How To: Deactivate Find My iPhone or iPad Security Feature for Apple Devices Running iOS 8 When Selling Used iPhones and iPads to e-Cycle

The Find My iPhone/iPad service is available on all Apple devices running iOS 8 as part of iCloud. This beneficial technology makes it more difficult for anyone to access or sell your device in the event it is lost or stolen. While Apple’s security feature is a helpful data security measure, it also prevents e-Cycle’s security team from accessing the device to ensure your private data has been thoroughly sanitized.

To avoid lengthy delays in processing and possible forfeiture of payment, this security feature must be deactivated on your iPhones and iPads prior to shipping them to e-Cycle.

If you’re not sure if you’ve installed iOS 8, go to Settings> General> About> Version. The number beside Version will start with “8.”

Please follow the simple steps below to deactivate the Find My iPhone/iPad security feature or watch the embedded video:

  1. Go to the Settings app on your device
  2. Select “iCloud”
  3. Scroll down to “Find My iPhone/iPad” and toggle the button to the “Off” position
  4. Enter Apple ID password and turn off Find My iPhone

How to Deactivate Find My iPhone Security Lock on Apple iOS 8 Devices from e-Cycle LLC. on Vimeo.

It’s important to never remotely wipe, lock or mark your device as lost or stolen using iTunes or iCloud when sending it to e-Cycle because it will reactivate the lock.

After completing these steps, the Find My iPhone functionality will be disabled and your device will be ready to send to e-Cycle. You can also visit www.iCloud.com/activationlock to check your device’s activation lock status and confirm it has been properly deactivated. Upon entering your device’s IMEI or Serial Number (you can find instructions on where to find this information here), the Activation Lock should read “Off.”

If you have already sent your iOS devices to e-Cycle, you can disable the Find My iPhone  lock through iCloud by following these steps:

  1. Sign in to your Apple iCloud account: www.iCloud.com/#find
  2. Click the “All Devices” link at the top of the page
  3. Click on the device you would like to deactivate (the device may appear as “Offline”)
  4. Click “Remove from Account” at the bottom of the page
  5. Click “Remove” when prompted
  6. Your device can now be processed by e-Cycle

Be certain to take the steps above so you are eligible to receive buyback dollars for your Apple iPhone and iPad devices. Failure to deactivate the Find my iPhone/iPad security feature on Apple devices will result in a considerable delay in processing and may result in forfeiture of payment for your device.

For more information or support, please contact the e-Cycle support team at GoGreen@e-Cycle.com or 1.855.329.2536 (855.ECYCLE.NOW).

Businesses Request a Quote Button

 

 

 

 

 

Generation Y Poses Mobile Security Threat to BYOD Policies

Generation Y is bringing mobile security threats with them as they enter the workforce. According to a recent Fortinet survey, this tech-savvy generation is more willing to break the rules and put your corporate data at risk.

Fortinet surveyed 3,200 college graduates with full-time jobs between the ages of 21 and 32 in 20 countries. The respondents all owned a smartphone, tablet and/or laptop.

The research found that 51 percent of those surveyed would bypass company policies that restrict the use of personal devices, cloud storage or emerging wearable technology for work. It also showed a 42 percent increase in the willingness to break usage rules compared to a similar survey conducted last year.

Of the 89 percent of respondents that stated they had a personal cloud storage account, 70 percent admitted to using their account for work-related items such as passwords, financial information, confidential business documents and customer data:

  • 12 percent – work passwords
  • 16 percent – financial information
  • 22 percent – confidential business documents (contracts and plans)
  • 33 percent – customer data

Thirty six percent of respondents using their personal cloud for work purposes said they would break any rules enacted to stop them.

While the study’s results make the future of mobile management appear dismal, there is a silver lining. The vast majority – 88 percent – of the respondents accept that they have an obligation to understand the security risks posed by using their own devices. Education and advancements in technology services could be the solution to the BYOD security threat Fortinet has brought to the forefront.

IT administrators must proactively educate employees, particularly Gen Y, about mobile security threats and the risks associated with their actions. Also, consider distributing basic security best practices such as only using a secure Wi-Fi connection or keeping software up-to-date to protect their devices and the company’s data.

In addition, new tools and services cannot simply be ignored or banned. If employees are embracing unsanctioned technologies, it’s generally to fill a void that existing devices and services aren’t addressing. Listen to users to better understand the business value of these tools. Then find a solution that fills the employee’s need, while keeping sensitive corporate data protected.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

Adoption of E-Waste Legislation in the U.S. Declines in 2013

E-waste related bills accounted for more than 10 percent of all U.S. recycling and solid waste bills introduced in 2013; however, this year marks the first time in 10 years that no major state legislation surrounding e-waste was passed, according to Resource Recycling.

From 2003 to 2011, at least one state each year adopted comprehensive legislation surrounding e-waste recycling. A total of 26 states have created statewide e-waste programs since 2003. Click here to view a map of the states that have passed zero landfill related to specific technologies.

The only e-waste bills that passed in 2013 were incremental updates to existing programs. In 2012, Colorado passed a bill to ban electronics from entering landfills and directed state agencies to recycle all electronics. This legislation took effect in 2013, but comparable legislation was not passed this year.

E-Waste Legislation Passed in 2013

  • Assembly Bill 1459 was passed in New Jersey, which amends its electronics recycling law to waive manufacturing fees if less than 100 televisions are sold annually. Also, all manufacturers are permitted to roll over up to 25 percent of their TV collection obligation to the next program year.
  • Washington updated its e-waste program to include reporting requirements through House Bill 1498. The state also passed Senate Bill 5699, which exempts electronics licensors from participating in its stewardship program.
  • Mississippi does not have an e-waste program, but it did pass Senate Bill 2754, requiring the state Department of Environmental Quality to maintain a directory of R2 and e-Stewards certified recyclers in the state and requiring state agencies to use these certified recyclers to manage their e-waste.

There is currently no federal legislation in the U.S. that mandates the recycling of e-waste. Environmental responsibility is currently left in the hands of state governments to ban the disposal of e-waste into landfills. However, many e-waste bills are being left in limbo until after the New Year because state legislatures are now in recess or adjourned.

The EPA estimates that 70 to 80 percent of electronics recycling companies export toxic e-waste overseas for profit. Much of the e-waste exported ends up in landfills and poisons the environment and people.

To ensure e-waste is disposed of in a responsible manner, it is recommended that businesses and consumers recycle their used mobile devices and other e-waste with an e-Stewards electronics recycler. e-Stewards certified recyclers adhere to the highest global standards for reuse and recycling of electronic equipment and environmental protection. Learn more at http://www.e-Stewards.org.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

e-Cycle Expands Operations and Service Offerings in Response to iPhone 5s, 5c and iPad Announcements

Christopher Irion, e-Cycle Founder and CEO, announced that he is expanding e-Cycle’s operations department and service offerings due to an influx of businesses seeking to sell and recycle their used mobile devices. Irion attributes this increase to the recent launch of the new Apple iPhone 5s, 5c and iPad models.

e-Cycle has experienced a more than 300 percent increase in wireless buyback quote requests since the launch of the iPhone 5s and 5c, allowing its operations team to grow in conjunction.

According to Irion, factory resets and remote wiping technologies do not delete all the confidential information stored in mobile devices. Private data such as telephone numbers, pins, emails and photographs often remain in hidden menus.

A large percentage of mobile devices that arrive at the e-Cycle facility still contain sensitive data, even after they were reported to have been wiped prior to shipping. Of the devices received at the facility, e-Cycle’s data security department reports that:

  • 2% have active phone lines – resulting in data security risks and unnecessary carrier charges
  • 55% of devices have SIM cards that contain sensitive information
  • 1 in 5 devices have SD memory cards with access to private files

“e-Cycle employs advanced technologies and multi-step, proprietary data removal processes that not only restores the device to original factory settings, but also manually deletes or overwrites any data that might remain,” said Irion. “Every device we purchase is also subjected to stringent quality assurance testing. We hire third-party, forensic auditors on a quarterly basis to test random samples of our phones and validate our data removal processes.”

If a device cannot be reused in the marketplace or has functionality flaws that prevent removal of data, the device is shredded onsite and recycled responsibly.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

Wireless Mobility Horror Story: Don’t Trust Your Data with Just Any Cell Phone Buyback and Recycling Company

Halloween is full of stories about ghouls and ghosts that send a shiver down your spine and make you keep the closet light on at night, but at e-Cycle, we’ve found that a data security breach is even more frightening for a business. The average mobile data breach last year accounted for loses exceeding $500,000 for large businesses and $100,000 for companies with less than 1,000 employees.

Many companies are unaware that a data breach can happen during end-of-life management. To recoup a business’ investment and protect the environment, it’s imperative that mobile technologies like cell phones and tablets are recycled. However, trusting just any recycler can compromise your sensitive data.

To prove the dangers associated with choosing the wrong recycler, we would like to share a true mobile security horror story that is sure to keep you up at night:

A few years ago JoAnn Bishop of Los Angeles received a refurbished cell phone. After synching her new phone to her computer, she noticed 300 additional contacts in her phonebook and someone else’s appointments on her calendar. As she continued to scour the phone she was horrified to find the same persons’ insurance information, credit card numbers, user names, passwords and pin codes in the notes section.

Being an honest person, she immediately returned the cell phone, and after being assured this was an isolated incident, she accepted a replacement device. Shockingly, this cell phone also came equipped with someone else’s personal information.

David Levi King and Bassem Megally were the original owners of these cell phones, respectively. Both later reported that they had deleted the information from their phones before turning them in.

King and Megally probably did try to delete the data on their cell phone by performing a factory reset. Unfortunately, factory resets leave data stored in cell phones’ hidden menus, which can cause irreparable harm to a business.

Partnering with a wireless buyback company that does not make data security a top priority is very scary. Practices that indicate a recycler provides exceptional data security include:

  • Testing for active phone lines – A serious data risk and results in unnecessary charges
  • e-Stewards certification – That have specific data security transparency requirements
  • Device-specific wiping processes – Both automated and manual
  • Quality assurance testing – To ensure all of the data has been removed
  • Third party, forensic auditing of sanitized devices – To validate their data removal processes
  • High security, lock down facilities and employee background screenings

Choosing a cell phone buyback vendor that provides these services will allow you to rest easier knowing your business will not be featured in e-Cycle’s next mobile security horror story.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

How to Protect the Private Data on Your Cell Phone

Modern smartphones house a goldmine of private information, from contacts and pin numbers to photographs and emails. Taking simple preventative measures while you own the device and when choosing a secure cell phone buyback and recycling company, is imperative to safeguarding your sensitive mobile data.

Approximately 113 cell phones are lost or stolen every minute in the U.S.—that is 162,720 per day! To prevent your sensitive data from being accessed during use or in the event your cell phone is lost or stolen, consider taking the following simple mobile security measures:

  1. Keep Security Software Current. Make sure your mobile device has the latest security software, web browser and operating system installed.
  2. Lock Your Phone. Use a password to lock your cell phone. Strong passwords are longer than five characters and contain upper and lowercase letters, numbers and symbols. You can change the normal four digit pin codes typically found on iPhones and other devices to accept more advanced security passwords.
  3. Think Before You App. Review the privacy policy and understand what data (location, social networks, etc.) an app can access before downloading. Many times it is accessing the private information of your family, friends and business contacts as well.
  4. Get savvy about Wi‐Fi hotspots. Limit the type of business you conduct on your cell phone while connected to public or unsecured Wi-Fi networks. Knowledgeable criminals can access your private data without you knowing it. Stick to your 3G or 4G network when in public spaces.
  5. Protect your Wallet. When banking and shopping, be sure the site is security enabled by looking for web addresses beginning with “https://” or “shttp://.” An “Http://” address is not secure and could expose your confidential credit card and banking information to thieves.

There are two crucial things you need to consider when choosing a mobile buyback and/or recycling company.

First, does the wireless recycling company make data security a priority? Find out if they test for active lines and perform data wipes beyond a simple factory reset. Many mobile phones have known vulnerabilities that cause residual data to remain on the device after a factory reset is performed. For example, after a factory reset is performed on an Android, photos and other personal information often remain on the device. Ensure your chosen recycler utilizes multi-step deletion processes and quality assurance checks when removing your data—especially if they purchased your phone for resale.

Second, are they e-Stewards certified? e-Stewards certified recyclers adhere to stringent data security and environmental standards for reusing and recycling electronic devices. They undergo extensive audits to guarantee none of their toxic e-waste is being exported overseas or sent to a landfill.

Taking these precautions during cell phone use and end-of-life management will protect your sensitive mobile data from ending up in the wrong hands. For additional mobile and cyber security tips, visit http://staysafeonline.org/ncsam/resources/.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

How To: Deactivate Find My iPhone or iPad Activation Lock for Apple iOS 7 Devices When Selling Used iPhones and iPads to e-Cycle

When upgrading your Apple iPhone or iPad to the new iOS 7 operating system, you will notice a new Find My iPhone/iPad feature called Activation Lock. This beneficial new technology makes it more difficult for anyone to access or sell your device in the event it is lost or stolen.

Activation Lock starts working the moment you turn on the Find My iPhone application in iOS 7. While Apple’s new security feature is a helpful data security measure, it also prevents e-Cycle’s security team from accessing the device to ensure your private data has been completely sanitized.

To avoid lengthy delays in processing and possible forfeiture of payment, the Activation Lock must be deactivated on your iPhones and iPads prior to shipping them to e-Cycle.

Please follow the simple steps below to deactivate the Find My iPhone/iPad feature or watch the embedded video:

  1. Go to the Settings app on your device
  2. Select “Privacy”
  3. Select “Location Services”
  4. Select “Find My iPhone/iPad”
  5. Toggle Find My iPhone/iPad to the “Off” position
  6. Enter Apple ID password & turn off Find My iPhone

After completing these steps, the Find My iPhone functionality will be disabled and your device will be ready to send to e-Cycle. It’s important to never remotely wipe, lock or mark your device as lost or stolen using iTunes or iCloud when sending it to e-Cycle because it will reactivate the lock.

If you have already sent your iOS devices to e-Cycle, you can disable the Find My iPhone  lock through iCloud by following these steps:

  1. Sign in to your Apple iCloud account at http://www.icloud.com/#find
  2. Click the “All Devices” link at the top of the page
  3. Click on the device you would like to deactivate
  4. Click the device name link at the top of the page
  5. Click the black “X ” next to your device
  6. Click “Remove” when prompted

If you’re not sure if you’ve installed iOS 7, go to Settings> General> About> Version. The number beside Version will start with “7” if your device is operating on iOS 7.

Be certain to take the steps above so you are eligible to receive buyback dollars for your Apple iPhone and iPad devices. Failure to deactivate the Find my iPhone/iPad Activation Lock on Apple devices will result in a considerable delay in processing and may result in forfeiture of payment for your device.

For more information or support, please contact the e-Cycle support team at GoGreen@e-Cycle.com or 1.855.329.2536 (855.ECYCLE.NOW).

—————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

How Much is Your Private Data Worth? Choose the Right Mobile Buyback and Recycling Partner

How much would you charge a stranger for your contacts, family photos and pin number? $5? $20? It sounds ridiculous, but many businesses and consumers are doing just that when they choose to sell their used phone and tablets to a company based solely on the highest buyback price. It’s important to consider the entire value of the services offered when choosing a mobile revenue recovery and recycling company.

A study by CPP Life Assistance found that 54 percent of cell phones purchased second-hand contained personal data such as emails and bank details from the previous owners. They also purchased 50 SIM cards and 27 of them contained similar private information.

CPP Life Assistance went a step further and asked the original mobile phone owners if they had deleted their personal data prior to selling their device; 81 percent claimed they did.

So how can you ensure your data is protected?

Many will advise you to perform a factory reset, but as this study has shown, that is not always effective in removing all sensitive data from your mobile devices. Partnering with a mobile buyback and recycling company that makes data security a top priority is the only way to ensure your data is protected.

Qualities that indicate a recycler provides effective data security include testing for active lines, an e-Stewards certification, device-specific wiping processes and quality assurance checks. At e-Cycle, we prove our value by providing all these services and more at zero cost. All mobile devices received at our facility go through rigorous, multi-step data deletion procedures and verification testing for quality assurance. Third party, forensic auditors randomly-test our devices and validate our data security processes quarterly. If the e-Cycle data security team is not certain the data on the device it removed (many times due to functionality flaws), the device is shredded onsite to protect your personal and corporate data.

Reselling used mobile phones and tablets for reuse so that the lives of the devices can be extended is an essential part of a responsible wireless recycling plan. However, carefully consider the total value your chosen mobile buyback and recycling partner offers. Is it really worth risking your sensitive data by selecting a less-than-reputable company that offers a few dollars extra per device? Instead, choose a wireless revenue recovery partner such as e-Cycle that offers the total package: highly competitive pricing, industry-leading data security and e-Stewards certified electronics recycling and environmental protection.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

How Businesses Can Avoid the High Cost of Mobile Data Breaches

More than 79 percent of companies experienced a mobile security incident (loss of data, malware attacks, lost devices) in 2012, according to “The Impact of Mobile Devices on Information Security” report commissioned by Check Point Software Technologies Ltd.

The study found that 96 percent of companies have more personal devices connecting to their corporate networks year after year. In fact, 45 percent have over five times as many personal mobile devices as they had two years ago.

In addition, 94 percent of companies revealed that their biggest mobile security concern is loss of corporate data and 66 percent believe careless employees posed a bigger security risk than cybercriminals.

Yet, despite these figures and the influx of personal devices in the workplace, 63 percent of companies reported that are not managing corporate data on employee-owned devices. Corporate information contained in these devices includes not just contacts, emails and calendars, but also customer data, confidential notes and network login credentials. Not having a mobile data management system or security policy in place can come at a high cost for business and enterprises.

The costs of fines, legal fees and potential private lawsuits associated with a mobile security incident add up. According to the report, 52 percent of large companies say the cost of mobile security incidents exceeded $500,000 last year. Incidents for 45 percent of business with less than 1,000 employees cost more than $100,000.

To mitigate this issue, companies must educate their employees on acceptable mobile security practices and put a mobile policy in place to regulate mobile device usage in the workplace. Simple measures such as only using secure Wi-Fi connections and saving data in the cloud can make a big impact in protecting sensitive mobile data.

However, even with the best mobile security practices in place, incidents can occur. Because of this, it’s also important for businesses to invest in insurance policies specifically related to mobile incidents. This insurance will help pay for the costs associated with notifying those affected by a breach and corresponding fines.

Enterprises also need to consider the data security issues that can arise during the end-of-life management of mobile devices. Partnering with a trusted asset recovery and recycling company to reimburse your employees for the value of their devices, while ensuring sensitive data is protected, is critical to preventing a data breach.

Many asset recovery and recycling companies provide poor data security measures such as only performing a factory reset, which can leave residual data on devices. Enterprises should seek out data security experts in the recycling industry who have rigorous, multi-step processes for data deletion and quality assurance.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

Is Your Business Adopting the New Apple iPhone 5s or 5c? Eight Tips Choosing a Buyback Partner When Selling Your Mobile Phones

What happens to your mobile devices when it’s time to upgrade to a newer device like the Apple iPhone 5s or 5c? Retired mobile phones retain confidential information even after restoring the factory settings. Choosing a trusted asset recovery, data protection and recycling partner for your organization is critical.

Tips for maintaining a sustainable, secure and profitable Apple iPhone reuse and recycling program:

1. Know EVERYTHING about your buyback and recycling partner. Investigate every aspect your recycler’s process. Make certain their downstream partners are also conducting their business practices in an environmentally responsible manner.

2. Do not completely trust your employees or third-party software with data deletion. Our operations department found that 27% of devices received from clients who had pre-wiped their mobile phones still contained sensitive information. Be certain your iPhone buyback company has rigorous processes in place to permanently remove the data on every device and quality assurance testing.

3. Read the FINE PRINT in regards to data wiping and security. There are multiple iPhone buyback and recycling companies claiming “complete data deletion and protection.” However, if you take the time to read their terms and conditions, most will state that it is the responsibility of the customer to delete their own data. Work with a company that understands iPhone specific data wiping processes, has quality assurance practices and high-security facilities.

4. Be skeptical of extremely high buyback pricing. Research what deductions are taken for minor cosmetic flaws. Since many buyback companies resell on eBay, they take significant price reductions for even the smallest cosmetic flaws after quoting a higher price. Try to find a company that will grade only on the operability of the iPhone.

5. Be sure your active lines are canceled. Of the thousands of wireless devices tested by e-Cycle’s data security department, approximately 2% still have active phone lines. Not only is this a security risk, it often results in substantial and unnecessary carrier service charges. Be sure your wireless recycling company tests for active lines.

6. A “destroy only” policy is bad for the environment and your bottom line. Extending the use of an iPhone from 18 months to four years saves 20% more energy than recycling alone. Data security is a serious issue, but a destroy-only policy harms the environment and the opportunity to reclaim revenues that can be used to greatly offset the cost of upgrading to the newest mobile technologies.

7. Make certain your logistics are in place. Be certain that your employees understand the importance of mobile recycling as part of your green initiatives. Work with a recycling partner that can offer personal support to assist your team in maintaining a successful program.

8. Measure your environmental impact. Work with a recycling company that will help your organization measure its positive impact on the environment through your recycling efforts. By measuring and reporting your positive impact on your community, you’ll have the information that you need to report and celebrate the successes of your sustainability initiatives.

In summary, wireless phones that are not properly retired may expose confidential data when they are resold on the secondary market. Every organization should have an official asset recovery and recycling plan in place to ensure the greatest return on their telecom investment, while protecting the environment and their sensitive information.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button