{"id":4718,"date":"2023-09-18T18:34:00","date_gmt":"2023-09-18T18:34:00","guid":{"rendered":"https:\/\/recomp.5oclock.io\/?p=4718"},"modified":"2024-04-06T02:22:34","modified_gmt":"2024-04-06T02:22:34","slug":"protect-your-brand-dont-let-ewaste-become-your-achilles-heel","status":"publish","type":"post","link":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/","title":{"rendered":"Protect Your Brand: Don&#8217;t Let eWaste Become Your Achilles Heel"},"content":{"rendered":"\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"border:1px solid rgba(193, 46, 107, 0.3); color:#000018;  font-family:'Poppins'; font-size:14px; line-height: 18px; padding: 10px 2em 10px 10px; display: inline-block;\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/01\/compucom-jennifer-brooks.png\" style=\"margin-top: -40px; float: left; max-width: 60px; border-radius: 50px; box-shadow: 1px 1px 5px 1px #999;\" alt=\"Jennifer Brooks, Senior Director of Operations\"><p style=\"padding-left:6em; margin:0;\"><strong>Jennifer Brooks<\/strong> \u2022\u202fSenior Director of Operations<\/p><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">How IT Asset Disposition Drives Data Security and Sustainability<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Every year, organizations discard millions of tons of outdated equipment. If not handled correctly, your old devices could become a security Achilles heel, damaging your reputation and your brand.<\/p>\n\n\n\n<p class=\"blog-link\">With the <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" rel=\"noreferrer noopener\" target=\"_blank\">average cost of a data breach<\/a> in the United States topping $9.44 million in 2022, almost double the global \u201call-time high\u201d average of $4.35 million, it&#8217;s critically important that none of the information stored on old computers, servers, tablets, smartphones, or printers falls into the wrong hands.<\/p>\n\n\n\n<p>There are three major tenets of a proper <strong>IT Asset Disposition (ITAD)<\/strong> process:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blog-link\"><a href=\"#custody\">A detailed chain of custody<\/a><\/li>\n\n\n\n<li class=\"blog-link\"><a href=\"#security\">Secure facilities<\/a><\/li>\n\n\n\n<li class=\"blog-link\"><a id=\"custody\"><\/a><a href=\"#data\">Data security<\/a><\/li>\n<\/ul>\n\n\n\n<p>Having these in place helps safeguard our customers&#8217; data and protect their reputations while simultaneously promoting and adhering to sustainability goals and best practices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"custody\" style=\"font-size:30px;font-style:normal;font-weight:600\">Detailed Chain of Custody<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Protecting your retired devices&#8217; data means keeping track of where they are and controlling access. From when devices leave your hands to the end of disposition, it\u2019s essential to have a detailed chain of custody and extra measures such as secure packaging and shipping with vetted freight carriers.<a><\/a><\/p>\n\n\n\n<p class=\"blog-link\">Our customers trust us with their assets, data, and network access, and we don&#8217;t take that lightly. We have <a href=\"https:\/\/www.compucom.com\/sustainability\/\" rel=\"noreferrer noopener\" target=\"_blank\">Advanced Configuration Centers<\/a> in Paulsboro, New Jersey, and Markham, Ontario, that are central to our overall device lifecycle services. From procurement through delivery and ending in secure disposition, we treat all asset data as proprietary and confidential and ensure the integrity of a well-documented chain-of-custody process.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"security\" style=\"font-size:30px;font-style:normal;font-weight:600\">Facility Security<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A tightly controlled environment is a crucial aspect of any facility dealing with your IT assets. Some examples of risk mitigation we use include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perimeter alarm system monitored by a central station<\/li>\n\n\n\n<li>Metal detectors, camera surveillance, and a 24\/7 on-premises security team<\/li>\n\n\n\n<li>Strictly enforced access and visitor policies<\/li>\n\n\n\n<li>Required background checks and regular training for all personnel<\/li>\n<\/ul>\n\n\n\n<p>Who enters the facilities is limited by key-card access. Customer assets are in alarm-protected segregated areas; the system is triggered by any attempted entry by an unauthorized individual. We ensure visitor escorts accompany customers, truck drivers, or third-party vendors who need access. All visitors are accounted for \u2014 a visitor sign-in log maintains visibility of who enters the building at any time.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"data\" style=\"font-size:30px;font-style:normal;font-weight:600\">Data Security<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>For customers with assets that still have market value or hard drives, they plan to redeploy, an ironclad data wipe renders data scrambled, leaving no traces of the original data to be recovered. Any facility with disposal methods should present customers with certificates of destruction. This allows customers to hold their facility partners accountable, as well as keep a record of their devices.<\/p>\n\n\n\n<p>Protecting corporate identity is top of mind for us. And the devil is in the details. For example, we ensure the removal of asset tags and other identification labels before disposition.&nbsp;<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">The Compucom Difference&nbsp;<\/h2>\n\n\n\n<p>Electronics are the fastest-growing solid waste stream in the US and are 70% of the toxic waste, yet less than a quarter of it is recycled. Keeping as much e-waste as possible out of landfills helps meet organizations&#8217; sustainability goals and enhances a brand&#8217;s reputation.&nbsp;<\/p>\n\n\n\n<p class=\"blog-link\">Compucom&#8217;s Advanced Configuration Center in Paulsboro, NJ, maintains environmental standards through stewardship programs like the <a href=\"https:\/\/www.youtube.com\/watch?v=7GlIIjUhiAU\" rel=\"noreferrer noopener\" target=\"_blank\">ISO 14001 Environmental Management System<\/a>. This program encompasses a framework designed to minimize a facility&#8217;s impact on the environment, help reduce the risk of pollution, and meet local, state, and federal regulations.&nbsp;<\/p>\n\n\n\n<p>Reducing e-waste is a key component of IT sustainability, and one way to do this is by identifying devices with resale value. A perk is the extra income your company can make from reselling devices, which can help offset your cost of buying new technology. Devices that no longer have value and cannot be resold are transferred to a certified partner for EPA compliance, eco-conscious disposal, and e-waste recycling.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Don&#8217;t Let Old Devices Come Back to Haunt You<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>While many organizations focus on implementing new technology, what happens to the devices you replace is just as important. Improper IT asset disposition can lead to data breaches and damage your brand reputation. Proper recycling supports your sustainability initiatives and helps keep dangerous e-waste out of landfills.&nbsp;<\/p>\n\n\n\n<p>Reach out to learn more about ITAD security and sustainability methods and hear how Compucom&#8217;s Advanced Configuration Centers can help you reach your goals.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every year, organizations discard millions of tons of outdated equipment. If not handled correctly, your old devices could become a security Achilles heel, damaging your reputation and your brand.<\/p>\n","protected":false},"author":8,"featured_media":4719,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[44],"tags":[77,73,78],"class_list":["post-4718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-device-lifecycle-services","tag-data-security","tag-itad","tag-sustainability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Brand: Don&#039;t Let eWaste Become Your Achilles Heel - Compucom<\/title>\n<meta name=\"description\" content=\"ITAD or IT asset disposal can help prevent data breaches and reduce e-waste through recycling.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Brand: Don&#039;t Let eWaste Become Your Achilles Heel - Compucom\" \/>\n<meta property=\"og:description\" content=\"ITAD or IT asset disposal can help prevent data breaches and reduce e-waste through recycling.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/\" \/>\n<meta property=\"og:site_name\" content=\"Compucom\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-18T18:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-06T02:22:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2024\/01\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marketing Compucom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing Compucom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/\"},\"author\":{\"name\":\"Marketing Compucom\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\"},\"headline\":\"Protect Your Brand: Don&#8217;t Let eWaste Become Your Achilles Heel\",\"datePublished\":\"2023-09-18T18:34:00+00:00\",\"dateModified\":\"2024-04-06T02:22:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg\",\"keywords\":[\"Data Security\",\"ITAD\",\"Sustainability\"],\"articleSection\":[\"Device Lifecycle Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/\",\"name\":\"Protect Your Brand: Don't Let eWaste Become Your Achilles Heel - Compucom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg\",\"datePublished\":\"2023-09-18T18:34:00+00:00\",\"dateModified\":\"2024-04-06T02:22:34+00:00\",\"description\":\"ITAD or IT asset disposal can help prevent data breaches and reduce e-waste through recycling.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Person working to fix a laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.compucom.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Brand: Don&#8217;t Let eWaste Become Your Achilles Heel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"name\":\"Compucom\",\"description\":\"Technology Driven. People Powered.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.compucom.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\",\"name\":\"CompuCom Systems Inc\",\"alternateName\":\"Compucom\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"width\":512,\"height\":512,\"caption\":\"CompuCom Systems Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compucom\\\/posts\\\/?feedView=all\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\",\"name\":\"Marketing Compucom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"caption\":\"Marketing Compucom\"},\"url\":\"https:\\\/\\\/www.compucom.com\\\/author\\\/marketing_chicomp101\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Brand: Don't Let eWaste Become Your Achilles Heel - Compucom","description":"ITAD or IT asset disposal can help prevent data breaches and reduce e-waste through recycling.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Brand: Don't Let eWaste Become Your Achilles Heel - Compucom","og_description":"ITAD or IT asset disposal can help prevent data breaches and reduce e-waste through recycling.","og_url":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/","og_site_name":"Compucom","article_published_time":"2023-09-18T18:34:00+00:00","article_modified_time":"2024-04-06T02:22:34+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2024\/01\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg","type":"image\/jpeg"}],"author":"Marketing Compucom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing Compucom","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#article","isPartOf":{"@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/"},"author":{"name":"Marketing Compucom","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a"},"headline":"Protect Your Brand: Don&#8217;t Let eWaste Become Your Achilles Heel","datePublished":"2023-09-18T18:34:00+00:00","dateModified":"2024-04-06T02:22:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/"},"wordCount":732,"publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"image":{"@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/01\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg","keywords":["Data Security","ITAD","Sustainability"],"articleSection":["Device Lifecycle Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/","url":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/","name":"Protect Your Brand: Don't Let eWaste Become Your Achilles Heel - Compucom","isPartOf":{"@id":"https:\/\/www.compucom.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#primaryimage"},"image":{"@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/01\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg","datePublished":"2023-09-18T18:34:00+00:00","dateModified":"2024-04-06T02:22:34+00:00","description":"ITAD or IT asset disposal can help prevent data breaches and reduce e-waste through recycling.","breadcrumb":{"@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#primaryimage","url":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/01\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg","contentUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/01\/Compucom-Blog-Protect-Your-Brand-Dont-Let-eWaste-Become-Your-Achilles-Heel.jpg","width":1200,"height":628,"caption":"Person working to fix a laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.compucom.com\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.compucom.com\/"},{"@type":"ListItem","position":2,"name":"Protect Your Brand: Don&#8217;t Let eWaste Become Your Achilles Heel"}]},{"@type":"WebSite","@id":"https:\/\/www.compucom.com\/#website","url":"https:\/\/www.compucom.com\/","name":"Compucom","description":"Technology Driven. People Powered.","publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.compucom.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.compucom.com\/#organization","name":"CompuCom Systems Inc","alternateName":"Compucom","url":"https:\/\/www.compucom.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","contentUrl":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","width":512,"height":512,"caption":"CompuCom Systems Inc"},"image":{"@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compucom\/posts\/?feedView=all"]},{"@type":"Person","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a","name":"Marketing Compucom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","caption":"Marketing Compucom"},"url":"https:\/\/www.compucom.com\/author\/marketing_chicomp101\/"}]}},"_links":{"self":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/4718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/comments?post=4718"}],"version-history":[{"count":2,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/4718\/revisions"}],"predecessor-version":[{"id":5881,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/4718\/revisions\/5881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media\/4719"}],"wp:attachment":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media?parent=4718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/categories?post=4718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/tags?post=4718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}