www.oceantech.com
Open in
urlscan Pro
100.21.93.233
Public Scan
Submitted URL: http://www.oceantech.com/
Effective URL: https://www.oceantech.com/
Submission: On September 14 via api from US — Scanned from DE
Effective URL: https://www.oceantech.com/
Submission: On September 14 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="general-newsletter-signup-8" class="yikes-easy-mc-form yikes-easy-mc-form-8 " method="POST" data-attr-form-id="8">
<label for="yikes-easy-mc-form-8-FNAME" class="FNAME-label yikes-mailchimp-field-required ">
<!-- dictate label visibility -->
<!-- Description Above -->
<input id="yikes-easy-mc-form-8-FNAME" name="FNAME" placeholder="Name" class="yikes-easy-mc-text field-no-label" required="required" type="text" value="">
<!-- Description Below -->
</label>
<label for="yikes-easy-mc-form-8-EMAIL" class="EMAIL-label yikes-mailchimp-field-required ">
<!-- dictate label visibility -->
<!-- Description Above -->
<input id="yikes-easy-mc-form-8-EMAIL" name="EMAIL" placeholder="Email" class="yikes-easy-mc-email field-no-label" required="required" type="email" value="">
<!-- Description Below -->
</label>
<!-- Honeypot Trap -->
<input type="hidden" name="yikes-mailchimp-honeypot" id="yikes-mailchimp-honeypot-8" value="">
<!-- List ID -->
<input type="hidden" name="yikes-mailchimp-associated-list-id" id="yikes-mailchimp-associated-list-id-8" value="cbc6a132cb">
<!-- The form that is being submitted! Used to display error/success messages above the correct form -->
<input type="hidden" name="yikes-mailchimp-submitted-form" id="yikes-mailchimp-submitted-form-8" value="8">
<!-- Submit Button -->
<button type="submit" class="yikes-easy-mc-submit-button yikes-easy-mc-submit-button-8 btn btn-primary "> <span class="yikes-mailchimp-submit-button-span-text">Submit</span></button> <!-- Nonce Security Check -->
<input type="hidden" id="yikes_easy_mc_new_subscriber_8" name="yikes_easy_mc_new_subscriber" value="19226ade40">
<input type="hidden" name="_wp_http_referer" value="/">
<input type="hidden" id="apbct_visible_fields_0" name="apbct_visible_fields"
value="{"0":{"visible_fields":"FNAME EMAIL","visible_fields_count":2,"invisible_fields":"yikes-mailchimp-honeypot yikes-mailchimp-associated-list-id yikes-mailchimp-submitted-form yikes_easy_mc_new_subscriber _wp_http_referer","invisible_fields_count":5}}">
</form>
Text Content
* HOME * SOLUTIONS * Decommissioning * ITAD * Value Recovery * Data Security * Ship to Us Program * RESOURCES * Blog * Privacy Policy * Terms & Conditions * EHS Policy * ABOUT * Who we are * Our Approach * Careers * Certifications * CONTACT * HOME * SOLUTIONS * Decommissioning * ITAD * Value Recovery * Data Security * Ship to Us Program * RESOURCES * Blog * Privacy Policy * Terms & Conditions * EHS Policy * ABOUT * Who we are * Our Approach * Careers * Certifications * CONTACT REQUEST A QUOTE REQUEST A PICKUP REQUEST A QUOTE REQUEST A PICKUP * HOME * SOLUTIONS * Decommissioning * ITAD * Value Recovery * Data Security * Ship to Us * RESOURCES * Blog * Privacy Policy * Terms & Conditions * EHS Policy * ABOUT * About * Our Approach * Careers – OceanTech | Current Openings at OceanTech * Certifications * CONTACT * HOME * SOLUTIONS * Decommissioning * ITAD * Value Recovery * Data Security * Ship to Us * RESOURCES * Blog * Privacy Policy * Terms & Conditions * EHS Policy * ABOUT * About * Our Approach * Careers – OceanTech | Current Openings at OceanTech * Certifications * CONTACT YOUR MOST TRUSTED ITAD PARTNER IT IS THAT SIMPLE OUR APPROACH DECOMMISSIONING Our white-glove approach to decommissioning means our technicians will complete your project efficiently, on-time, and under budget in accordance with your specific needs. ITAD OceanTech provides an expansive array of ITAD services, while outperforming original manufacturers and off-lease pricing in acquiring and processing your end of life assets. VALUE RECOVERY Whether rotating out off-lease equipment or utilizing full IT Asset Disposition services, we will return the maximum value to you, the client, for any equipment removed by OceanTech. DATA SECURITY We are dedicated to protecting your data. The experts at OceanTech will help you retire, re-assign, or recycle any company assets in the most effective and secure way possible. DECOMMISSIONING Our white-glove approach to decommissioning means our technicians will complete your project efficiently, on-time, and under budget in accordance with your specific needs. LEARN MORE ITAD OceanTech provides an expansive array of ITAD services, while outperforming original manufacturers and off-lease pricing in acquiring and processing your end-of-life assets. LEARN MORE VALUE RECOVERY Whether rotating out off-lease equipment or utilizing full IT Asset Disposition services, we will return the maximum value to you, the client, for any equipment removed by OceanTech. LEARN MORE DATA SECURITY We are dedicated to protecting your data. The fully vetted experts at OceanTech will help you retire, re-assign, or recycle any company assets in the most effective and secure way possible. LEARN MORE DATA CENTER DECOMMISSIONING Each piece of equipment removed by OceanTech is logged with its corresponding make, model and serial number during dismantling. Each client receives these detailed records of all removed equipment. The equipment is secured with a tamper evident seal before being placed for departure in one of our GPS monitored vehicles, giving each client the assurance that every piece of equipment is effectively protected. Upon arriving at our secure facility, our secure client portal will give you (the client) the ability to monitor and track all of your assets. This custom reporting and tracking system gives you peace of mind by ensuring full accountability of your assets from pick-up to completion. LEARN MORE IT ASSET DISPOSITION OceanTech believes that reuse is the best form of recycling and we follow a strict “no-landfill” policy. We use best practices for environmentally friendly and responsible recycling, and we maximizing material recovery for reuse. Our thoroughly secured facilities creates a superior environment for our state-of-the-art data wiping and erasing process as well as the testing, evaluation, remarketing and shipment of electronics. Our wide network of remarketing channels and licensed recyclers allows us to pay more for your retired assets while offering convenient, nationwide logistics support and arranging a full-service package that meets your requirements. LEARN MORE VALUE RECOVERY While performing the sorting and testing process, our IT asset recovery experts will assist in determining the maximum value of all retired assets and return value as credit to you. This also ensures your assets will not needlessly end up in the e-waste recycling stream. Any equipment that still holds market value will be cataloged for reimbursements, sanitized of all data, reset to factory default settings and returned to grade-A condition to guarantee the best possible resale rate. Once refurbished, our expert sales team works within our exceptional network of trusted consumers to ensure your equipment is sold to the best end-user, or IT hardware broker, for maximum return on your assets.. LEARN MORE DATA SECURITY OceanTech is dedicated to protecting your data, including your clients’ data. Our secure chain of custody from the moment we take control of your equipment, through the transportation of equipment back to our facility, we also offers several levels of security once arriving, through data sanitization and/or physical hard drive destruction. All certified data destruction is performed by full-time, fully vetted OceanTech technicians, and is never outsourced, so you can be assured that your data is being handled safely and responsibly. Our process ensures that all retired assets from your organization are wiped clean of any and all information, virtually eliminating the risk of a costly data breach. LEARN MORE WHAT MAKES US UNIQUE As a leader in ITAD and data center decommissioning, it is vital that we meet or exceed all industry standards and data destruction regulations. We do this by maintaining R2:2013 Responsible Recycling, ISO 14001:2015 Environmental Management System and ISO 45001:2018 Occupational Health and Safety Management System certifications. RISK MITIGATION Every data containing device that passes through an OceanTech facility receives compliant, top-notch data destruction. We follow a strict, thoroughly evaluated process to ensure complete data security and risk mitigation are achieved. CHAIN-OF-CUSTODY OceanTech will tailor a secure chain-of-custody and logistics plan for your scheduled service, creating a custom package for all of your locations throughout North America. COMPLIANCE OceanTech provides our clients online access, through use of our secure customer portal, to give clients the direct ability to schedule pickups, track individual projects, generate asset reports, view certificates of destruction, and invoice reports. SHIP- TO- US PROGRAM As a leader in the ITAD industry, OceanTech has developed a safe and secure “Ship- to- Us” program to help everyone from independent contractors to IT Managers and CTOs easily manage their IT hardware. The program allows you to send your laptops, tablets, Chromebooks, PCs, Macs, and peripherals directly to our facility from anywhere, whether an on-site, satellite office, or retail location. LEARN MORE STAY INFORMED ABOUT LATEST INDUSTRY NEWS Submit ABOUT US Since 2005, we have been providing ITAD services to thousands of clients throughout North America, from small businesses to Fortune 500 companies. CONTACT US 1313 Winter St NE, Minneapolis, MN 1-844-482-3669 info@oceantech.com SOLUTIONS ITAD Decommissioning Value Recovery Data Security Ship to Us LINKS Contact Careers Blog Terms & Conditions Privacy Policy We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. Cookie settingsACCEPT Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Non-necessary Non-necessary Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. SAVE & ACCEPT PIN IT ON PINTEREST