Evaluate Your Risk Level
Take our online quiz to find out how compliant you are with SOX, GLB, MASS CMR, HIPAA and other regulatory standards to assess your exposure in the 3 key areas of IT Asset Disposition:
Our Process is Completely Transparent
and Fully Auditable
From deinstallation and secure extraction to inventory and data security services, our fully documented process uses LEAN six sigma principles throughout to ensure measured quality assurance.
Deinstallation and Secure Extraction
CRUSA operates its own fleet of 2015 trucks, which are secure and GPS-tracked. We also have the specialized materials-movement equipment necessary to safely and efficiently uninstall and extract IT hardware from your facilities. From data center to end user technologies, CRUSA handles it all. In addition, our employees are certified in their respective disciplines and have all gone through a background check and drug testing. This guarantees the secure processing of your computer equipment.
Inventory Equipment is inventoried by standard nomenclature, including make, model and serial number, into an online database accessible to you.
Data Security Once inventoried, items are physically and logically reviewed for media, such as hard drives and embedded media. All information is erased or destroyed.
Computer Recycling and Asset Recovery IT assets are either recycled domestically or resold. Resold items are tested, upgraded, cleaned and warrantied. Items not eligible for resale are de-manufactured; components are then sent to different domestic refineries specializing in things like cables, circuit boards and monitors. CRUSA maintains a zero landfill policy.
CRUSA provides the most comprehensive documentation in the industry. This ensures you have what you need in order to pass audits or respond to a legal claim.
The Right Size For Your Needs
|Onsite De-Installation and Pickup Services|
|Weight Based Certificate of Recycling|
|Serial Number Based Certificate of Recycling|
|Secure Hard Drive Erasure/ Destruction|
|DataFinder- Search for embedded media- ip addresses, credentials, etc|
|Data Destruction Reports|
|General Liability Policy|
|Audit Ready Chain of Custody|
|Appropriate For:||Limited Budget||Companies that have to be in compliance with data security laws||Companies that are regularly audited|