Step 1 – Plan and Inventory
Step 2 – Classify Data and Risk
- High sensitivity – devices containing personal, financial, or classified data.
- Medium sensitivity – devices holding business data that requires controlled handling.
- Low sensitivity – devices with minimal or no stored data.
Step 3 – Arrange Secure Logistics
Step 4 – Data Erasure or Destruction
- Certified data erasure should use ADISA-approved software aligned with NIST 800-88 standards. Successful erasures should be documented with item-level certificates.
- Physical destruction is required for failed drives or devices unsuitable for reuse. Shredding to an appropriate particle size ensures data is rendered irretrievable.
Step 5 – Maximise Resale and Reuse
Understanding Asset Value Degradation
Asset Type | Initial Residual Value (Month 0) | After 3 Months | After 6 Months | After 12 Months |
---|---|---|---|---|
Business-grade laptops | 100% | 80–85% | 60–70% | 30–40% |
Smartphones & tablets | 100% | 75–80% | 55–65% | 25–35% |
Servers & storage | 100% | 85–90% | 70–80% | 50–60% |
Monitors & peripherals | 100% | 85% | 70% | 40–50% |
Step 6 – Ensure Environmental Compliance
Step 7 – Reporting, Documentation, and Social Value
- Asset inventory and classification logs
- Chain of custody records
- Certificates of erasure or destruction
- Resale and environmental reports
- ROPA logs for GDPR compliance
ESG and Social Value Contributions
Common Mistakes to Avoid
- Delaying classification or erasure, leading to security and value loss
- Failing to verify accreditations or insurance of ITAD partners
- Overlooking environmental reporting and social value opportunities
- Incomplete documentation, leaving gaps during audits