Instructions for Processing Security-Locked Devices

Utilizing security tools such as passwords, Computrace/Intune, and mobile device management software are reliable methods for restricting unauthorized access to your company’s protected information. However, these methods can create barriers to testing, refurbishing, and reselling IT equipment if the Cascade team cannot gain access into the devices. The good news is we offer methods for removing security locks, helping you maximize the number of items that can be reused.

To help us efficiently and securely respond to the various locks that may be placed on your IT devices, we request that you establish a process for each device type. Please complete the form below:

Instructions for Processing Locked Devices
Select device type(s): (check all that apply)

Laptops

Select the security type(s) you use for Laptops (check all that apply):
Select the instruction for BIOS Passwords on Laptops:
Select the instruction for Computrace/Absolute Locks on Laptops:
Select the instruction for Microsoft Intune/Autopilot/MDM Locks on Laptops:
Select the instruction for Other Locks on Laptops:

Desktops

Select the security type(s) you use for Desktops (check all that apply):
Select the instruction for BIOS Passwords on Desktops:
Select the instruction for Computrace/Absolute Locks on Desktops:
Select the instruction for Microsoft Intune/Autopilot/MDM Locks on Desktops:
Select the instruction for Other Locks on Desktops:

Handheld Mobile Devices

Select the security type(s) you use for Mobile Devices (check all that apply):
Select the instruction for Activation Locks on Mobile Devices:
Select the instruction for BIOS Passwords on Mobile Devices:
Select the instruction for MDM Locks on Mobile Devices:
Select the instruction for Other Locks on Mobile Devices:

Network Devices

Select the security type(s) you use for Network Devices (check all that apply):
Select the instruction for when a Network Device is assigned to an account:
Select the instruction for Other Locks on Network Devices:

Rack Mount Servers

Select the security type(s) you use for Servers (check all that apply):
Select the instruction for BIOS Passwords on Servers:
Select the instruction for Computrace/Absolute Locks on Servers:
Select the instruction for Microsoft Intune/Autopilot/MDM Locks on Servers:
Select the instruction for Other Locks on Servers:
Company Contact for Locked Devices:
Company Contact for Locked Devices:
First
Last

Authorization

I understand that if Cascade requests instructions for processing my company's device(s) and there is no response within 30 days, the item(s) in question will be recycled.
I understand that if Cascade requests instructions for processing my company's device(s) and there is no response within 30 days, the item(s) in question will be recycled.
First
Last