{"id":13316,"date":"2026-03-19T16:33:49","date_gmt":"2026-03-19T16:33:49","guid":{"rendered":"https:\/\/www.secure-itad.com\/?p=13316"},"modified":"2026-03-19T16:33:51","modified_gmt":"2026-03-19T16:33:51","slug":"chain-of-custody-bij-het-verwijderen-van-it-middelen","status":"publish","type":"post","link":"https:\/\/www.secure-itad.com\/nl\/chain-of-custody-bij-het-verwijderen-van-it-middelen\/","title":{"rendered":"Chain of Custody bij het verwijderen van IT-middelen"},"content":{"rendered":"\n\t<div id=\"text-2614250487\" class=\"text article-underline\">\n\t\t\n\n<p data-start=\"136\" data-end=\"420\">Most businesses know how to protect active data, but many overlook the risk that hides in retired devices.<br data-start=\"243\" data-end=\"246\">One missing hard drive can trigger audits, breach fines and lasting reputational damage. That\u2019s why a secure chain of custody is just as important as data destruction itself.<\/p>\n<p data-start=\"422\" data-end=\"572\">When businesses plan <a href=\"https:\/\/www.secure-itad.com\/nl\/diensten-verenigd-koninkrijk-europa\/it-activa-verwijderen\/\">IT asset disposal (ITAD<\/a>), most focus on the end of the process, shredding old hard drives and SSDs so data can\u2019t be recovered.<\/p>\n<p data-start=\"574\" data-end=\"653\">But what often gets missed is everything that happens before destruction.<\/p>\n<p data-start=\"655\" data-end=\"897\">If data-bearing devices are lost, stolen or tampered with between collection and shredding, your organisation could still face a data breach, even if the drives are eventually destroyed. That\u2019s where the chain of custody becomes critical.<\/p>\n\t\t\t<\/div>\n\t\n\t<div id=\"text-2246156780\" class=\"text article-underline\">\n\t\t\n\n<p><strong>Jump to a section:<\/strong><\/p>\n<ul>\n<li><a href=\"#chain-of-custody\">What is Chain of Custody in IT Asset Disposal<\/a><\/li>\n<li><a href=\"#strategic-chain-of-custody\">Why Chain of Custody Matters Strategically<\/a><\/li>\n<li><a href=\"#chain-of-custody-breaks\">What Happens When the Chain of Custody Breaks<\/a><\/li>\n<li><a href=\"#prevent-custody-breaks\">How to Prevent Chain of Custody Breaks<\/a><\/li>\n<li><a href=\"#lifecycle\">Chain of Custody Lifecycle<\/a><\/li>\n<li><a href=\"#secure-itad\">How Secure ITAD Exceeds Industry Standards<\/a><\/li>\n<\/ul>\n\t\t\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #chain-of-custody\" data-bullet=\"false\" data-link=\"#chain-of-custody\" data-title=\"What is Chain of Custody in ITAD?\"><a name=\"chain-of-custody\"><\/a><\/span>\n\n\t<div id=\"gap-1624889424\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1624889424 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"row\"  id=\"row-590261340\">\n\n\n\t<div id=\"col-2094491192\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner dark\" style=\"background-color:#b3302a;\" >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3747263624\" class=\"text article-underline\">\n\t\t\n\n<h2>What Is <strong>Chain of Custody<\/strong> in IT Asset Disposal?<\/h2>\n<p data-start=\"1315\" data-end=\"1488\">Chain of custody is the documented, verifiable trail that tracks every data-bearing device from the moment it leaves your site until it is fully destroyed or recycled.<\/p>\n<p data-start=\"1490\" data-end=\"1712\">It records who handled each asset, where and when it moved, and how it was secured at each stage \u2014 giving you evidence that your IT assets were protected from unauthorised access throughout the entire disposal process.<\/p>\n\t\t\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-2094491192 > .col-inner {\n  padding: 40px 40px 40px 40px;\n  border-radius: 10px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n<span class=\"scroll-to\" data-label=\"Scroll to: #strategic-chain-of-custody\" data-bullet=\"false\" data-link=\"#strategic-chain-of-custody\" data-title=\"Why Chains of Custody Matters Strategically\"><a name=\"strategic-chain-of-custody\"><\/a><\/span>\n\n\t<div id=\"gap-1419632332\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1419632332 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"text-4118282133\" class=\"text article-underline\">\n\t\t\n\n<h2 data-start=\"379\" data-end=\"424\">Why Chain of Custody Matters Strategically<\/h2>\n<p data-start=\"1396\" data-end=\"1624\">Chain of custody might sound like a technical detail, but it has huge strategic importance. It underpins your wider data protection and risk management strategy, and if it breaks down, the consequences can ripple far beyond IT.<\/p>\n<p data-start=\"1626\" data-end=\"1815\">If you can\u2019t prove where sensitive devices have been or who\u2019s handled them, even a single missing laptop can spark audits, contract breaches, fines, and long-term damage to your reputation.<\/p>\n<p data-start=\"1817\" data-end=\"2149\">It can jeopardise your ISO 27001 certification, breach contractual clauses with public sector and enterprise clients, and even void your cyber insurance if you can\u2019t prove where devices have been.<br data-start=\"2013\" data-end=\"2016\">Most damaging of all, it can erode the trust of clients, partners and investors who expect their data to be protected at every stage.<\/p>\n<p data-start=\"2151\" data-end=\"2372\">Put simply, a secure chain of custody protects more than just devices. It protects your contracts, certifications, insurance cover and credibility, which makes it every bit as important as proving the data was destroyed.<\/p>\n\t\t\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #chain-of-custody-breaks\" data-bullet=\"false\" data-link=\"#chain-of-custody-breaks\" data-title=\"What Happens When Chain of Custody Breaks\"><a name=\"chain-of-custody-breaks\"><\/a><\/span>\n\n\t<div id=\"gap-639419947\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-639419947 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"text-4178650457\" class=\"text article-underline\">\n\t\t\n\n<h2 data-start=\"453\" data-end=\"497\">What Happens When Chain of Custody Breaks<\/h2>\n<p data-start=\"2425\" data-end=\"2691\">When chain of custody breaks, it rarely happens with drama or headlines \u2014 but the impact can be just as serious.<br data-start=\"2537\" data-end=\"2540\">It usually starts with something small: a rushed collection, a missing signature, a box of laptops left in an unlocked storeroom \u201cjust for a few days.\u201d<\/p>\n<p data-start=\"2693\" data-end=\"2892\">From that moment, the paper trail is broken.<br data-start=\"2737\" data-end=\"2740\">You can no longer prove where the device went, who handled it, or whether the data stayed protected \u2014 and regulators will treat it as if it was exposed.<\/p>\n<p data-start=\"2894\" data-end=\"2940\"><strong data-start=\"2894\" data-end=\"2940\">Here\u2019s how it often plays out in practice:<\/strong><\/p>\n<ul data-start=\"2942\" data-end=\"3709\">\n<li data-start=\"2942\" data-end=\"3162\">\n<p data-start=\"2944\" data-end=\"3162\"><strong data-start=\"2944\" data-end=\"2967\">Unlogged collection<\/strong><br data-start=\"2967\" data-end=\"2970\">A batch of retired laptops leaves site with no inventory or signatures. Weeks later, one can\u2019t be found \u2014 and there\u2019s no way to prove if it was collected, who had it, or when it disappeared.<\/p>\n<\/li>\n<li data-start=\"3164\" data-end=\"3425\">\n<p data-start=\"3166\" data-end=\"3425\"><strong data-start=\"3166\" data-end=\"3188\">Insecure transport<\/strong><br data-start=\"3188\" data-end=\"3191\">Drives are sent to a disposal facility by a general courier. The vehicle is broken into en route, and the contents are stolen. Because there were no sealed containers or GPS tracking, there\u2019s no way to know which devices were taken.<\/p>\n<\/li>\n<li data-start=\"3427\" data-end=\"3709\">\n<p data-start=\"3429\" data-end=\"3709\"><strong data-start=\"3429\" data-end=\"3452\">Unauthorised access<\/strong><br data-start=\"3452\" data-end=\"3455\">Devices sit in an open storeroom awaiting shredding. An employee quietly removes a few, which later appear for sale online. Even if they\u2019re recovered, the organisation must still report a GDPR breach because the devices were outside controlled custody.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3711\" data-end=\"4001\">In every one of these scenarios, the <strong data-start=\"3748\" data-end=\"3829\">data owner \u2014 not the courier or the contractor \u2014 remains legally responsible.<\/strong><br data-start=\"3829\" data-end=\"3832\">The absence of a clear, verifiable chain of custody creates <strong data-start=\"3892\" data-end=\"3955\">regulatory exposure, insurance risk and reputational damage<\/strong>, even if the drives are eventually destroyed.<\/p>\n<p data-start=\"4003\" data-end=\"4183\">That\u2019s why Secure ITAD designs its collection, transport and destruction processes to maintain a complete, unbroken audit trail for every asset from the moment it leaves your site.<\/p>\n\t\t\t<\/div>\n\t\n\t<div id=\"gap-504538972\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-504538972 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<div class=\"message-box relative dark\" style=\"padding-top:58px;padding-bottom:58px;\"><div class=\"message-box-bg-image bg-fill fill\" ><\/div><div class=\"message-box-bg-overlay bg-fill fill\" style=\"background-color:rgb(18, 18, 18);\"><\/div><div class=\"container relative\"><div class=\"inner last-reset\">\n\n<div class=\"row row-large align-center\"  id=\"row-2014866729\">\n\n\n\t<div id=\"col-1786112961\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2338495656\" class=\"text max--500\">\n\t\t\n\n<h3>Got a question or need some help with your IT Asset Disposal?<\/h3>\n\t\t\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1786112961 > .col-inner {\n  padding: 0px 0px 0px 0px;\n  margin: 0px 0px 10px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-2118873750\" class=\"col medium-5 small-12 large-5\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-213566328\" class=\"text\">\n\t\t\n\n<p>Get in touch with us today and let our team of qualified professionals take the stress and strain out of secure IT disposal<\/p>\n\t\t\n<style>\n#text-213566328 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-1403027361\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1403027361 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<a href=\"https:\/\/www.secure-itad.com\/uk-european-services\/it-asset-disposal\/\" class=\"button primary\" style=\"border-radius:99px;\">\n\t\t<span>Secure ITAD Services<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-2118873750 > .col-inner {\n  margin: 0px 0px -20px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n\n<\/div><\/div><\/div>\n<span class=\"scroll-to\" data-label=\"Scroll to: #prevent-custody-breaks\" data-bullet=\"false\" data-link=\"#prevent-custody-breaks\" data-title=\"How to Prevent Chain of Custody Breaks and How to Prevent It\"><a name=\"prevent-custody-breaks\"><\/a><\/span>\n\n\t<div id=\"gap-1576080062\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1576080062 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"text-932404797\" class=\"text article-underline\">\n\t\t\n\n<h2 data-start=\"210\" data-end=\"264\">How Chain of Custody Breaks (and How to Prevent It)<\/h2>\n<p data-start=\"407\" data-end=\"574\">Most chain of custody failures don\u2019t happen because people are careless \u2014 they happen quietly, when well-meaning teams rely on vague processes or informal handovers.<\/p>\n<p data-start=\"576\" data-end=\"653\">A few gaps in the process are all it takes for devices to slip off the radar.<\/p>\n<h3 data-start=\"655\" data-end=\"1081\"><span style=\"font-size: 80%;\">1. No clear asset records<\/span><\/h3>\n<p data-start=\"655\" data-end=\"1081\">Sometimes equipment is collected without a proper inventory or signatures. Without serial numbers logged, those devices effectively disappear from your records \u2014 and if one goes missing, you can\u2019t prove it ever left your site.<\/p>\n<p data-start=\"655\" data-end=\"1081\"><strong data-start=\"916\" data-end=\"938\">How to prevent it:<\/strong> Keep a complete asset register before release and require dual sign-off at collection. Secure ITAD includes this as standard on every project.<\/p>\n<h3 data-start=\"1083\" data-end=\"1473\"><span style=\"font-size: 80%;\">2. Unsecured transport<\/span><\/h3>\n<p data-start=\"1083\" data-end=\"1473\">Retired devices are often sent in unsealed boxes or handed to standard couriers. If anything is tampered with or stolen en route, you may never know which devices were taken \u2014 or who had access to them.<\/p>\n<p data-start=\"1083\" data-end=\"1473\"><strong data-start=\"1317\" data-end=\"1339\">How to prevent it:<\/strong> Use tamper-evident containers, GPS-tracked vehicles and security-vetted drivers to keep the chain of custody intact during transport.<\/p>\n<h3 data-start=\"1475\" data-end=\"1838\"><span style=\"font-size: 80%;\">3. Uncontrolled interim storage<\/span><\/h3>\n<p data-start=\"1475\" data-end=\"1838\">It\u2019s common for old devices to sit in storerooms or open offices while waiting for destruction. Without restricted access, anyone could remove them \u2014 and it might not be noticed for weeks.<\/p>\n<p data-start=\"1475\" data-end=\"1838\"><strong data-start=\"1704\" data-end=\"1726\">How to prevent it:<\/strong> Store data-bearing devices in secure, access-controlled holding areas with entry logs until they are destroyed.<\/p>\n<h3 data-start=\"1840\" data-end=\"2250\"><span style=\"font-size: 80%;\">4. Incomplete documentation<\/span><\/h3>\n<p data-start=\"1840\" data-end=\"2250\">Even if every device is eventually shredded, missing paperwork can still leave you exposed. If you can\u2019t prove when, where and by whom it was destroyed, regulators may treat it as a breach.<\/p>\n<p data-start=\"1840\" data-end=\"2250\"><strong data-start=\"2066\" data-end=\"2088\">How to prevent it:<\/strong> Secure ITAD logs every custody transfer, reconciles all assets on arrival, and issues Certificates of Destruction only once every serial number is accounted for.<\/p>\n<p data-start=\"2252\" data-end=\"2442\">Closing these gaps turns chain of custody from a loose paper trail into a defensible process \u2014 and gives you the evidence you need to pass audits, satisfy insurers and prove GDPR compliance.<\/p>\n\t\t\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #lifecycle\" data-bullet=\"false\" data-link=\"#lifecycle\" data-title=\"ITAD Chain of Custody Lifescycle\"><a name=\"lifecycle\"><\/a><\/span>\n\n\t<div id=\"gap-1543921631\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1543921631 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"text-2477896405\" class=\"text article-underline\">\n\t\t\n\n<h2><span data-preserver-spaces=\"true\">The Chain of Custody Lifecycle<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">A strong chain of custody protects your data from the moment equipment leaves your desk until it is shredded and recycled. It should include:<\/span><\/p>\n<h3><span style=\"font-size: 80%;\">1. Pre-collection<\/span><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Complete asset inventory with serial numbers<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Individual barcoding and tagging<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Tamper-evident seals applied to containers<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Authorised staff sign-off before release<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-size: 80%;\">2. Collection and transport<\/span><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Collection by security-vetted staff<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">GPS-tracked vehicles with locked secure compartments<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Real-time tracking of assets in transit<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Signed handover documentation at every transfer point<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-size: 80%;\">3. Arrival at facility<\/span><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Verification of seal integrity<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Scan and reconcile each asset against inventory<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Storage in restricted-access secure holding areas until destruction<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-size: 80%;\">4. Destruction<\/span><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Devices shredded to certified standards<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Witnessed destruction logged in real time<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Chain-of-custody<\/span><span data-preserver-spaces=\"true\"> record closed upon completion<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-size: 80%;\">5. Post-destruction<\/span><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Issue of Certificates of Destruction<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Final reconciliation report matching each certificate to its asset<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Secure retention of audit records for regulatory checks<\/span><\/li>\n<\/ul>\n\t\t\t<\/div>\n\t\n<span class=\"scroll-to\" data-label=\"Scroll to: #secure-itad\" data-bullet=\"false\" data-link=\"#secure-itad\" data-title=\"How Secure ITAD Exceeds Industry Standards\"><a name=\"secure-itad\"><\/a><\/span>\n\n\t<div id=\"gap-1791117109\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1791117109 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"text-3952732250\" class=\"text article-underline\">\n\t\t\n\n<h2 data-start=\"4479\" data-end=\"4524\">How Secure ITAD Exceeds Industry Standards<\/h2>\n<p data-start=\"4526\" data-end=\"4677\">Here\u2019s how our approach compares to typical industry practice:<\/p>\n<div class=\"_tableContainer_1rjym_1\">\n<div class=\"group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"4679\" data-end=\"5453\">\n<thead data-start=\"4679\" data-end=\"4764\">\n<tr data-start=\"4679\" data-end=\"4764\">\n<th data-start=\"4679\" data-end=\"4714\" data-col-size=\"sm\">Typical ITAD Provider<\/th>\n<th data-start=\"4714\" data-end=\"4764\" data-col-size=\"md\">Secure ITAD Approach<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"4850\" data-end=\"5453\">\n<tr data-start=\"4850\" data-end=\"4935\">\n<td data-start=\"4850\" data-end=\"4885\" data-col-size=\"sm\">Paper log sheets<\/td>\n<td data-start=\"4885\" data-end=\"4935\" data-col-size=\"md\">Encrypted digital asset tracking system<\/td>\n<\/tr>\n<tr data-start=\"4936\" data-end=\"5021\">\n<td data-start=\"4936\" data-end=\"4971\" data-col-size=\"sm\">No sealed containers<\/td>\n<td data-start=\"4971\" data-end=\"5021\" data-col-size=\"md\">Tamper-evident containers with unique IDs<\/td>\n<\/tr>\n<tr data-start=\"5022\" data-end=\"5108\">\n<td data-start=\"5022\" data-end=\"5057\" data-col-size=\"sm\">No GPS tracking<\/td>\n<td data-start=\"5057\" data-end=\"5108\" data-col-size=\"md\">GPS-tracked vehicles and security-vetted drivers<\/td>\n<\/tr>\n<tr data-start=\"5109\" data-end=\"5194\">\n<td data-start=\"5109\" data-end=\"5144\" data-col-size=\"sm\">No sign-offs<\/td>\n<td data-start=\"5144\" data-end=\"5194\" data-col-size=\"md\">Dual sign-off at every transfer point<\/td>\n<\/tr>\n<tr data-start=\"5195\" data-end=\"5280\">\n<td data-start=\"5195\" data-end=\"5232\" data-col-size=\"sm\">Assets stored in general warehouse<\/td>\n<td data-start=\"5232\" data-end=\"5280\" data-col-size=\"md\">Access-controlled secure holding areas<\/td>\n<\/tr>\n<tr data-start=\"5281\" data-end=\"5366\">\n<td data-start=\"5281\" data-end=\"5316\" data-col-size=\"sm\">Certificate of Destruction only<\/td>\n<td data-start=\"5316\" data-end=\"5366\" data-col-size=\"md\">Full custody logs + reconciliation report + CoD<\/td>\n<\/tr>\n<tr data-start=\"5367\" data-end=\"5453\">\n<td data-start=\"5367\" data-end=\"5402\" data-col-size=\"sm\">No audit trail retention<\/td>\n<td data-start=\"5402\" data-end=\"5453\" data-col-size=\"md\">Custody and destruction records retained 7 years<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\n\t<div id=\"gap-5844605\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-5844605 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p data-start=\"153\" data-end=\"464\">A secure chain of custody is the backbone of compliant IT asset disposal. It safeguards your organisation from data breaches, demonstrates that you\u2019ve met your legal obligations, and gives you confidence that every data-bearing device is protected from the moment it leaves your site until it\u2019s fully destroyed.<\/p>\n<p data-start=\"466\" data-end=\"641\">If you\u2019re reviewing your ITAD policy or planning an equipment refresh, our specialists can help you build a process that keeps your data safe.<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":13325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39],"tags":[],"class_list":["post-13316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industrie-nieuws"],"_links":{"self":[{"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/posts\/13316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/comments?post=13316"}],"version-history":[{"count":1,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/posts\/13316\/revisions"}],"predecessor-version":[{"id":13321,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/posts\/13316\/revisions\/13321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/media\/13325"}],"wp:attachment":[{"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/media?parent=13316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/categories?post=13316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.secure-itad.com\/nl\/wp-json\/wp\/v2\/tags?post=13316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}