We locate, track, contain, destroy, and verify loose data storage devices
Compliance for Clean Out Projects
Whether after a Tear-A-Byte® Risk Assessment or as a stand-alone project, we locate and document any End of Life loose media in the Datacenter, Enterprise Office, and, if necessary, in Co-Location sites. These loose data-bearing devices are immediately locked down and a Cleanout is scheduled
Non-Secure Assets are discovered during the project
Non-Secure Assets are contained, tracked, and destroyed
Management has real time reports and notifications that the clean out was completed to information security regulations
Why is TechR2 Certified?
Immediate access to data: Only Technicians for ISO 27001 or SOC compliant companies are permitted to immediately access critical data within a data-bearing device
Compliance auditors first assess data security – procedures and training. TechR2 is respected in the ITAD industry
Large OEM’s and government Agencies require the highest level of scrutiny when processing data
“A model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.”
TechR2 Secure Transport Solution
Onsite audit of equipment and data-bearing devices into our Customer Portal
Reconciles equipment and data-bearing devices to the customer list
Data-bearing devices are sanitized and verified to NIST SP 800-88 R1 requirements per NIST SP 800-53 CSF
Securely contained and sent to an ISO 14001 recycler
Certificate of Destruction is issued on the same day
Online Customer Portal and Green Reports available 24/7
Products and Services Compliance
General Data Protection Regulation (GDPR)
Health Insurance Portability and Accountability Act (HIPAA)
HITECH
Sarbanes-Oxley Act
Fair Trade and Credit Transaction Act
GRAMM-Leach-Bliley Act
Payment Card Industry (PCI)
Meets the NIST 800-88 federal guidelines for media sanitization
TechR2 Products and Services
Patented Tear-A-Byte® solution for tracking, containing, destroying, and verifying data-bearing devices
Data eradication services that are NSA compliant and environmentally friendly
Wiping Services using DoD 5220-22.M three (3) pass overwrite plus a fourth pass for verification
Secure Transport Services
Passive RFID IT Asset Tracking solution
Active Beacon IT Asset Tracking solution
IT Asset Retirement using the secure techBOX™ solution
Custom Hardware and Software solutions
Products and Services Compliance
Data Security Risk Assessments
Datacenter and Enterprise
Data Security Training for your team
IT Asset Retirement Planning
Certificate of Destruction and reports comply with the NIST SP800- 88 R1 guidelines
Quarterly Checkups with quantitative summary and scorecard for each audit
Green Reports to show proper e-waste disposal
What’s Your Company’s Security Worth?
TechR2 offers patented, on-site hard drive and data destruction, shredding, degaussing, as well as decommissioning services for all your digital assets and digital media.