11 May, 2026
IT asset disposition (ITAD) data security apprehension is understandable, as many companies have been impacted by vendors promising certified destruction but delivering a stack of paperwork that buried their shoddy work in fine print.
Some companies then just stuff old laptops into storage closets or let decommissioned servers and retired phones gather dust for months, sometimes years, because no one has enough confidence in the disposal process to pull the trigger.
A retired hard drive in the wrong hands can undo years of careful security work and a chunk of the company’s reputation. According to IBM’s 2025 Cost of a Data Breach Report, the average cost of a data breach globally is $4.44 million, and in the United States, it’s an astounding $10.22 million.
The risk also lurks a lot closer to home than most leadership teams realize. Gartner has noted that IT asset managers who manage ITAD continue to struggle with two material ITAD risk categories: lax data security and improper environmental recycling. Simply put, those closest to the process know the gaps are there. But they usually don’t have the budget or vendor relationships to close them.
Then there’s the asset tracking problem. Gartner’s research on hardware asset management found that up to 30% of IT assets are lost along the way, and that about a quarter of organizations have not checked their inventory in the last five years. One lost laptop does not sound like a crisis, but when you have thousands of devices across multiple sites, the math turns ugly fast. Any one of these untracked assets could contain credentials, customer records, intellectual property, or PII.
So, yes, it is justifiable for an IT director to pause before signing off on a disposal contract. However, the trick is to turn healthy caution into a process that actually reduces risk.
ITAD is manageable when these three controls are in place:
Formatting a hard drive doesn’t mean the data is gone. Neither does dragging files to the trash. Most of that data can be restored using recovery tools. Certified data destruction either overwrites the drive to a recognized standard, such as NIST 800-88 or DoD 5220.22-M, or physically destroys the drive by shredding or degaussing. However you do it, ask for a certificate of destruction for each device, linked to its serial number. The certificate should specify the asset, the method, the date, and (for shredded drives) the shred size in millimeters.
Most ITAD failures occur in transit, at the loading dock, or while a device is somewhere between your office and the processing facility. A proper chain of custody fills those gaps. In practice, that means every device is tagged and scanned the second it leaves your site. Each transfer point logs the asset again, so there is a serialized record of who had it and when. Once it arrives, the processing facility checks it in, and the status updates are sent to a secure portal you can access in real time.
Certifications are the starting point, not the finish line. For data destruction, look for NAID AAA; for responsible recycling, look for e-Stewards or R2v3; and for environmental management, look for ISO 14001. There is no reason why a serious provider cannot provide these.
Beyond the paperwork, here’s a short list of things worth checking before deciding on an ITAD partner:
The three pillars discussed are the foundation of our ITAD service at Close the Loop. Our e-Stewards certification and zero-landfill promise mean we recycle everything, and nothing goes to a landfill or unregulated downstream processor. With our North American footprint, including facilities in Texas and Mexicali, we can execute multisite rollouts at scale.
At Close the Loop, we recover meaningful resale value from devices with useful life left, often offsetting a portion of the program cost. Contact us today to see how we can help you with your ITAD.