E-Waste Program

Why disposing of old hardware important...

To you

Simply deleting files is not enough to fully protect against data breaches – specialized techniques are required to permanently wipe hard drives and memory chips. Handing off your  e-waste to us will give you a peace of mind. Your personal and confidential data will be securely erased and a certificate will be provided upon request.

To the environment

Improperly disposing of e-waste can allow valuable and scarce materials like precious metals, as well as toxic substances like lead and mercury to leach into the environment, contaminating soil and water supplies.

Network Right's E-Waste Program

The process

Our process is very simple. 

Step 1: Submit an inquiry and let us know what you would like to e-waste.

Step 2: Sign proposal. (Pick-up fee, large item fee, *certificate of destruction COD, etc.)

Step 3: Schedule a time for us to pick-up the items at your convenience.

Step 4: Sit back and let us take care of the rest.

*Certificate of destruction: a document serves as proof that all your sensitive and confidential data stored on physical hard drives, has been effectively and securely destroyed. You may want this in the event of an internal audit requiring proof of destruction. If your company handles confidential and/or sensitive information, you may be obligated by law or company policy. I.e: personal identifiable information (PII), information protected by privacy laws, corporate trade secrets, financial details, etc. 

We DO NOT take the following:

  • Refrigerators (mini-fridge okay)
  • Large televisions (70″+)
  • Large servers & racks (42u +)
Fill out the form below and select "Professional Services" as the service you are inquiring about.

Let's get started

Ready for streamlined IT solutions tailored by Network Right? Let’s begin this journey together.

learn more

How to: Opt Out of Slack’s AI Training Program

Slack started to introduce “AI” capabilities into Slack on February 14, 2024 and they suggested...

Proactive Threat Detection and Response: How Managed XDR and SOC Services Keep Your Business Secure

In today’s digital age, businesses are constantly exposed to evolving cyber threats that can jeopardize...

Advantages of Managed XDR and SOC Services for Round-the-Clock Infrastructure Monitoring

If you have ever attempted to, you’d know that 24/7 extended detection and response (XDR)...