FAQ

What does it mean to be an R2-certified recycler?

Being an R2-certified recycler means that a company follows the Responsible Recycling (R2) Standard, a globally recognized certification for safe, secure, and environmentally responsible electronics recycling and reuse.

IT & Office Equipment

Laptops, desktops, monitors, servers, printers, scanners, networking equipment, internal storage and hard drives.

Consumer Electronics

Smartphones, tablets, gaming consoles and accessories, Smartwatches and wearables, audio and video equipment (speakers, headphones, cameras)

Point-of-Sale (POS) Systems

POS terminals, barcode scanners, receipt printers, cash registers, credit card processing equipment

Telecommunications & Data Center Equipment

Servers, racks, power supplies, cooling units, VOIP phones, PBX systems, fiber optics and telecom networking gear.

Non-Electronic Waste & General Trash

General household waste and non-electronic items paper, cardboard, and other office waste (unless part of an IT asset disposal project)

Biohazardous & Medical Waste

Used medical equipment that has not been properly sanitized or decontaminated

Yes! R2 Guys provides convenient pickup services for businesses, organizations, and institutions looking to dispose of bulk electronics. For small projects, we deliver all required packing materials and use R2 approved carriers. For larger projects, we offer on site packing services and staging services.

Yes! Our buyback program is ideal for companies upgrading their IT infrastructure, liquidating excess inventory, or managing IT asset disposition. Our extensive network of global customers guarantees that you will get the highest possible return for your end of life electronics.

Yes! At R2 Guys, we offer comprehensive decommissioning and on-site removal services for IT assets, ensuring a secure, efficient, and hassle-free process for businesses looking to retire their outdated or surplus equipment.

Certificate Issuance:

Each device sanitized or destroyed receives a unique, serialized Certificate of Data Destruction (COD).

CODs include serial numbers, asset tags, destruction method, date, and technician details.

Destruction Procedures:

Data wiping (WipeOS, PhoneCheck) follows NIST “Clear” methods with full verification.

Physical destruction (shredding, crushing) follows NIST “Destroy” and DIN 66399 standards.

Record Maintenance:

Digital Storage: CODs are securely stored in an encrypted client portal for 7 years.

Physical Storage: Hard copies available upon request, stored in our secured facility.

Overwriting Software Used:

We use WipeOS, and PhoneCheck for secure data wiping, compliant with NIST 800-88r1 “Clear” and “Purge” methods.

Overwriting Method:

Multi-pass binary zero, random data, or DoD 5220.22-M overwrites.

Assessment & Inventory

Identify devices requiring data destruction

Track each item through a secure chain of custody

Data Destruction Methods

Software Erasure: Use PhoneCheck, WipeOS to wipe data per NIST 800-88, DoD 5220.22-M, R2v3 standards

Physical Destruction (if needed) via shredding or degaussing for irrecoverable data removal

Certificates are sent via email, uploaded to a secure client portal, or provided as a printed copy on request.

All non-reusable materials are sent to R2v3 & e-Stewards certified recyclers for proper processing.

Metals, plastics, and other components are separated and sent to EPA-compliant downstream processors.

We conduct a site visit to evaluate the scope of the project, identifying  assets to be decommissioned, noting serial numbers and asset tags. Afterwards,  a decommissioning plan is developed tailored to your needs.

Secure Data Destruction:

On-site data wiping using NIST 800-88r1 compliant methods.

Physical destruction of drives (crushing, shredding) for highly sensitive data.

Asset Removal & Logistics:

Deinstallation of IT equipment (servers, workstations, networking gear, POS systems).

Proper packing, labeling, and transport to our ITAD processing facility.

Chain of custody tracking to ensure asset security.

Technical Expertise:

Trained in data sanitization using industry-leading and compliant tools.

Experienced in various IT hardware decommissioning with ability  inventory, pack, and transport IT assets securely

Pre-Inventory Planning & Asset Tagging:

We generate a detailed asset list based on serial numbers, asset tags, and client-provided records.

Barcode scanners and RFID technology are used for precise tracking.

Real-Time Inventory Capture & Verification:

Assets are scanned and recorded into our inventory management system.

Each asset is classified based on condition, specifications, and resale potential.

Assets designated for data destruction are separately logged for compliance tracking.

Chain of Custody & Security Measures:

A chain of custody log is maintained, documenting who handled each asset and when.

Visual Inspection & Grading:

Devices are classified as A (Like New), B (Used/Good), C (Functional with Wear), or D (Non-functional/For Parts). (check if this complies with R2 grading standards)

Checked for cosmetic damage, missing components, and asset tags.

Functional Testing:

Hardware diagnostics performed using industry tools (PhoneCheck, WipeOS).

Component testing (CPU, RAM, storage, battery health, ports, display).

Data Sanitization & Certification:

WipeOS or Blancco for data wiping (NIST 800-88r1 compliant).

Non-functional assets are marked for repair, parts harvesting, or recycling.

How do you determine which assets can be reused and which are to be recycled?

Asset Condition & Functionality:

Fully functional assets with market demand are prioritized for reuse.

Non-functional or obsolete assets with no resale value are sent for recycling.

Age & Market Demand:

Devices within 3–5 years of production are typically reusable.

Older, unsupported, or low-demand models are recycled.

Repair Feasibility & Cost:

If repair costs exceed resale value, the asset is recycled.

Functional parts may be harvested for reuse or resale.

We use a combination of our internal AI driven value assessment tool as well as our industry experience, knowledge and network of buyers to extract maximum value for used IT assets.

Full compliance with leasing company return policies.

On-site or off-site data wiping to ensure regulatory compliance

Serialized inventory tracking & chain of custody management.

Reverse logistics support with secure packaging and transport coordination.

Lease reconciliation reporting to help clients avoid unnecessary fees.

Revenue Share Model:

The percentage depends on asset type, volume, and market value.

After deducting processing, logistics, and remarketing costs, proceeds are split (60/40 client/vendor).

Buyout Model:

Flexible terms based on asset condition, resale demand.

Wholesale & B2B Sales:

Direct sales to IT resellers, refurbishers, and enterprise buyers.

Bulk liquidation sales to domestic and international wholesale distributors.

Online Marketplaces:

eBay, Amazon, Newegg, and GovDeals for consumer-grade IT.

Private Client Sales & Custom Solutions:

High-value or specialized IT assets sold through targeted B2B outreach.

Custom remarketing strategies based on client preferences.

AI-Powered Valuation:

AI valuation software analyzes historical sales data, current market demand, and pricing trends across multiple resale platforms, factoring in asset condition, specifications, brand reputation, and depreciation curves to provide valuation estimates.

Industry Market Insights & Connections:

We leverage direct relationships with global IT buyers, wholesalers, and refurbishers to obtain the best market rates.

Our pricing is benchmarked against data from wholesale marketplaces, auction platforms, and enterprise liquidation sales.

Payment is settled with clients 30 days after receipt of inventory at our facility.