This paper will look at how modern data threats dovetail with IT Asset Disposition (ITAD) and how compliance with regulations impacts the choice of ITAD vendor. Because data vulnerability does not stop when the equipment is removed from the office, we will also look at the disposal and e-waste laws that define how IT equipment is disposed. 

 

 

Download White Paper here