Privacy Policy

Who we are

Our website address is: retechddr.com, owned by ReTech Data Destruction & Recycling LLC.

At ReTech Data Destruction & Recycling, we understand the importance of privacy and security when it comes to the handling of your sensitive information. We are a dedicated IT Asset Disposition Company that provides secure and environmentally responsible disposal services for electronic devices and data.

We are committed to protecting the privacy and security of our clients’ information throughout the entire data destruction and recycling process. Our team consists of trained professionals who are committed to upholding the highest standards of privacy and security. We have implemented strict policies and procedures to ensure that your information is protected at all times.

We take a proactive approach to safeguarding your data by implementing physical, technical, and administrative measures to secure our facilities, networks, and systems. We use state-of-the-art technology to securely erase all data from your electronic devices before they are recycled or disposed of. We follow industry-standard guidelines for data destruction, including NIST, HIPAA, and DoD standards.

We understand the importance of compliance with data protection laws and regulations, and we are committed to meeting all legal obligations regarding the handling of personal data. We regularly review and update our privacy and security policies to ensure that we remain compliant with all applicable laws and regulations.

At ReTech Data Destruction & Recycling, we take your privacy and security seriously. You can trust us to handle your electronic devices and data with the utmost care and professionalism. If you have any questions or concerns about our privacy and security practices, please do not hesitate to contact us.

Comments and form submittals

 When visitors leave comments, submit forms, or other information on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website. All user content uploaded to the website by a user is owned by ReTechDDR, unless otherwise indicated by licensing or by written approval by ReTechDDR.

Cookies

If you leave a comment or submit a form on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year, unless deleted by you.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email. If agreed to at the time of form submittal, your email address and associated contact information may be shared with partners of ReTechDDR

How long we retain your data

If you leave a comment or submit a form, the submittal and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes. An email must be sent to recycle@retechddr.com with a subject line “Personal Information Request [Last Name],[First Name],[Business Name (if Applicable)]”

Where your data is sent

Visitor comments may be checked through an automated spam detection service

Data Storage and Protection

We take the security of customer data seriously and have implemented appropriate technical and organizational measures to protect against unauthorized access, theft, or loss. We store data on secure servers and have implemented physical, technical, and administrative safeguards to protect against data breaches. We restrict access to sensitive data to only those employees who require it to perform their job duties.

Data Use and Sharing

We only use customer data for the purpose for which it was collected and do not share it with third parties, except as required by law. We may use customer data to communicate with customers about our services, to provide customer support, or to send marketing messages. We do not sell or rent customer data to third parties.

User Rights

Customers have the right to access, modify, and delete their personal data. If a customer would like to request access to or modify their personal data, they can contact us using the contact information provided at the end of this policy. We will respond to customer requests in a timely manner.

Compliance and Enforcement

Where necessary, We comply with applicable privacy laws and regulations. We have implemented procedures to ensure that we handle customer data in accordance with these regulations, and we will take appropriate action in the event of a data breach or violation of this policy. We also require our employees and third-party partners to comply with this policy and applicable privacy laws and regulations.

Secure Data Destruction

We take great care in securely destroying data to protect customer privacy. We use methods such as physical destruction, degaussing, or secure wiping of hard drives and other electronic devices.

Chain of Custody

We have established procedures for the transportation and handling of sensitive electronic equipment, including the tracking and verification of the handling and movement of equipment. Chain of custody is an available option for many of our services and should be established in your customer contract if you are a customer.

Data Sanitization

We have a strategy for data sanitization, which involves removing sensitive data from electronic devices before they are resold or recycled. We ensure the complete removal of all sensitive data using industry-standard data destruction methods.

Compliance with Industry Standards

We comply with industry standards for data destruction and ITAD services, including the National Institute of Standards and Technology (NIST) 800-88 standard and the Responsible Recycling (R2) standard. Compliance with specific industry standards is an available option for many of our services and should be established in your customer contract if you are a customer.

Employee Training

We provide ongoing training to our employees on data destruction, ITAD practices, and privacy and security best practices to ensure that they follow proper procedures and maintain the privacy and security of customer data.

Integration of Privacy into Service Offerings

We integrate privacy into our overall service offerings, including our website services and data destruction/ITAD services. We perform privacy assessments and privacy impact assessments to ensure that we are handling customer data appropriately and securely.

Company

features

get started

Newslatter

Sign up for updates on the company, helpful tips and tricks for managing an ITAD program, Data Governance information, and more!