Many organizations approach end-of-life technology like a logistics problem — we treat it as both a data security and compliance challenge.
Based in Urbandale, Iowa, Electronic Asset Security is R2v3-certified and aligned with recognized standards to help teams protect sensitive information and document every step of equipment disposition.
Our team blends years of proven IT and security experience with real-world handling of end-of-life technology. We understand the technical details and the business importance of secure handling, accurate tracking, and reliable documentation — especially when compliance matters.
From internal laptops to enterprise servers and storage systems, we help organizations retire technology securely and responsibly.
As part of our commitment to responsible technology stewardship, Electronic Asset Security partners with Best Buddies Iowa to help increase digital access and opportunity for individuals with intellectual and developmental disabilities.
Through device donation and community engagement, we work to extend the life of technology while supporting greater independence.
When organizations retire technology, the process should be structured and defensible — not improvised. We handle equipment securely, document each step, and follow recognized standards so you have clear records of what was done and when.
Certification strengthens process — and documentation supports defensibility.
EAS provides a documented, secure workflow from intake through data destruction and responsible recycling
Chain of custody begins before assets arrive. Equipment is transported by trained, background-checked EAS staff and logged at intake to maintain continuity of control. From pickup through facility intake, equipment remains under our direct oversight.
Upon arrival at our facility, each load is weighed, logged, and associated to the client. If immediate inventory or drive removal cannot begin, equipment is secured within restricted-access, locked cages under 24×7 video surveillance until it can be processed. This ensures devices remain controlled from intake through data destruction.
Data-bearing devices are processed in alignment with recognized standards, including NIST 800-88 guidelines. Depending on device type and the agreed scope of service, media is either securely sanitized or physically destroyed. All destruction activities are documented to provide confirmation of the services performed.
After data destruction, remaining materials are processed through audited downstream partners in accordance with R2v3 standards. Equipment is dismantled and recycled responsibly, supporting environmental compliance and sustainable material recovery.
Clients receive clear documentation confirming the services performed, including certificates of destruction and supporting disposition documentation, as applicable. Our reporting, available 24×7 through our client portal, supports internal recordkeeping, vendor oversight, and compliance documentation requirements.
Our facility is available for drop-off of technology assets Monday through Friday, 8:00 a.m. to 5:00 p.m.
Standard service rates can be found on our Pricing page.
For coordinated pickups or to discuss project scope, please submit the form below and a member of our team will respond promptly.