Cookie Consent by Free Privacy Policy Generator Update cookies preferences

November 13, 2013Comments are off for this post.

Generation Y Poses Mobile Security Threat to BYOD Policies

Generation Y is bringing mobile security threats with them as they enter the workforce. According to a recent Fortinet survey, this tech-savvy generation is more willing to break the rules and put your corporate data at risk.

Fortinet surveyed 3,200 college graduates with full-time jobs between the ages of 21 and 32 in 20 countries. The respondents all owned a smartphone, tablet and/or laptop.

The research found that 51 percent of those surveyed would bypass company policies that restrict the use of personal devices, cloud storage or emerging wearable technology for work. It also showed a 42 percent increase in the willingness to break usage rules compared to a similar survey conducted last year.

Of the 89 percent of respondents that stated they had a personal cloud storage account, 70 percent admitted to using their account for work-related items such as passwords, financial information, confidential business documents and customer data:

  • 12 percent - work passwords
  • 16 percent - financial information
  • 22 percent - confidential business documents (contracts and plans)
  • 33 percent - customer data

Thirty six percent of respondents using their personal cloud for work purposes said they would break any rules enacted to stop them.

While the study’s results make the future of mobile management appear dismal, there is a silver lining. The vast majority - 88 percent - of the respondents accept that they have an obligation to understand the security risks posed by using their own devices. Education and advancements in technology services could be the solution to the BYOD security threat Fortinet has brought to the forefront.

IT administrators must proactively educate employees, particularly Gen Y, about mobile security threats and the risks associated with their actions. Also, consider distributing basic security best practices such as only using a secure Wi-Fi connection or keeping software up-to-date to protect their devices and the company’s data.

In addition, new tools and services cannot simply be ignored or banned. If employees are embracing unsanctioned technologies, it's generally to fill a void that existing devices and services aren't addressing. Listen to users to better understand the business value of these tools. Then find a solution that fills the employee’s need, while keeping sensitive corporate data protected.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

November 4, 2013Comments are off for this post.

e-Cycle Expands Operations and Service Offerings in Response to iPhone 5s, 5c and iPad Announcements

Christopher Irion, e-Cycle Founder and CEO, announced that he is expanding e-Cycle’s operations department and service offerings due to an influx of businesses seeking to sell and recycle their used mobile devices. Irion attributes this increase to the recent launch of the new Apple iPhone 5s, 5c and iPad models.

e-Cycle has experienced a more than 300 percent increase in wireless buyback quote requests since the launch of the iPhone 5s and 5c, allowing its operations team to grow in conjunction.

According to Irion, factory resets and remote wiping technologies do not delete all the confidential information stored in mobile devices. Private data such as telephone numbers, pins, emails and photographs often remain in hidden menus.

A large percentage of mobile devices that arrive at the e-Cycle facility still contain sensitive data, even after they were reported to have been wiped prior to shipping. Of the devices received at the facility, e-Cycle’s data security department reports that:

  • 2% have active phone lines – resulting in data security risks and unnecessary carrier charges
  • 55% of devices have SIM cards that contain sensitive information
  • 1 in 5 devices have SD memory cards with access to private files

“e-Cycle employs advanced technologies and multi-step, proprietary data removal processes that not only restores the device to original factory settings, but also manually deletes or overwrites any data that might remain,” said Irion. “Every device we purchase is also subjected to stringent quality assurance testing. We hire third-party, forensic auditors on a quarterly basis to test random samples of our phones and validate our data removal processes.”

If a device cannot be reused in the marketplace or has functionality flaws that prevent removal of data, the device is shredded onsite and recycled responsibly.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 31, 2013Comments are off for this post.

Wireless Mobility Horror Story: Don’t Trust Your Data with Just Any Cell Phone Buyback and Recycling Company

Halloween is full of stories about ghouls and ghosts that send a shiver down your spine and make you keep the closet light on at night, but at e-Cycle, we’ve found that a data security breach is even more frightening for a business. The average mobile data breach last year accounted for loses exceeding $500,000 for large businesses and $100,000 for companies with less than 1,000 employees.

Many companies are unaware that a data breach can happen during end-of-life management. To recoup a business’ investment and protect the environment, it’s imperative that mobile technologies like cell phones and tablets are recycled. However, trusting just any recycler can compromise your sensitive data.

To prove the dangers associated with choosing the wrong recycler, we would like to share a true mobile security horror story that is sure to keep you up at night:

A few years ago JoAnn Bishop of Los Angeles received a refurbished cell phone. After synching her new phone to her computer, she noticed 300 additional contacts in her phonebook and someone else’s appointments on her calendar. As she continued to scour the phone she was horrified to find the same persons’ insurance information, credit card numbers, user names, passwords and pin codes in the notes section.

Being an honest person, she immediately returned the cell phone, and after being assured this was an isolated incident, she accepted a replacement device. Shockingly, this cell phone also came equipped with someone else’s personal information.

David Levi King and Bassem Megally were the original owners of these cell phones, respectively. Both later reported that they had deleted the information from their phones before turning them in.

King and Megally probably did try to delete the data on their cell phone by performing a factory reset. Unfortunately, factory resets leave data stored in cell phones’ hidden menus, which can cause irreparable harm to a business.

Partnering with a wireless buyback company that does not make data security a top priority is very scary. Practices that indicate a recycler provides exceptional data security include:

  • Testing for active phone lines - A serious data risk and results in unnecessary charges
  • e-Stewards certification – That have specific data security transparency requirements
  • Device-specific wiping processes – Both automated and manual
  • Quality assurance testing – To ensure all of the data has been removed
  • Third party, forensic auditing of sanitized devices – To validate their data removal processes
  • High security, lock down facilities and employee background screenings

Choosing a cell phone buyback vendor that provides these services will allow you to rest easier knowing your business will not be featured in e-Cycle’s next mobile security horror story.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 30, 2013Comments are off for this post.

How to Protect the Private Data on Your Cell Phone

Modern smartphones house a goldmine of private information, from contacts and pin numbers to photographs and emails. Taking simple preventative measures while you own the device and when choosing a secure cell phone buyback and recycling company, is imperative to safeguarding your sensitive mobile data.

Approximately 113 cell phones are lost or stolen every minute in the U.S.—that is 162,720 per day! To prevent your sensitive data from being accessed during use or in the event your cell phone is lost or stolen, consider taking the following simple mobile security measures:

  1. Keep Security Software Current. Make sure your mobile device has the latest security software, web browser and operating system installed.
  2. Lock Your Phone. Use a password to lock your cell phone. Strong passwords are longer than five characters and contain upper and lowercase letters, numbers and symbols. You can change the normal four digit pin codes typically found on iPhones and other devices to accept more advanced security passwords.
  3. Think Before You App. Review the privacy policy and understand what data (location, social networks, etc.) an app can access before downloading. Many times it is accessing the private information of your family, friends and business contacts as well.
  4. Get savvy about Wi‐Fi hotspots. Limit the type of business you conduct on your cell phone while connected to public or unsecured Wi-Fi networks. Knowledgeable criminals can access your private data without you knowing it. Stick to your 3G or 4G network when in public spaces.
  5. Protect your Wallet. When banking and shopping, be sure the site is security enabled by looking for web addresses beginning with "https://" or "shttp://.” An "Http://" address is not secure and could expose your confidential credit card and banking information to thieves.

There are two crucial things you need to consider when choosing a mobile buyback and/or recycling company.

First, does the wireless recycling company make data security a priority? Find out if they test for active lines and perform data wipes beyond a simple factory reset. Many mobile phones have known vulnerabilities that cause residual data to remain on the device after a factory reset is performed. For example, after a factory reset is performed on an Android, photos and other personal information often remain on the device. Ensure your chosen recycler utilizes multi-step deletion processes and quality assurance checks when removing your data—especially if they purchased your phone for resale.

Second, are they e-Stewards certified? e-Stewards certified recyclers adhere to stringent data security and environmental standards for reusing and recycling electronic devices. They undergo extensive audits to guarantee none of their toxic e-waste is being exported overseas or sent to a landfill.

Taking these precautions during cell phone use and end-of-life management will protect your sensitive mobile data from ending up in the wrong hands. For additional mobile and cyber security tips, visit http://staysafeonline.org/ncsam/resources/.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 29, 2013Comments are off for this post.

e-Cycle Ranked 8th Fastest Growing Company in Central Ohio by Columbus Business First

e-Cycle was named the 8th fastest growing, privately held company in central Ohio in Columbus Business First’s annual Fast 50 list due to its rapid growth and job creation. This is the fourth consecutive year e-Cycle has achieved a Fast 50 ranking and its third year ranking in the top 10.

e-Cycle, a leading provider of wireless asset recovery, data protection and recycling, was named to the list after achieving 622 percent growth and adding more than 75 jobs throughout the U.S. over the past three years. e-Cycle was also recently ranked the #5 fastest growing environmental services companies in the U.S. in the Inc. 500|5000 list.

“It is an honor to be recognized alongside these outstanding businesses in central Ohio,” said Christopher Irion, founder and CEO of e-Cycle. “Making the list for the fourth time can be attributed to our hardworking, passionate team that continues to find new ways to better serve our clients. We look forward to recruiting more top talent as we continue to grow in 2014.”

Columbus Business First is the business news and information authority in central Ohio that recognizes top companies based on their growth and performance over the past three years. The 2013 Fast 50 list was revealed at the 18th Annual Fast 50 Luncheon and Awards ceremony on October 10. All nominees must be headquartered in central Ohio, privately held and for-profit companies that have accrued at least $1 million in revenue per year over the last three years.

Visit e-Cycle’s Certifications and Awards page to learn more.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 24, 2013Comments are off for this post.

How To: Deactivate Find My iPhone or iPad Activation Lock for Apple iOS 7 Devices When Selling Used iPhones and iPads to e-Cycle

When upgrading your Apple iPhone or iPad to the new iOS 7 operating system, you will notice a new Find My iPhone/iPad feature called Activation Lock. This beneficial new technology makes it more difficult for anyone to access or sell your device in the event it is lost or stolen.

Activation Lock starts working the moment you turn on the Find My iPhone application in iOS 7. While Apple’s new security feature is a helpful data security measure, it also prevents e-Cycle’s security team from accessing the device to ensure your private data has been completely sanitized.

To avoid lengthy delays in processing and possible forfeiture of payment, the Activation Lock must be deactivated on your iPhones and iPads prior to shipping them to e-Cycle.

Please follow the simple steps below to deactivate the Find My iPhone/iPad feature or watch the embedded video:

  1. Go to the Settings app on your device
  2. Select “Privacy”
  3. Select “Location Services”
  4. Select “Find My iPhone/iPad”
  5. Toggle Find My iPhone/iPad to the “Off” position
  6. Enter Apple ID password & turn off Find My iPhone

After completing these steps, the Find My iPhone functionality will be disabled and your device will be ready to send to e-Cycle. It’s important to never remotely wipe, lock or mark your device as lost or stolen using iTunes or iCloud when sending it to e-Cycle because it will reactivate the lock.

If you have already sent your iOS devices to e-Cycle, you can disable the Find My iPhone  lock through iCloud by following these steps:

  1. Sign in to your Apple iCloud account at http://www.icloud.com/#find
  2. Click the “All Devices” link at the top of the page
  3. Click on the device you would like to deactivate
  4. Click the device name link at the top of the page
  5. Click the black “X ” next to your device
  6. Click “Remove” when prompted

If you’re not sure if you’ve installed iOS 7, go to Settings> General> About> Version. The number beside Version will start with “7” if your device is operating on iOS 7.

Be certain to take the steps above so you are eligible to receive buyback dollars for your Apple iPhone and iPad devices. Failure to deactivate the Find my iPhone/iPad Activation Lock on Apple devices will result in a considerable delay in processing and may result in forfeiture of payment for your device.

For more information or support, please contact the e-Cycle support team at GoGreen@e-Cycle.com or 1.855.329.2536 (855.ECYCLE.NOW).

—————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 22, 2013Comments are off for this post.

e-Cycle Donates More Than $87,000 for Levine Children’s Hospital Through Cell Phone Recycling

Partnering with a prominent national financial institution, the e-Cycle Foundation raised more than $112,000 for the Cardiovascular Intensive Care Unit at Levine Children’s Hospital from proceeds generated from cell phone recycling and the Sweet Baby Caroline (SBC) Golf Outing. The SBC golf outing, presented by e-Cycle, was held on October 3, 2013, at The Golf Club at Ballantyne in Charlotte, N.C.

On behalf of the financial institution, the e-Cycle Foundation donated more than $87,000 to Levine’s Children’s Hospital from revenues generated solely from e-Cycle’s cell phone buyback program. The additional donation dollars were raised from the SBC charity golf outing.

The golf outing is held each year in memory of Caroline Jackson, who was born with a complex congenital heart defect and tragically lost her fight after 103 days in the Cardiovascular Intensive Care Unit. The event aims to help children like Caroline battle heart defects.

"The money raised from this event will help save the lives of children today, tomorrow and in the future,” said Michael Jackson, father of Caroline.

The event featured a golf ball drop, in which 345 golf balls where dropped from a helicopter onto a green. Donna Swicegood, e-Cycle Account Manager, won the drop by purchasing the ball that landed closest to the hole. She donated half of her prize money, allowing proceeds of $4,837.50 to be given to the hospital.

“The decision to give back was easy. There was so much generosity from everyone, it was an automatic decision,” explained Donna.

The e-Cycle Foundation was established to provide businesses an innovative way to enhance their corporate giving. Through the Foundation, businesses are able to make tax-deductible donations from the revenue acquired through wireless buyback and recycling.

“Many of our mobile recycling clients are trying to find new ways to give back to their community,” said Tonia Irion, e-Cycle founder and president. “The e-Cycle Foundation meets their needs by them to raise money for charities through wireless recycling buyback dollars while protecting the environment and their bottom line.”

For several years, e-Cycle has sponsored the golf outing and donated to the Levine Children’s Hospital through wireless recycling revenue. The hospital houses over 30 pediatric specialties and has received national recognition from U.S. News & World Report as one of “America’s Best Children’s Hospitals.”

To learn more about charitable donations from cell phone recycling revenues and the e-Cycle Foundation, visit www.e-Cycle.com/foundation.

—————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 21, 2013Comments are off for this post.

How Much is Your Private Data Worth? Choose the Right Mobile Buyback and Recycling Partner

How much would you charge a stranger for your contacts, family photos and pin number? $5? $20? It sounds ridiculous, but many businesses and consumers are doing just that when they choose to sell their used phone and tablets to a company based solely on the highest buyback price. It’s important to consider the entire value of the services offered when choosing a mobile revenue recovery and recycling company.

A study by CPP Life Assistance found that 54 percent of cell phones purchased second-hand contained personal data such as emails and bank details from the previous owners. They also purchased 50 SIM cards and 27 of them contained similar private information.

CPP Life Assistance went a step further and asked the original mobile phone owners if they had deleted their personal data prior to selling their device; 81 percent claimed they did.

So how can you ensure your data is protected?

Many will advise you to perform a factory reset, but as this study has shown, that is not always effective in removing all sensitive data from your mobile devices. Partnering with a mobile buyback and recycling company that makes data security a top priority is the only way to ensure your data is protected.

Qualities that indicate a recycler provides effective data security include testing for active lines, an e-Stewards certification, device-specific wiping processes and quality assurance checks. At e-Cycle, we prove our value by providing all these services and more at zero cost. All mobile devices received at our facility go through rigorous, multi-step data deletion procedures and verification testing for quality assurance. Third party, forensic auditors randomly-test our devices and validate our data security processes quarterly. If the e-Cycle data security team is not certain the data on the device it removed (many times due to functionality flaws), the device is shredded onsite to protect your personal and corporate data.

Reselling used mobile phones and tablets for reuse so that the lives of the devices can be extended is an essential part of a responsible wireless recycling plan. However, carefully consider the total value your chosen mobile buyback and recycling partner offers. Is it really worth risking your sensitive data by selecting a less-than-reputable company that offers a few dollars extra per device? Instead, choose a wireless revenue recovery partner such as e-Cycle that offers the total package: highly competitive pricing, industry-leading data security and e-Stewards certified electronics recycling and environmental protection.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 17, 2013Comments are off for this post.

How Businesses Can Avoid the High Cost of Mobile Data Breaches

More than 79 percent of companies experienced a mobile security incident (loss of data, malware attacks, lost devices) in 2012, according to “The Impact of Mobile Devices on Information Security” report commissioned by Check Point Software Technologies Ltd.

The study found that 96 percent of companies have more personal devices connecting to their corporate networks year after year. In fact, 45 percent have over five times as many personal mobile devices as they had two years ago.

In addition, 94 percent of companies revealed that their biggest mobile security concern is loss of corporate data and 66 percent believe careless employees posed a bigger security risk than cybercriminals.

Yet, despite these figures and the influx of personal devices in the workplace, 63 percent of companies reported that are not managing corporate data on employee-owned devices. Corporate information contained in these devices includes not just contacts, emails and calendars, but also customer data, confidential notes and network login credentials. Not having a mobile data management system or security policy in place can come at a high cost for business and enterprises.

The costs of fines, legal fees and potential private lawsuits associated with a mobile security incident add up. According to the report, 52 percent of large companies say the cost of mobile security incidents exceeded $500,000 last year. Incidents for 45 percent of business with less than 1,000 employees cost more than $100,000.

To mitigate this issue, companies must educate their employees on acceptable mobile security practices and put a mobile policy in place to regulate mobile device usage in the workplace. Simple measures such as only using secure Wi-Fi connections and saving data in the cloud can make a big impact in protecting sensitive mobile data.

However, even with the best mobile security practices in place, incidents can occur. Because of this, it’s also important for businesses to invest in insurance policies specifically related to mobile incidents. This insurance will help pay for the costs associated with notifying those affected by a breach and corresponding fines.

Enterprises also need to consider the data security issues that can arise during the end-of-life management of mobile devices. Partnering with a trusted asset recovery and recycling company to reimburse your employees for the value of their devices, while ensuring sensitive data is protected, is critical to preventing a data breach.

Many asset recovery and recycling companies provide poor data security measures such as only performing a factory reset, which can leave residual data on devices. Enterprises should seek out data security experts in the recycling industry who have rigorous, multi-step processes for data deletion and quality assurance.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

October 10, 2013Comments are off for this post.

Is Your Business Adopting the New Apple iPhone 5s or 5c? Eight Tips Choosing a Buyback Partner When Selling Your Mobile Phones

What happens to your mobile devices when it’s time to upgrade to a newer device like the Apple iPhone 5s or 5c? Retired mobile phones retain confidential information even after restoring the factory settings. Choosing a trusted asset recovery, data protection and recycling partner for your organization is critical.

Tips for maintaining a sustainable, secure and profitable Apple iPhone reuse and recycling program:

1. Know EVERYTHING about your buyback and recycling partner. Investigate every aspect your recycler’s process. Make certain their downstream partners are also conducting their business practices in an environmentally responsible manner.

2. Do not completely trust your employees or third-party software with data deletion. Our operations department found that 27% of devices received from clients who had pre-wiped their mobile phones still contained sensitive information. Be certain your iPhone buyback company has rigorous processes in place to permanently remove the data on every device and quality assurance testing.

3. Read the FINE PRINT in regards to data wiping and security. There are multiple iPhone buyback and recycling companies claiming “complete data deletion and protection.” However, if you take the time to read their terms and conditions, most will state that it is the responsibility of the customer to delete their own data. Work with a company that understands iPhone specific data wiping processes, has quality assurance practices and high-security facilities.

4. Be skeptical of extremely high buyback pricing. Research what deductions are taken for minor cosmetic flaws. Since many buyback companies resell on eBay, they take significant price reductions for even the smallest cosmetic flaws after quoting a higher price. Try to find a company that will grade only on the operability of the iPhone.

5. Be sure your active lines are canceled. Of the thousands of wireless devices tested by e-Cycle’s data security department, approximately 2% still have active phone lines. Not only is this a security risk, it often results in substantial and unnecessary carrier service charges. Be sure your wireless recycling company tests for active lines.

6. A “destroy only” policy is bad for the environment and your bottom line. Extending the use of an iPhone from 18 months to four years saves 20% more energy than recycling alone. Data security is a serious issue, but a destroy-only policy harms the environment and the opportunity to reclaim revenues that can be used to greatly offset the cost of upgrading to the newest mobile technologies.

7. Make certain your logistics are in place. Be certain that your employees understand the importance of mobile recycling as part of your green initiatives. Work with a recycling partner that can offer personal support to assist your team in maintaining a successful program.

8. Measure your environmental impact. Work with a recycling company that will help your organization measure its positive impact on the environment through your recycling efforts. By measuring and reporting your positive impact on your community, you’ll have the information that you need to report and celebrate the successes of your sustainability initiatives.

In summary, wireless phones that are not properly retired may expose confidential data when they are resold on the secondary market. Every organization should have an official asset recovery and recycling plan in place to ensure the greatest return on their telecom investment, while protecting the environment and their sensitive information.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

 

Let's start a conversation! Email us today.

1.877.215.5255

©2020 — e-Cycle. All rights reserved.
Designated trademarks and brands are the property of their respective owners. e-Cycle is not affiliated with the manufacturers of the items available for cash buyback.

Privacy Policy | Terms & Conditions | Site Map