Contributor: Ana Pacheco, Director, Quality Assurance
When organizations think about IT asset disposition, the first concern is almost always the same:
What happens to our data once equipment leaves our hands?
It’s a valid concern and one that requires more than a simple answer. At Homeboy Electronics Recycling, data security isn’t just a single step in the process because it’s built into every stage of our process, from the pickup to final reporting and everything in between.
It Starts With Standards — Not Assumptions
Our globally recognized standards guide how we process customer data and ensure it is handled appropriately. We are certified to R2v3 (Responsible Recycling), NAID AAA, ISO 9001, ISO 14001 ,ISO 45001 and adhere to NIST SP 800-88 requirements.
These standards define how data must be cleared, purged, or destroyed — not based on preference, but on verified methods.
Depending on the device and requirement, we utilize logical data wiping using ADISA-certified software and/or physical destruction.
Every asset is processed according to these protocols, regardless of how the device arrives to us (e.g. pre-wiped from a customer).
Full Visibility, Down to the Serial Number
Security without documentation is incomplete. Homeboy Electronics Recycling tracks and reports on each data bearing device individually to ensure no device is left unprocessed.
Clients can receive an array of reports, including but not limited to:
- Certificates of Data Destruction – includes the verified method of data sanitization
- Audit Reports – includes the make, model, serial number and customer asset tag of each device processed
- Certificates of Recycling – includes counts and weights of each device category processed
This creates a clear, defensible record of what happened to every asset.
Chain of Custody Is Continuous
Data protection doesn’t begin in the warehouse — it begins at pickup. Our NAID AAA approved drivers handle all customer equipment as if it contains the most sensitive data, because it could. Equipment is securely packaged and loaded into our GPS tracked vehicles and transported back to our warehouse. Our vehicles take controlled routes and don’t make any unnecessary stops along the way. For organizations with stricter requirements, sealed or dedicated transport can be arranged. Every step is designed to eliminate gaps in custody.
Controlled Environment, Verified Outcomes
Once onsite, devices are handled in our secured facility that is access controlled, monitored with 24/7 surveillance and staffed with NAID background checked personnel only.
Beyond process, verification matters, which is why we perform monthly QC checks on randomly selected devices to confirm that data sanitization has been completed completely and in accordance with our certifications.
This ensures the process is not only followed, but validated.
Flexible Options Based on Risk Tolerance
Not every organization approaches risk the same way.
For environments requiring maximum control, onsite data destruction is available — ensuring that data never leaves the premises before being destroyed.
Homeboy maintains $10M in total cyber liability coverage ($5M primary + $5M excess), providing an added layer of protection and accountability.
Transparency Over Assumptions
Secure ITAD isn’t about claiming compliance — it’s about demonstrating it.
Onsite visits of our facility are encouraged so you can see our process firsthand, which removes uncertainty and replaces it with clarity.
At the end of the day, data security isn’t defined by what’s promised, it’s defined by what can be proven.
About the Author
Ana Pacheco has been with Homeboy Electronics since 2016. She is a graduate from the University of Washington, in Environmental Studies, Urban Design and Planning apacheco@homeboyrecycling.com

About the Author