR2 Media |

TechR2 utilizes proprietary asset management Customer Portal software

TechR2 had developed and fully utilizes proprietary asset management software through which clients have unlimited access. Among other things, customers have access to: Customer reports – including device tracking along with audit and reconciliation reports Green reports – the client’s carbon footprint report to confirm R2 responsible recycling Certificates of Destruction – to confirm compliance with applicable regulations and industry [...]
April 25 , 2017 | Posted by TechR2 Media |

A Patented Process to Fully Protect Our Business Partners

TechR2 is the only company in the industry that has been awarded a patent (U.S. Patent 9,430,654) for its comprehensive Track-Contain-Destroy process. TechR2’s patent recognizes the unique process that TechR2 has developed to fully protect its business partners from data breaches that might otherwise result from mismanaged loose data-bearing devices. TechR2’s patented process is unmatched in the industry and, more [...]
May 24 , 2016 | Posted by Sepp Rajaie |

What You Might Have Missed: RFID Journal LIVE

On May 4, 2016, Charles Robbins, Director of Research and Development for TechR2, lead a presentation at the RFID Journal LIVE conference in Orlando, Florida  and discussed the  Tear-A-Byte® solution, which utilizes  RFID technologies. Aside from  giving a demonstration of the Tear-A-Byte® process’ ability to TRACK data-bearing devices, securely CONTAIN them and then use a certified, patent-pending and responsible method

Read more

May 24 , 2016 | Posted by Sepp Rajaie |

Efficient Tear-A-Byte® Method Saves Money

…and is a Cleaner Solution for Data Eradication All processes in a data center and within the enterprise have direct and indirect costs. Managers know what the direct costs are because they are budgeted and invoiced regularly. The indirect expenses spring up when a process is not completed correctly. Most business professionals know that it is rare for everything in

Read more

May 24 , 2016 | Posted by Sepp Rajaie |

New TechBox Elite for Enterprise

New TechBox Elite for Enterprise Have you ever processed an executive’s old laptop or tablet and need to secure it from theft or harm? Did you ever need a secure, protected area in the office that is large enough to hold computers? Wouldn’t it be convenient to place an old computer in a secure container and then wheel it away

Read more

April 27 , 2016 | Posted by TechR2 Media |

International Certifications: TechR2 Client Reach Demands

Why does Columbus, Ohio based TechR2 (leading data eradication company) have so many expensive, difficult to earn, difficult to maintain, globally respected certifications? Why are standards critical to controlling data eradication processes? Why should e-waste not use destruction technologies meant for paper? When building anything, it is important to create a solid foundation to assure customers that quality, security, safety [...]
October 20 , 2015 | Posted by TechR2 Media |

Data Destruction Myths

An IT Manager was heard to say recently "the hard drive is inoperable so let’s just send it to offsite recycling". Another data center manager chimes in and adds, they "beat their units up with hammers and send them to the recycler". A R2 recycling manager smiled and said "the last time I was at the recycler’s facility, I saw [...]