Instructions for Processing Security-Locked Devices
Utilizing security tools such as passwords, Computrace/Intune, and mobile device management software are reliable methods for restricting unauthorized access to your company’s protected information. However, these methods can create barriers to testing, refurbishing, and reselling IT equipment if the Cascade team cannot gain access into the devices. The good news is we offer methods for removing security locks, helping you maximize the number of items that can be reused.
To help us efficiently and securely respond to the various locks that may be placed on your IT devices, we request that you establish a process for each device type. Please complete the form below: