Bulk Data Storage Device
Clean Out Services
We locate, track, contain, destroy, and verify loose data storage devices
Compliance for Clean Out Projects
  • Whether after a Tear-A-Byte® Risk Assessment or as a stand-alone project, we locate and document any End of Life loose media in the Datacenter, Enterprise Office, and, if necessary, in Co-Location sites. These loose data-bearing devices are immediately locked down and a Cleanout is scheduled
  • Non-Secure Assets are discovered during the project
  • Non-Secure Assets are contained, tracked, and destroyed
  • Management has real time reports and notifications that the clean out was completed to information security regulations
Why is TechR2 Certified?
  • Immediate access to data: Only Technicians for ISO 27001 or SOC compliant companies are permitted to immediately access critical data within a data-bearing device
  • Compliance auditors first assess data security – procedures and training. TechR2 is respected in the ITAD industry
  • Large OEM’s and government Agencies require the highest level of scrutiny when processing data

“A model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.”

TechR2 Secure Transport Solution
  • Onsite audit of equipment and data-bearing devices into our Customer Portal
  • Reconciles equipment and data-bearing devices to the customer list
  • Data-bearing devices are sanitized and verified to NIST SP 800-88 R1 requirements per NIST SP 800-53 CSF
  • Securely contained and sent to an ISO 14001 recycler
  • Certificate of Destruction is issued on the same day
  • Online Customer Portal and Green Reports available 24/7
Products and Services Compliance
  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • HITECH
  • Sarbanes-Oxley Act
  • Fair Trade and Credit Transaction Act
  • GRAMM-Leach-Bliley Act
  • Payment Card Industry (PCI)
  • Meets the NIST 800-88 federal guidelines for media sanitization
TechR2 Products and Services
  • Patented Tear-A-Byte® solution for tracking, containing, destroying, and verifying data-bearing devices
  • Data eradication services that are NSA compliant and environmentally friendly
  • Wiping Services using DoD 5220-22.M three (3) pass overwrite plus a fourth pass for verification
  • Secure Transport Services
  • Passive RFID IT Asset Tracking solution
  • Active Beacon IT Asset Tracking solution
  • IT Asset Retirement using the secure techBOX™ solution
  • Custom Hardware and Software solutions
Products and Services Compliance
  • Data Security Risk Assessments
  • Datacenter and Enterprise
  • Data Security Training for your team
  • IT Asset Retirement Planning
  • Certificate of Destruction and reports comply with the NIST SP800- 88 R1 guidelines
  • Quarterly Checkups with quantitative summary and scorecard for each audit
  • Green Reports to show proper e-waste disposal
What’s Your Company’s Security Worth?
If you believe the security on your company is important, please contact and will help you reaching the best possible solution.