All staff are vetted in accordance with BS7858, with full Criminal Record Background (CRB) checks, vehicles have tracking devices so we know where your assets are at all times during transport, CCTV covers the grounds of our facilities where you equipment will be processed, all data gets destroyed to IS5 standard, and all equipment processing takes place within a secure password entry only area.
Using our mobile shredder, hard drives, tapes and other media can be destroyed down to 6mm shred size without leaving your premises. This service includes an inventory of hard drive serial numbers.
For re-use, hard drives are wiped using CESG approved Software.
Clients assets are traced from the moment we collect them to the point of re-use or disposal at an accredited facility, and this information is supplied to you in a comprehensive asset report along with Certificates of Data Destruction.
Competitive revenue is paid for re-marketable I.T equipment too because we are a proud partner of the Digital Inclusion Initiative Get Online @ Home, providing affordable, internet ready computers throughout the UK. It is therefore within our interest to re-use as much I.T as possible before recycling, to help the millions of people and charities in the UK that are yet to get online.
Computer Recyclers UK will endeavour to provide a Free of Charge service, clients are requested to have a minimum of 25 qualifying items for collection. Smaller collections than this may incur a charge, to ensure costs of collection are covered. Any costs will be in relation to the distance of the customers location from Computer Recyclers. Any potential costs will be agreed with clients prior to acceptance of the request. Qualifying items include PC base units, monitors, laptops, servers and printers. All other items will be treated as Non-qualifying items. Costs will be agreed with clients prior to acceptance of the request.
Clients can be offered rebates on remarketed goods. Rebates are based on the ‘Fair Market’ value of equipment, meeting viable condition and specification; less the processing costs.
Book a collection
Accreditations and Permits
ISO 9001 certified companies like ourselves benefit from adopting efficient quality management systems that save time and cost, improve efficiency and ultimately improve customer relationships.
Some of the benefits to you as customers:
- Improved quality and service
- Delivery on time
- Right first time attitude
- Fewer returned products and complaints
- Independent audit demonstrates commitment to quality
It is not only the most well known, but is the only ISO 14000 standard against which it is currently possible to be certified by an external certification authority.
By achieving ISO14001 certification Computer recyclers UK are able to clearly demonstrate our commitment to reducing waste and recycling materials where appropriate.
ISO 14001 is a product of the International Organisation for Standardisation (ISO). ISO 14001 is the world’s first generic, internationally recognised standard for environmental management. ISO 14001 measures the conformance of an organisation’s Energy Management System (EMS) to the specified requirements.
ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS). An ISMS is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation’s information risk management processes.
The Asset Disposal and Information Security Alliance (ADISA) was launched in 2010 as a certification
scheme for companies who participate in IT asset recovery offering data sanitisation services. These
companies are Data Processors and must operate in a specific way in order to help their customers,
the Data Controller, comply with previous and new data protection regulations.
The scheme is open to those wish to operate their business to the very highest of standards and are
willing to undertake regular scrutiny by an experienced auditing team.
The ADISA standard comprises of six main modules with a total of 112 Essential Criteria that MUST be
passed to gain certification with over 80 further criteria which are classed as Highly Desirable. These
extra marks are added to the overall score with members being certified as a Pass, Pass with Merit,
Pass with Distinction or with a Pass with Distinction with Honours which is the highest award ADISA
can give and with only five members achieving this.
ADISA members agree to being subjected to regular (Full) audits at least once every three years but
also undergo completely unannounced (Spot-check) audits at least once a year. At these, our auditor
turns up with no prior warning and not only checks that the operational side of the business is running
in accordance with the ADISA Standard but also selects ten or more data bearing assets and
forensically checks them to ensure data has been removed. Only when these checks are passed does
the member retain their certification. Unlike some other schemes, ADISA members are only remain
on if they maintain their compliance with the Standard and organisations have been removed and /
or suspended until such a point that their business returns to a compliant position. ADISA’s view is
that where data security is concerned, we cannot afford to permit organisations to work towards
compliance whilst holding the title of “ADISA Certified”. As a result, the ADISA membership works very
hard to meet this robust approach in order to maintain their certificated status.
The forensic checks follow the following guidelines:
Testing of Hard and Solid-State Drives
This is a forensic level attack using COTS products to replicate a professional level of threat.
Each drive selected is connected to a computer via a forensic write-blocker. The role and function of
the write-blocker is to ensure that:
a) No data was written back to the hard-drive when the hard-drive was powered up and connected to
the ATA command bus,
b) The drive at all times when connected to the ATA command bus, remains in a stable state.
Once the hard-drive had been powered up, a forensic analysis of the hard-drive is performed using
FTK. This analysis allows us to identify if data is present on the hard-drive.
Testing of Smart Phones Procedure
This is a keyboard level attack to replicate a user level of threat. The auditor follows this process:
● Identify the IMEI either by physically checking on battery cover (if appropriate) or powering
the device up.
● Power up phone and see if any previous data is present by the following:
o Check Phone Directory.
o Check browsing history.
o Check Text.
o Check for third party apps.
Testing of Networking Equipment Procedure
This is a proficient user level attack to replicate a professional level of threat.
● Switch on device and connect to it via a terminal connection.
● Log onto the networking equipment using manufacturers’ standard network user name and
(This is to be found via internet search).
● Examination of config files to confirm factory reset.
The ADISA Standard has been formally recognised by DIPCOG, a UK MoD and CESG Committee, and is
listed on the National Cyber Security Centre’s own guidelines as an accreditation to be considered by
companies when disposing of their assets.
In addition to certifying the ITAD service ADISA also offers approval of software and hardware data
sanitisation tools. ADISA is the only entity worldwide that is approving software overwriting tools for
use on Solid State Drives and broader flash media. This is undertaken with the test laboratory at University of South Wales overseen by one of the world’s leading IT forensics experts – Professor
Later in 2018, ADISA will be launching a GDPR compliance certificate for members who will be able to
show how they comply with the requirements for their customers (Data Controllers) and themselves
as Data Processor for key criteria listed within Chapter 4 of the GDPR.
Finally, ADISA also offers its member’s customers Monitoring Service where the audit results are sent
directly to the members customers giving them peace of mind that their chosen ITAD is still operating
to the very highest of standards.
ADISA Member – COMPUTER RECYCLERS UK
Certified Location: Apollo House, Penygraig Ind Estate, Dinas Road, Penygraig,
Rhondda-Cynon-Taf, CF40 1HZ
ADISA members since July 2013, CRUK are certified with Distinction and have undergone the
following audit schedule since joining.
Thursday 12th July 2018, Unannounced Audit -Pass
Thursday 11th May 2017, Unannounced Audit – Pass
Tuesday 29th November 2016, Full Audit – Pass with Distinction
Friday 20th May 2016, Unannounced Audit – Pass
Thursday 16th July 2015, Unannounced Audit – Pass
Tuesday 13th January 2015, Unannounced Audit – Pass
Thursday 12th June 2014, Full Audit – Pass with Merit
Thursday 24th April 2014, Unannounced Audit – Pass
Wednesday 8th January 2014, Unannounced Audit – Pass
Monday 8th July 2013, Full Audit – Pass with Merit
In April 2018 ADISA ran their first annual conference at the NEC with the first ADISA awards being
CRUK were shortlisted for the category “Best ITAD Project” for their Go on Croydon scheme.