Recycle Your Computers, Office Equipment, Servers, Automotive electronics and more

Electronics Recycling & Secure Asset Decommissioning

Recycle your electronics with confidence.

CLG Performance provides secure, professional electronics recycling and asset decommissioning services for decommissioned hardware. We specialize in proper handling, verified data destruction, and environmentally responsible disposal of electronic equipment.

We securely wipe and physically destroy storage media, including hard drives, using industry-accepted methods. When required, drives are physically destroyed through drilling or other irreversible techniques to ensure complete data elimination. We also recycle obsolete or damaged test equipment such as oscilloscopes, VNA equipment, servers, networking hardware, and surplus electronic components (resistors, capacitors, transistors, and similar inventory).

In addition to recycling, select non-sensitive test equipment may be donated to schools and educational programs interested in developing hands-on electronics courses. Our goal is to support the next generation by providing practical exposure to real-world electronics, diagnostics, and testing. Early access to hands-on learning helps students build confidence and better prepare for technical careers with or without a formal engineering degree.


Key Aspects of Asset Decommissioning

  • Data Security: Sensitive data is erased using certified software wiping methods or physical destruction to prevent unauthorized recovery.
  • Regulatory Compliance: Processes follow applicable legal and industry standards to help reduce organizational risk.
  • Environmental Responsibility: Materials are recycled properly, and hazardous components are handled in an environmentally safe manner.
  • Physical Removal: Equipment is safely packaged, transported, and removed, including large or specialized hardware when required.
  • Asset Lifecycle: Hardware is formally retired at end-of-life to support informed replacement and inventory decisions.
  • Documentation: Certificates of destruction/disposal and accountability records are provided.

Secure Data Destruction & Chain of Custody

Please complete our form if you would like CLG Performance to securely wipe storage devices or recycle electronic equipment.

All PCs, servers, NAS devices, and storage media are wiped in accordance with U.S. Department of Defense (DoD) standards or higher. Each drive is tested after wiping to confirm compliance. We provide complete documentation of the data destruction process, including a chain-of-custody record identifying each individual who had access to the hardware prior to destruction.

Security oversight for all decommissioning activities is managed directly by Chad Gill.

All hardware is inventoried and verified prior to pickup. A checklist must be completed by the company requesting decommissioning, and every item must be accounted for. Any hardware not listed or missing will be treated as a potential security incident. Company ownership or senior management will be notified for investigation.


Inventory & Documentation Requirements

The following items must be documented and verified:

  • Hard drives (including serial numbers)
  • Computers and servers (including serial numbers)
  • Memory modules installed in systems
  • Server racks, switches, routers, and networking hardware
  • UPS and battery backup systems
  • Test equipment (serial numbers, part numbers, and internal memory where applicable)

Your organization’s IT department is responsible for indexing and verifying all equipment prior to decommissioning.


Equipment Donation & Training Use

Decommissioned test equipment that does not contain sensitive data may be eligible for donation. Approved donated equipment may also be used internally by CLG Performance as training and educational hardware to support technician development and hands-on learning.


Asset Decommissioning Form

Use this form to request secure data destruction and recycling for decommissioned IT and electronic equipment. Please complete all applicable sections. A complete and accurate inventory is required prior to pickup. One form required per service request.


1) Company Information

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Pickup Address:

Invalid Input

Invalid Input

Invalid Input

Invalid Input


2) Service Request

Requested Services (select all that apply):

(*)
Invalid Input


Invalid Input

Invalid Input


3) Data Destruction Standard

Comparison of Popular Wipe Types
Passes Methodology Use Case
NIST Clear 1 Single pass of zeros with verification. Standard reuse within an organization.
NIST Purge 1+ Uses internal firmware commands (Secure Erase). High-security decommissioning; effective for SSDs.
DoD 5220.22-M 3 1: Zeros; 2: Ones; 3: Random pattern. Legacy industry standard; still widely used in software.
DoD 5220.22-M (ECE) 7 Seven passes of varying patterns (0s, 1s, and random). Extremely high-security for older magnetic media.
Gutmann Method 35 Complex sequence of 35 passes. Obsolete; designed for very old MFM/RLL drives.
Random Data 1-2 Overwrites disk with pseudorandom bits. Basic protection against software recovery tools.

All storage devices will be wiped to U.S. Department of Defense (DoD) standards or higher, unless a different standard is requested and approved. Drives may be physically destroyed by drilling or other irreversible methods when selected.

Invalid Input

Invalid Input


4) Inventory Summary

Provide a summary of the equipment being decommissioned. A detailed itemized list with serial numbers is required in Section 5.

Invalid Input

Invalid Input

Invalid Input


5) Required Itemized Inventory (Serial Numbers)

List all equipment and media included in this decommissioning request. Include serial numbers and quantities. If an item is not listed, it will be treated as not authorized for custody.

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input


6) Donation Review (Optional)

If you would like CLG Performance to evaluate eligible non-sensitive equipment for donation or training use, provide details below. All donation candidates must be verified as free of sensitive data and approved before release.

Invalid Input


7) Chain of Custody & Access Control

The requesting organization is responsible for ensuring all assets are secured until transfer. List authorized personnel who may handle assets prior to pickup.

Invalid Input

Invalid Input


8) Terms, Accountability & Security Notice

All hardware must be inventoried and verified prior to pickup. A checklist must be completed by the requesting organization. Any hardware not listed, missing, or not accounted for prior to transfer may be treated as a potential security incident. If a discrepancy is identified, company ownership or senior management will be notified for investigation.

CLG Performance will provide documentation of services performed, including verification results and certificates of destruction/disposal when requested. Security oversight for decommissioning activities is managed by Chad Gill.


9) Authorization

By signing below, you certify that you are authorized to request decommissioning services for the assets listed in this form and that the inventory provided is complete and accurate to the best of your knowledge.

Invalid Input

Invalid Input

Invalid Input

Invalid Input