By the Numbers
EPC’s Premium ITAD Services
Worldwide, we decommission thousands of IT assets each month at our processing facilities. Take a look at the latest numbers.
Assets processed each month
140000
Items recycled each week
8000
Percentage of assets received that are remarketed
90
Projects completed per month
735
Kilograms of e-waste recycled yearly
3175200
Hard drives shredded each month
18000
State-of-the-Art
Electronics Recycling
Explore EPC’s step-by-step ITAD process that was designed with security and sustainability in mind. Each step is performed according to regionally specific standards and ensures the utmost professionalism and data protection.
Recognised by the highest industry standards
Certifications
Learn more about EPC certifications as we pledge to operate in a globally-responsible manner.
Latest Blogs
Catch up on EPC announcements, industry news, information about e-waste recycling and more.
October 22, 2025
The Ultimate Guide to Compliant Hard Drive Destruction
The Ultimate Guide to Compliant Hard Drive Destruction What is hard drive destruction? Hard drive destruction is the process of permanently rendering data on a hard drive unreadable and unrecoverable. Unlike simply deleting files or reformatting, hard drive destruction ensuresSeptember 17, 2025
EPC Global Solutions Spain S.L. Achieves Multiple Certifications
(September 17, 2025) – EPC Global Solutions (EPC), a leader in global ITAD services and a wholly-owned subsidiary of CSI Leasing, Inc., recently announced its achievement of the following certifications at its facility in Spain (EPC Global Solutions Spain S.L.August 05, 2025
EPC, Inc. Awarded ISO 9001:2015 Certification for Quality Management System
ST. LOUIS (August 5, 2025) – EPC, Inc., (EPC) one of the world’s largest IT asset disposition (ITAD) providers, is pleased to announce that it has achieved ISO 9001:2015 Quality Management System Certification in the U.S. ISO 9001:2015 is anProtect sensitive data. Discover real value.
Let’s Connect
We tailor each and every ITAD project to reflect the customer’s security protocol. Contact us to build the solution that’s right for you.