Evaluate Your Risk Level
Take our online quiz to find out how compliant you are with SOX, GLB, MASS CMR, HIPAA and other regulatory standards to assess your exposure in the 3 key areas of IT Asset Disposition:
Our Process is Completely Transparent
and Fully Auditable
From deinstallation and secure extraction to inventory and data security services, our fully documented process uses LEAN six sigma principles throughout to ensure measured quality assurance.
Deinstallation and Secure Extraction
CRUSA operates its own fleet of 2015 trucks, which are secure and GPS-tracked. We also have the specialized materials-movement equipment necessary to safely and efficiently uninstall and extract IT hardware from your facilities. From data center to end user technologies, CRUSA handles it all. In addition, our employees are certified in their respective disciplines and have all gone through a background check and drug testing. This guarantees the secure processing of your computer equipment.
Inventory Equipment is inventoried by standard nomenclature, including make, model and serial number, into an online database accessible to you.
Data Security Once inventoried, items are physically and logically reviewed for media, such as hard drives and embedded media. All information is erased or destroyed.
Computer Recycling and Asset Recovery IT assets are either recycled domestically or resold. Resold items are tested, upgraded, cleaned and warrantied. Items not eligible for resale are de-manufactured; components are then sent to different domestic refineries specializing in things like cables, circuit boards and monitors. CRUSA maintains a zero landfill policy.
CRUSA provides the most comprehensive documentation in the industry. We have used the principles of LEAN Six Sigma for over a decade, which enables us to make continuous improvements to the reporting process. This ensures our reporting is up to date, meets the highest standards and can be customized based on an individual client’s needs.
Our Audit Ready Reports are designed to provide our clients with the most comprehensive chain of custody, recycling and data security documentation available today. We are proud to be able to present our clients with the best reporting in the industry. If the situation arises that you are either audited or need to build a defense in court, the documentation we provide will put you in the best position to be successful.
The Right Size For Your Needs
|Onsite Deinstallation and Pickup Services|
|Weight Based Certificate of Recycling|
|Serial Number Based Certificate of Recycling|
|Secure Hard Drive Erasure/ Destruction|
|DataFinder- Search for embedded media- ip addresses, credentials, etc|
|Data Destruction Reports|
|General Liability Policy|
|Audit Ready Chain of Custody|
|Appropriate For:||Limited Budget||Companies that have to be in compliance with data security laws||Companies that are regularly audited|
an Industry Leading Provider
Managed Data Security Services – Secure Asset Recovery – Secure Electronics Recycling
Get In Touch
Talk With Us
425 Fortune Blvd. Milford , MA 01757
Or Schedule a Complimentary Assessment