Storage circular

Secure, compliant, and sustainable.

IT Asset Disposition (ITAD)

Maximise the value of your surplus IT equipment by giving it a second life. As a trusted ITAD company, we help you showcase your sustainability commitment while strengthening data security and compliance.

Get a free valuation
  • Quick to:

What is ITAD?

IT Asset Disposition (ITAD) is the process of securely disposing of outdated or unwanted IT hardware like laptops, computers, servers and mobile devices. The goal is to recycle or refurbish items responsibly, while ensuring data security. Compliance with legal regulations is key.

As a leading ITAD company, Circular IT group ensures secure data wiping and environmentally friendly recycling. We also help you with asset recovery, turning your old tech into new opportunities. A smart move for both security and sustainability.

Circular IT group specialises in ITAD services, including surplus IT equipment disposal, data centre dismantling, certified data erasure and computer recycling. We handle global disposal for medium to large organisations, trusted by over 90 multinationals. Transparent reporting and eco-friendly. Discover everything about ITAD in our blog.

Get a free valuation
ITAD IT Asset Disposition

Buyback - IT Asset recovery

Turn your surplus IT hardware into cash! Circular IT group picks up your equipment and offers an attractive residual value, based on brand, quantity and technical specifications. We buy from a minimum of 10 items.

Ask for a free valuation today!

IT Asset recovery

IT Recycling

We collect, process and dismantle outdated IT equipment: such as computers, laptops, printers and monitors, to recover valuable materials and components.

All recycling is carried out securely and in compliance with WEEELABEX standards, with 100% data security guaranteed.

IT recycling

Data wiping

Protect your organisation with certified data erasure. Avoid data leaks, reputational damage and penalties.

We use Blancco software, globally recognised for secure and permanent data erasure. Includes full reporting and responsible disposal of your IT hardware.

Data erasure

Data destruction

Data destruction you can trust. Formatting doesn’t fully erase data. We physically destroy storage devices using industrial shredders, making data irretrievable.

Circular IT group performs destruction on-site or at our secure facility, ensuring maximum control and security.

Data destruction

Data center decommisioning

Specialist, secure, hassle-free. Our team efficiently dismantles servers, racks and cables.

Benefit from on-site data erasure, certified recycling and a high return on your surplus datacenter equipment.

Data center Decommissioning

Safe and Responsible ITAD Services

As a trusted ITAD company, we take care of everything: from secure data destruction to responsible hardware processing. Our eco-conscious approach helps reduce costs, recover value, and ensure full compliance, while minimising environmental impact.

  • Minimise e-waste, conserve resources
  • Ensure data destruction, maintain compliance
  • Reduce costs, recover value
  • Boost image, demonstrate ethics
  • ISO 9001, ISO 14001, ISO 27001
Acquire Deploy Manage Refresh circle

Benefits of our ITAD services:

Data Security & Compliance

We prioritise data security with certified processes to safeguard your sensitive information.

Environmental Sustainability

Our circular approach minimises e-waste and promotes responsible recycling practices.

Maximize Return on Investment (ROI)

Recover value from your used IT equipment through our buyback programs.

Peace of Mind

Experience a stress-free IT asset disposal process with our expert team handling everything.

Our ITAD locations

United Kingdom

ITAD UK

Belgium

ITAD Belgium

Denmark

ITAD Denmark

Netherlands

ITAD Netherlands

What kind of IT hardware do we buy?

We buy your used business IT equipment. Please check whether the hardware you want to sell still works, is complete and in good condition.

  • Laptops
  • Desktops
  • Smartphones
  • Tablets
  • Printers
  • Scanners
  • Networking equipment
  • Servers and Storage
Personal Computing - Laptops

ITAD process

Storage circular

Pick-Up

We pick up your surplus hardware at your location at the time we agree.

transport

Transport

We take your hardware away using our own secure transport.

Registratie citg

Registration

All your hardware is registered upon arrival.

data erasure

Certified Data Wiping

All data is wiped from your hardware securely.

refurbished it apparatuur citg

Preparation for a second life

We give your old hardware a second life.

Acquisition options circular it

Reporting and payment

You receive data wiping certificates, a detailed report and the agreed residual value.

FAQ: IT Asset Disposition

  • What is the difference between ITAR and ITAD?

    IT asset recovery (ITAR) and IT asset disposition (ITAD) are two closely related terms that are often used interchangeably, but they have distinct meanings.

    IT Asset Recovery

    IT asset recovery encompasses the entire process of managing the end-of-life lifecycle of IT assets, from identifying and securing them to data destruction, recycling or repurposing, and finally, disposal. It’s a comprehensive approach that aims to maximize the value of IT assets while ensuring data security and environmental sustainability.

    IT Asset Disposition

    IT asset disposition (ITAD) specifically refers to the disposal of IT assets, including physical destruction, shredding, or recycling. It’s a crucial step in the ITAR process, ensuring that sensitive data is permanently erased and that the assets are handled responsibly to minimize environmental impact.

  • When is ITAD relevant?

    ITAD becomes relevant when your IT equipment reaches the end of its useful life. This moment varies by company and use case.

    What may be outdated for you can still be valuable to others. Taking timely action helps you avoid data risks, reduce costs, and support sustainability.

  • Why is this process important?

    IT Asset Disposition ensures old IT is handled securely, protects sensitive data, and recovers value from surplus equipment. It blends security, environmental care, and financial benefit.

  • How does ITAD contribute to sustainability goals?

    ITAD promotes reuse and recycling of IT equipment. It reduces e-waste and CO₂ emissions. This supports goals like the circular economy. Calculate your impact with our impact calculator.

  • In which countries does CITg provide this service?

    CITg operates across Europe, with offices in the Netherlands, the UK, Germany, and France, and broader coverage via our partner network.

  • Are sub-services available individually?

    Yes. You can order individual ITAD services such as hardware buy-back, recycling, data erasure, or physical destruction.

  • What documentation will I receive during the process?

    You’ll get a receipt, a data erasure or destruction report, and an overview of reuse or recycling, all fully compliant with regulations.

  • Is ITAD the same as recycling?

    No. ITAD covers more than recycling. IT includes data wiping, refurbishing, and resale. Recycling is just one part.

  • How is data removal handled?

    We use Blancco’s globally certified Data Erasure software, approved by agencies like the AIVD. Data is completely and irreversibly erased, ensuring no sensitive information remains.

Daan van Nieuwenhoven

Daan van Nieuwenhoven

Request a valuation

"*" indicates required fields

Not intended for private individuals
Drop files here or
Max. file size: 4 MB.
    This field is for validation purposes and should be left unchanged.

    Relevant articles

    blog Infrastructure requirements for GPT-OSS

    What are the infrastructure requirements for GPT-OSS?

    Discover how GPT-OSS empowers enterprises with full data control, customisation, and offline AI capabilities. Learn what infrastructure is needed to run GPT-OSS at scale, the benefits of renting versus buying hardware, and how expert support can help you build, test, and deploy AI solutions confidently and cost-effectively.

    Read more about What are the infrastructure requirements for GPT-OSS?