Our secure ITAD recycling facility
Designed from the ground up to safeguard sensitive equipment and data, our state-of-the-art IT asset disposal, and recycling facility operates under strict controls.
Our secure ITAD facility offers:
Reverse logistics
Wherever your IT assets are, Keystone will retrieve them and securely transport them to our secure ITAD facility.
Certified audit process
Keystone technicians will inspect, test and record the serial number, make and model of each item.
24/7 video surveillance & limited access
We employ best-in-class security, both physical and digital methods, to ensure access to our facility is strictly limited.
Full documentation & client portal
We provide a safe, simple, and secure cloud-based online reporting portal for secure access to data. Our portal provides a detailed permanent record of successful, verified data destruction
Reverse logistics
Keystone will secure all necessary documents and paperwork prior to our arrival at your site. Our technicians will remove, load, and transport the equipment in a timely and professional manner. Keystone will provide all the necessary items for proper removal and transport of the equipment. All material sent to our facility will be tagged and stored until available for audit.
Certified audit process
Keystone’s trained technicians will inspect, test, and record the information for each asset. Our auditing procedure includes removing and shredding any loose documents, brochures, documents, floppy disks, flash drives, thumb drives, compact discs and/or DVDs, sim cards, PDAs, cell phones, or any media that may contain data.
Keystone will provide a certificate of data destruction detailing the serial number (if applicable) and the type of media that is destroyed. Being R2v3 certified, Keystone’s management system ensures all material will be recycled following R2v3 guidelines or disassembled for parts reclamation and recovery or resold as whole units.
No material will be sent to a landfill, and we do not export any e-waste. We will provide a certificate of recycling, which will include the make model, and serial number (if applicable) of each unit that is recycled.
24/7 video surveillance & limited access
Limited-Access Facility
Our facility is only accessible by employees during business hours, and by only management after hours. Anytime the facility is opened after hours, a message is sent to management alerting them of the activity. Keystone employees must swipe their key fob to gain access to the building.
Any and all guests must be scheduled to enter the building prior to arrival and escorted by a Keystone employee at all time. All equipment that contains sensitive data is further secured in a cage and under lock and key, only assessable to our two head technicians.
24/7 Video Coverage
The Keystone ITAD facility is protected 24/7 by high-definition video surveillance, capturing every step of the handling process, from arrival and data destruction to final disposition. Clients can be confident that every device is processed under continuous watch, reinforcing our commitment to security and compliance. All video footage is accessible only by management in real time or tape delayed.
Full documentation & client portal
Keystone provides detailed reports and documents for every service to ensure compliance with all corporate policies, legal requirements, and regulatory mandates. Our online portal allows for real-time access to all information and can become a data repository providing a detailed permanent record of all successful, verified services.
We provide a wide range of documentation depending on your needs, including:
IT asset audit report
Detailed audit report
Signed statement
of work
Certificate of
destruction
Drive erasure report
Certificate of recycling
Bill of lading
Other documents
upon request
Dispose of your IT assets simply and safely with a clear, secure, and compliant ITAD process.
Wherever your assets, we will retrieve, inventory, and dispose of them in full compliance with relevant regulations (with an audit trail to prove it).
Here’s how it works:
We take your data security seriously (and have the credentials to prove it).
Wherever your IT assets are, we'll be there.
We offer coast-to-coast ITAD reverse logistics with fully compliant, documented processes.
Remote office solutions
Online reporting
Certificated asset audits
We provide big business results with a small company feel.
Simply put, we make all your IT assets disappear: securely, quickly, and easily.
- Fully-Compliant
- Secure and reliable
- Over 20 Years in ITAD
Leave your ITAD in expert hands
Keystone’s trucks are GPS-tracked for secure transport
All on-site technicians undergo background checks
Chain of custody records are available in your client portal
Best-in-class, certified protocols
5-star customer reviews
Trusted by leading institutions and companies, with global service capabilities.