What does it mean to be an R2-certified recycler?
Being an R2-certified recycler means that a company follows the Responsible Recycling (R2) Standard, a globally recognized certification for safe, secure, and environmentally responsible electronics recycling and reuse.
What types of electronics and IT assets do you accept?
IT & Office Equipment
Laptops, desktops, monitors, servers, printers, scanners, networking equipment, internal storage and hard drives.
Consumer Electronics
Smartphones, tablets, gaming consoles and accessories, Smartwatches and wearables, audio and video equipment (speakers, headphones, cameras)
Point-of-Sale (POS) Systems
POS terminals, barcode scanners, receipt printers, cash registers, credit card processing equipment
Telecommunications & Data Center Equipment
Servers, racks, power supplies, cooling units, VOIP phones, PBX systems, fiber optics and telecom networking gear.
Are there any items you don’t accept?
Non-Electronic Waste & General Trash
General household waste and non-electronic items paper, cardboard, and other office waste (unless part of an IT asset disposal project)
Biohazardous & Medical Waste
Used medical equipment that has not been properly sanitized or decontaminated
Do you offer pickup services for bulk electronics disposal?
Yes! R2 Guys provides convenient pickup services for businesses, organizations, and institutions looking to dispose of bulk electronics. For small projects, we deliver all required packing materials and use R2 approved carriers. For larger projects, we offer on site packing services and staging services.
Do you offer buyback programs for electronics with residual value?
Yes! Our buyback program is ideal for companies upgrading their IT infrastructure, liquidating excess inventory, or managing IT asset disposition. Our extensive network of global customers guarantees that you will get the highest possible return for your end of life electronics.
Do you handle decommissioning and on-site removal of IT assets?
Yes! At R2 Guys, we offer comprehensive decommissioning and on-site removal services for IT assets, ensuring a secure, efficient, and hassle-free process for businesses looking to retire their outdated or surplus equipment.
What are your policies and procedures regarding data destruction?
Certificate Issuance:
Each device sanitized or destroyed receives a unique, serialized Certificate of Data Destruction (COD).
CODs include serial numbers, asset tags, destruction method, date, and technician details.
Destruction Procedures:
Data wiping (WipeOS, PhoneCheck) follows NIST “Clear” methods with full verification.
Physical destruction (shredding, crushing) follows NIST “Destroy” and DIN 66399 standards.
Record Maintenance:
Digital Storage: CODs are securely stored in an encrypted client portal for 7 years.
Physical Storage: Hard copies available upon request, stored in our secured facility.
What is your process for overwriting hard drives?
Overwriting Software Used:
We use WipeOS, and PhoneCheck for secure data wiping, compliant with NIST 800-88r1 “Clear” and “Purge” methods.
Overwriting Method:
Multi-pass binary zero, random data, or DoD 5220.22-M overwrites.
What is your process for destroying data?
Assessment & Inventory
Identify devices requiring data destruction
Track each item through a secure chain of custody
Data Destruction Methods
Software Erasure: Use PhoneCheck, WipeOS to wipe data per NIST 800-88, DoD 5220.22-M, R2v3 standards
Physical Destruction (if needed) via shredding or degaussing for irrecoverable data removal
How are certificates of data destruction provided when data is destroyed on-site?
Certificates are sent via email, uploaded to a secure client portal, or provided as a printed copy on request.
How do you dispose of destroyed items?
All non-reusable materials are sent to R2v3 & e-Stewards certified recyclers for proper processing.
Metals, plastics, and other components are separated and sent to EPA-compliant downstream processors.
What are your decommissioning service capability and procedures?
We conduct a site visit to evaluate the scope of the project, identifying assets to be decommissioned, noting serial numbers and asset tags. Afterwards, a decommissioning plan is developed tailored to your needs.
Secure Data Destruction:
On-site data wiping using NIST 800-88r1 compliant methods.
Physical destruction of drives (crushing, shredding) for highly sensitive data.
Asset Removal & Logistics:
Deinstallation of IT equipment (servers, workstations, networking gear, POS systems).
Proper packing, labeling, and transport to our ITAD processing facility.
Chain of custody tracking to ensure asset security.
What are the qualifications of your services team?
Technical Expertise:
Trained in data sanitization using industry-leading and compliant tools.
Experienced in various IT hardware decommissioning with ability inventory, pack, and transport IT assets securely
How do you manage asset inventory counts on and off site?
Pre-Inventory Planning & Asset Tagging:
We generate a detailed asset list based on serial numbers, asset tags, and client-provided records.
Barcode scanners and RFID technology are used for precise tracking.
Real-Time Inventory Capture & Verification:
Assets are scanned and recorded into our inventory management system.
Each asset is classified based on condition, specifications, and resale potential.
Assets designated for data destruction are separately logged for compliance tracking.
Chain of Custody & Security Measures:
A chain of custody log is maintained, documenting who handled each asset and when.
How do you grade and test assets?
Visual Inspection & Grading:
Devices are classified as A (Like New), B (Used/Good), C (Functional with Wear), or D (Non-functional/For Parts). (check if this complies with R2 grading standards)
Checked for cosmetic damage, missing components, and asset tags.
Functional Testing:
Hardware diagnostics performed using industry tools (PhoneCheck, WipeOS).
Component testing (CPU, RAM, storage, battery health, ports, display).
Data Sanitization & Certification:
WipeOS or Blancco for data wiping (NIST 800-88r1 compliant).
Non-functional assets are marked for repair, parts harvesting, or recycling.
How do you determine which assets can be reused and which are to be recycled?
Asset Condition & Functionality:
Fully functional assets with market demand are prioritized for reuse.
Non-functional or obsolete assets with no resale value are sent for recycling.
Age & Market Demand:
Devices within 3–5 years of production are typically reusable.
Older, unsupported, or low-demand models are recycled.
Repair Feasibility & Cost:
If repair costs exceed resale value, the asset is recycled.
Functional parts may be harvested for reuse or resale.
How does your company maximize the value recovered from reuse of IT assets?
We use a combination of our internal AI driven value assessment tool as well as our industry experience, knowledge and network of buyers to extract maximum value for used IT assets.
What are your capabilities to support lease returns?
Full compliance with leasing company return policies.
On-site or off-site data wiping to ensure regulatory compliance
Serialized inventory tracking & chain of custody management.
Reverse logistics support with secure packaging and transport coordination.
Lease reconciliation reporting to help clients avoid unnecessary fees.
How does your company split proceeds from asset remarketing and what are the percentages?
Revenue Share Model:
The percentage depends on asset type, volume, and market value.
After deducting processing, logistics, and remarketing costs, proceeds are split (60/40 client/vendor).
Buyout Model:
Flexible terms based on asset condition, resale demand.
What channels are used to remarket IT assets?
Wholesale & B2B Sales:
Direct sales to IT resellers, refurbishers, and enterprise buyers.
Bulk liquidation sales to domestic and international wholesale distributors.
Online Marketplaces:
eBay, Amazon, Newegg, and GovDeals for consumer-grade IT.
Private Client Sales & Custom Solutions:
High-value or specialized IT assets sold through targeted B2B outreach.
Custom remarketing strategies based on client preferences.
How do you determine the fair market value of our assets?
AI-Powered Valuation:
AI valuation software analyzes historical sales data, current market demand, and pricing trends across multiple resale platforms, factoring in asset condition, specifications, brand reputation, and depreciation curves to provide valuation estimates.
Industry Market Insights & Connections:
We leverage direct relationships with global IT buyers, wholesalers, and refurbishers to obtain the best market rates.
Our pricing is benchmarked against data from wholesale marketplaces, auction platforms, and enterprise liquidation sales.
How are the proceeds from resale provided back to our company?
Payment is settled with clients 30 days after receipt of inventory at our facility.