614-322-2222 or 877-770-8324

IT Cleanout Services. We locate, contain, track & destroy vulnerable loose media

IT Cleanout Services.
We locate, contain, track & destroy vulnerable loose media

Compliance for IT Cleanout

  • During a Tear-A-Byte® Risk Assessment, we locate loose media in the Datacenter, Enterprise Office, and, if necessary, in Co-Location sites. These loose data-bearing devices are immediately locked down and a Cleanout is scheduled
  • Non-Secure Assets are discovered during the assessment
  • Non-Secure Assets are contained, tracked, and destroyed
  • Management has real time reports and notifications that the clean out was completed to information security regulations

Why is TechR2 Certified?

  • Immediate access to data: Only Technicians for ISO 27001 or SOC compliant companies are permitted to immediately access critical data within a data-bearing device
  • Compliance auditors first assess data security – procedures and training. TechR2 is respected in the ITAD industry
  • Large OEM’s and government Agencies require the highest level of scrutiny when processing data
  • Certified IBM and Dell Service Provider

ISO 27001 Certification

“A model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.”

TechR2 Secure Transport Solution

  • Onsite audit of equipment and data-bearing devices into our Customer Portal
  • Reconciles equipment and data-bearing devices to the customer list
  • Data-bearing devices are sanitized and verified to NIST SP 800-88 R1 requirements per NIST SP 800-53 CSF
  • Securely contained and sent to an ISO 14001 recycler
  • Certificate of Destruction is issued on the same day
  • Online Customer Portal and Green Reports available 24/7

Products and Services Compliance

  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • HITECH
  • Sarbanes-Oxley Act
  • Fair Trade and Credit Transaction Act
  • GRAMM-Leach-Bliley Act
  • Payment Card Industry (PCI)
  • Meets the NIST 800-88 federal guidelines for media sanitization

TechR2 Products and Services

  • Patented Tear-A-Byte® solution for tracking, containing and destroying data-bearing devices
  • Data eradication services that are NSA compliant and environmentally friendly
  • Wiping Services using DoD 5220-22.M three (3) pass overwrite plus a fourth pass for verification
  • Secure Transport Services
  • Passive RFID IT Asset Tracking solution
  • Active Beacon IT Asset Tracking solution
  • IT Asset Retirement using the secure techBOX™ solution
  • Custom Hardware and Software solutions

Data Security Services

  • Data Security Risk Assessments
  • Datacenter and Enterprise
  • Data Security Training for your team
  • IT Asset Retirement Planning
  • Certificate of Destruction and reports comply with the NIST SP800- 88 R1 guidelines
  • Quarterly Checkups with quantitative summary and scorecard for each audit
  • Green Reports to show proper e-waste disposal

To get in touch with a friendly & experienced TechR2 Staff Member:

Call 614-322-2222

or use the form provided.

REQUEST INFORMATION

Request Information