E-Waste Program

Why disposing of old hardware important...

To you

Simply deleting files is not enough to fully protect against data breaches – specialized techniques are required to permanently wipe hard drives and memory chips. Handing off your  e-waste to us will give you a peace of mind. Your personal and confidential data will be securely erased and a certificate will be provided upon request.

To the environment

Improperly disposing of e-waste can allow valuable and scarce materials like precious metals, as well as toxic substances like lead and mercury to leach into the environment, contaminating soil and water supplies.


Network Right's E-Waste Program

The process

Our process is very simple. 

Step 1: Submit an inquiry and let us know what you would like to e-waste.

Step 2: Sign proposal. (Pick-up fee, large item fee, *certificate of destruction COD, etc.)

Step 3: Schedule a time for us to pick-up the items at your convenience.

Step 4: Sit back and let us take care of the rest.

*Certificate of destruction: a document serves as proof that all your sensitive and confidential data stored on physical hard drives, has been effectively and securely destroyed. You may want this in the event of an internal audit requiring proof of destruction. If your company handles confidential and/or sensitive information, you may be obligated by law or company policy. I.e: personal identifiable information (PII), information protected by privacy laws, corporate trade secrets, financial details, etc. 

We DO NOT take the following:

  • Refrigerators (mini-fridge okay)
  • Large televisions (70″+)
  • Large servers & racks (42u +)
Fill out the form below and select "Professional Services" as the service you are inquiring about.

Let's get started

Ready for streamlined IT solutions tailored by Network Right? Let’s begin this journey together.

learn more

How to Select the Right Managed Security Operations Center (SOC)

When you choose a Managed Security Operations Center (SOC), you’re handing over your cybersecurity reins...

IT Risk Management

IT risk management is key to accessing a safer digital environment for organizations. It’s about...

7 Steps to Successful SIEM Implementation

Hackers have become sophisticated over the years, learning new and improved ways of exploiting organizations’...