Cookie Consent by Free Privacy Policy Generator Update cookies preferences

October 15, 2014Comments are off for this post.

How To: Deactivate Find My iPhone or iPad Security Feature for Apple Devices Running iOS 8 When Selling Used iPhones and iPads to e-Cycle

The Find My iPhone/iPad service is available on all Apple devices running iOS 8 as part of iCloud. This beneficial technology makes it more difficult for anyone to access or sell your device in the event it is lost or stolen. While Apple’s security feature is a helpful data security measure, it also prevents e-Cycle’s security team from accessing the device to ensure your private data has been thoroughly sanitized.

To avoid lengthy delays in processing and possible forfeiture of payment, this security feature must be deactivated on your iPhones and iPads prior to shipping them to e-Cycle.

If you’re not sure if you’ve installed iOS 8, go to Settings> General> About> Version. The number beside Version will start with “8.”

Please follow the simple steps below to deactivate the Find My iPhone/iPad security feature or watch the embedded video:

  1. Go to the Settings app on your device
  2. Select “iCloud”
  3. Scroll down to “Find My iPhone/iPad” and toggle the button to the “Off” position
  4. Enter Apple ID password and turn off Find My iPhone

How to Deactivate Find My iPhone Security Lock on Apple iOS 8 Devices from e-Cycle LLC. on Vimeo.

It’s important to never remotely wipe, lock or mark your device as lost or stolen using iTunes or iCloud when sending it to e-Cycle because it will reactivate the lock.

After completing these steps, the Find My iPhone functionality will be disabled and your device will be ready to send to e-Cycle. You can also visit www.iCloud.com/activationlock to check your device’s activation lock status and confirm it has been properly deactivated. Upon entering your device’s IMEI or Serial Number (you can find instructions on where to find this information here), the Activation Lock should read “Off.”

If you have already sent your iOS devices to e-Cycle, you can disable the Find My iPhone  lock through iCloud by following these steps:

  1. Sign in to your Apple iCloud account: www.iCloud.com/#find
  2. Click the “All Devices” link at the top of the page
  3. Click on the device you would like to deactivate (the device may appear as “Offline”)
  4. Click “Remove from Account” at the bottom of the page
  5. Click “Remove” when prompted
  6. Your device can now be processed by e-Cycle

Be certain to take the steps above so you are eligible to receive buyback dollars for your Apple iPhone and iPad devices. Failure to deactivate the Find my iPhone/iPad security feature on Apple devices will result in a considerable delay in processing and may result in forfeiture of payment for your device.

For more information or support, please contact the e-Cycle support team at GoGreen@e-Cycle.com or 1.855.329.2536 (855.ECYCLE.NOW).

Businesses Request a Quote Button

 

 

 

 

 

September 30, 2013Comments are off for this post.

Sell Your iPhones to e-Cycle for the Highest Pricing and to Protect Your Private Mobile Data

Are you upgrading to the Apple iPhone 5s or 5c? e-Cycle, the most trusted iPhone mobile buyback and recycling company, provides businesses a secure and profitable way to sell used iPhones while ensuring their mobile data is eradicated from the devices.

When selling used iPhones or other mobile devices, it is crucial for businesses and consumers to make certain sensitive data on their mobile phones is properly wiped. Factory resets are unreliable and can leave information behind in hidden menus, including phone numbers, e-mails, photographs, addresses, pins and other confidential information. e-Cycle employs a combination of rigorous, multi-step data sanitation procedures and quality assurance checks to ensure we provide the best data protection in the industry.

e-Cycle’s simple iPhone buyback program offers high prices, free shipping and fast payments that put money back into your pocket to greatly offset the cost of purchasing the new Apple iPhone 5s or 5c. e-Cycle purchases more than 400 types of mobile phones and tablets and is a trusted partner to the largest global businesses and government agencies in the world.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

 

 

 

July 29, 2013Comments are off for this post.

Congratulations to e-Cycle Mobile Buyback and Recycling’s Summer Getaway Giveaway Winner

e-Cycle congratulates Adriana from New Jersey as the winner of a $500 gift card to the airline of their choice for participating in our June Summer Getaway Giveaway! Thank you to all of our clients for your commitment to protecting the environment and recycling your used mobile devices with e-Cycle.

There is still time to sell and recycle your organization’s mobile phones and tablets with e-Cycle for the chance to win our Summer Blockbuster Giveaway. Any organization that sells or recycles their devices with e-Cycle by July 31 is eligible for our random drawing to win one of five $100 MovieTickets.com gift cards.

Visit our Current Promotions page for official rules and to learn more about how to sell and recycle your wireless devices in July and win.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

 

 

 

January 13, 2012No Comments

How To Create a Recycling Plan For Wireless Gadgets | e-Cycle

Wireless technologies, such as smartphones and tablets, have become essential tools for leading enterprises. But what happens to these invaluable tools when it’s time for new technology? Often, a startling transformation occurs: in just one day, a device which was once so critical is simply cast aside as “obsolete” and “worthless.” As an IT solution provider, implementing a responsible mobile buyback and recycling program can be one of the easiest and most rewarding IT cost-cutting solutions you can offer your clients.

More than 150 million mobile phones are retired in the U.S. each year, but less than 20 percent are reused or recycled. Pollutants from electronic devices now represent 70 percent of the toxins in our landfills. In fact, one mobile phone in a landfill can contaminate up to 40,000 gallons of water.

However, more than 50 percent of mobile devices still retain a significant resale value, even after 18 to 24 months of use, and can be reused in secondary markets where the technologies are valued and needed. Every organization should have an asset recovery plan in place to recoup this revenue to help offset the cost of supplying their workforce with the latest technologies.

But what is a “responsible” mobile buyback and recycling program for electronic gadgets? It is a program that ensures you maximize the return on your customer’s wireless investments while protecting their sensitive corporate data. It uses wireless recycling partners that are e-Stewards Certified and continually audited to ensure proper data security, hazardous e-waste disposal and worker protection through the entire downstream recycling chain to final disposition. With these safeguards in place, you can help your clients advance their sustainability initiatives while protecting their private data and their bottom lines.

Here are some tips for maintaining a sustainable, secure and profitable mobile phone reuse and recycling program

1. Work with e-Stewards, such as certified mobile buyback and recycling companies. Our company was calling on an extremely large U.S. financial institution whose representative said that they already had a buyback and recycling solution in place through an “approved vendor.” Having never heard of the vendor, we decided to research the company.

After further investigation, we discovered that the vendor was actually a residential address using an unsecure, open garage to collect and refurbish mobile devices to sell on eBay. Toxic batteries and parts were being stored, discarded and shipped in unlawful and unethical manners. Needless to say, the institution immediately ceased all business activities with the vendor.

Before choosing a mobile buyback or asset recovery partner, make certain that they are e-Stewards Certified. Be wary of any recycling vendor that is vague about their recycling process and downstream partners. You should expect complete transparency and documentation of all business practices.

2. Mobile data security isn’t just restoring the factory settings.There are several mobile buyback and recycling Web sites, especially those with consumer-driven divisions, claiming “complete data deletion.” However, if you take the time to read the fine print in their terms and conditions, most will state that they take no responsibility for deleting the private data.

But there is much more to data security than simply restoring the factory settings on a device. When choosing a recycling partner, you need to examine their device-specific deletion methods, quality assurance testing practices, third-party verification audits, facility security, hiring policies, liability insurance coverage, and other procedures.

3. Do not trust your employees or third-party software with data deletion. It is a great advantage if your client has the resources to invest in remote data wiping solutions. However, even after resetting a device to factory settings, there are still applications and hidden menus that may still contain data, including owner contact information, passwords and pin numbers. Human error happens. Be certain your mobile buyback company has rigorous processes in place to permanently remove the data on every device as well as secondary quality assurance testing.

4. Make certain carrier services are canceled prior to reselling or recycling devices. Accidentally retiring devices that still have active service plans is a serious security risk due to continued data transmissions. It also often results substantial financial losses due to unnecessary carrier service charges. In the case of one of our large financial clients, it resulted in a loss of tens of thousands of dollars per year. Be sure your chosen wireless recycling company includes active phone line testing as part of their services and that they provide a complete list of devices (with phone numbers) that are found active.

5. A “destroy only” policy is bad for the environment and your budget. Corporate-liable devices that are not properly retired—stored in closets and desk drawers, directly donated to charities, trade-in programs or simply given to the employees—may expose confidential data. In an effort to battle security threats, some companies develop a mobile ‘destroy-only’ policy.

This physical destruction of reusable devices results in lost revenues, additional disposal expenses, energy waste and increased greenhouse gas emissions. It also denies bootstrapping entrepreneurs throughout the world the opportunity to reuse these technologies to build their businesses. Secure wireless reuse is great business.

6. Use mobile buyback as part of your corporate caring plan. Mobile asset recovery offers a viable alternative to traditional charitable donations and sponsorships. Your clients can choose to use a portion or all of their revenues as a tax-deductible charitable contribution.

For example, one of our large financial clients contributed more than $44,000 to a local hospital this year by donating a portion of their buyback proceeds. Additionally, a leading non-profit hospital raised more than $40,000 for two charities, including a local food bank. Half of the revenues from their mobile devices provided more than 60,000 meals for hungry families this year alone, and without impacting their budget.

7. Measure the environmental impact and celebrate your success. Have your wireless recycling partner provide you with annual environmental impact statements that measure the positive impact of your reuse and recycling programs. Report and celebrate the success with your clients.

Businesses Request a Quote Button

 

December 20, 2011No Comments

Reducing the Security Risks of Employee-Owned Smartphones and Wireless Devices | e-Cycle

Employee-owned devices are becoming challenging to enterprise mobile security policies however there are a number of ways to control these ever-growing wireless security issues. Two of the most important factors to consider when moderating the security risks of employees’ personally owned devices are what level of support your company is willing to offer associates with non-company-owned devices and how these devices will access data.

There are several different approaches businesses take when dealing with the security of these mobile phones. Many organizations allow their employees to access email on their personally owned devices. Because most smartphones have active sync capabilities, these devices can be easily configured by the end user and the process requests a fairly low level of support. In other organizations, employees are permitted access to additional business data on their wireless devices however they are not provided with technical support through the IT department. Yet another option that businesses offer is full data access with a full level of IT support.

The varying methods of data access may also determine the level of IT support. When employees require a higher level of support, such as client/data server access, businesses may prefer that employees utilize company-owned and supported devices. However, an associate using a web portal on their mobile device to retrieve business data requires a much lower level of support because this system lacks complex software running on the end user’s device. In this situation an employee-owned device may be the appropriate choice.

Though data security is always a challenge with small businesses, understanding your options will help to keep employee-owned devices protected. The development of mobile VPN created the opportunity for simple implementation of mobile security options. Tools such as, device lock as well as lost and stolen phone tracking capabilities, are essential for today’s mobile enterprise security. Utilization of a Microsoft Exchange email server enables the opportunity for password protection, requiring end users to enter a password before accessing their email. This facilitates mobile phone security enforcement through the cloud. In the event that an employee leaves your organization, the Exchange server allows an email account to be easily removed from an employee’s mobile device by eliminating their access to the corporate email account – including all stored mailbox data. Revoking an employee’s credentials upon the severing of the employee relationship will discontinue their ability to login to the company server.

Businesses and organizations, both large and small, are making the transition to employee-owned devices. By making this switch, companies are eliminating the associated mobile phone expenses however they need to be aware of the potential issues that could arise from these personally owned devices. Most importantly, business owners need to establish a mobile security policy that includes password protection for the sensitive data contained within these wireless devices. These steps ensure that if a smartphone or tablet is lost or stolen, the company’s confidential information will remain protected. These devices were designed to increase worker productivity not cause extra stress, so offering employees technical support for their personally owned devices will keep them working efficiently and prevents aggravation with these technologies.

For more information or to view the full story How to Reduce Smartphone Security Risks at http://www.consumerelectronicsnet.com/article/How-to-Reduce-Smartphone-Security-Risks-1773667.

e-Cycle provides enterprises with secure end-of-life mobile phone asset recovery and recycling
Trusted by more than 7,000 organizations nationwide, including some of the largest companies in the world, e-Cycle delivers industry leading data deletion services to eradicate and protect sensitive data on your businesses’ used wireless devices. Our high-security work environment and processes have been meticulously designed to maintain the utmost protection of your confidential information. e-Cycle not only provides a rigorous, end-of-life data security process but also offers our clients a complimentary mobile phone recycling and wireless buyback services. To find out more on e-Cycle’s mobile phone asset recovery, recycling, and data deletion services, visit www.e-cycle.com.

Businesses Request a Quote Button

 

November 22, 2011No Comments

Tween Brands e-Cycle for Type 1 Diabetes

Tween Brand employees deliver cell phone a donation for the ‘e-Cycle for Type 1 Diabetes’ campaign. The organization’s weeklong mobile phone drive collected over 50 mobile phones for recycling. e-Cycle will donate $1 to the JDRF for every mobile phone received from November 14 through 23.

 

Businesses Request a Quote Button

 

November 15, 2011No Comments

Mobile Phone ‘Destroy-Only’ Policies – Bad for business, the environment and your bottom line | e-Cycle

In an effort to battle ever-increasing mobile security threats, many companies choose to develop an end-of-life electronic ‘destroy-only’ policy to combat these issues and ensure that their confidential information remains secure. Data deletion and asset recovery, however, offer alternative options that are both environmentally friendly and cost effective.

Physical destruction of mobile devices not only requires additional destruction and disposal expenses but also contributes to the growing issue of electronic waste. Since most smartphones retain 50% or more of their retail value even after 18 months of use, developing an asset recovery program within your organization will put money into your telecom budget and allow for upgrades to the newest mobile technology.

Asset recovery and recycling companies will purchase your functioning devices and prepare them for reuse in secondary markets. According to the EPA, reusing an electronic device saves up to 20 times more energy than recycling alone. Reusable mobile phones and devices purchased by an asset recovery company are sent through data removal process to permanently delete private information. Devices that do not still retain resale value are shredded and the materials recycled in an eco-friendly manner.

If your company policies prevent your organization from receiving a check back for your wireless devices, inquire with an asset recovery organization on alternative options for payment. Monthly bill payments can often be made directly to your wireless carrier. With ever increasing budget constraints, mobile phone buyback also offers a creative way to raise money for the charity of your choice. Your company can raise money through a mobile buyback program and a check can be written directly to the charity on your behalf.

With electronic waste representing 70% of the toxins in our landfills, it is imperative that organizations put policies in place to address this crucial growing issue. Mobile data security is a serious concern, but a destroy-only policy wastes energy and new revenue opportunities. Studies have shown that extending the service life of the phone from one to four years decreases the environmental impacts by about 40%. Recycling and reuse of your organization’s mobile phones will ensure a safe and sustainable end-of-cycle program that keeps the toxic materials inside of wireless phones out of landfills and ensures your sensitive data remains secure.

e-Cycle’s Mobile Phone Asset Recovery, Recycling and Data Security Solutions
e-Cycle delivers solutions for the security and sustainability issues that encompass end-of-life mobile phone procedures.  e-Cycle will purchase your used, functioning mobile devices that still retain resale value as well as delete all private data and recycle non-reusable devices at no charge. Our rigorous of data security process provides our customers with peace of mind that their confidential company information will remain secure. With a zero landfill policy, e-Cycle shreds all devices that cannot be reused and the materials are recycled in an ISO Certified, EPA-registered recycling facility.

For more information, visit www.e-Cycle.com or contact gogreen@e-Cycle.com or (877) 215-5255.

Businesses Request a Quote Button

 

November 3, 2011No Comments

e-Cycle to Donate $1 to JDRF for Every Mobile Phone Recycled in Celebration of America Recycles Day and American Diabetes Month

Mobile phone buyback and recycling company encourages businesses to support the Juvenile Diabetes Research Foundation by recycling their used mobile devices responsibly in November

Wireless mobile buyback and recycling company e-Cycle LLC has launched an “e-Cycle for Type 1 Diabetes” campaign that will donate $1 to the Juvenile Diabetes Research Foundation (JDRF) for every mobile phone the company purchases or recycles from Nov. 14 through the 23.

According to e-Cycle CEO, Chris Irion, the goal of the promotion is to help raise awareness and support for two causes that are close to his heart—America Recycles Day (Nov. 15) and American Diabetes Month (November). Irion said that he hopes the campaign will encourage organizations to recycle their used mobile devices responsibly in November and also help support a critical research fund dedicated to finding a cure for the debilitating disease.

“As a father of a child suffering with Type 1 Diabetes, I know first hand the difficult challenges that families face in fighting a deadly and life-changing disease, while also trying to maintain a normal and healthy family life,” Irion said. “e-Cycle was founded on three principals: a love of technology, environmental protection, and charitable giving. Our ‘e-Cycle for Type 1 Diabetes’ promotion touches all three of our passions and I hope businesses will join us in our cause.”

How the “e-Cycle for Type 1 Diabetes” promotion works

1.    Businesses and organizations collect their used mobile devices and mail them to e-Cycle using the company’s pre-paid FedEx shipping labels.  Go to www.e-Cycle.com and click on the “Contact Us” link in the upper right-hand section of the homepage, fill out the form and request a label in the “Questions or Comments” field.

2.    e-Cycle will purchase any devices that are reusable and still have market value and recycle all other phones and accessories at no-charge. Companies can elect to have the check written back to them or as a charitable contribution directly to the JDRF. All sensitive data is completely removed from the devices.

3.    e-Cycle will donate $1 for every mobile phone that the company receives from Nov. 14 through 23, 2011.

4.    All mobile devices and accessories that cannot be reused are shredded on site and sent to an EPA-registered metals refinery where the precious materials are reclaimed for reuse in the production of new products.
For more information about the promotion, visit http://www.e-cycle.com/contact-us/current-promotions.

About e-Cycle LLC
Ranked the #5 fastest growing environmental services company in the U.S. by Inc. 500|5000, e-Cycle helps organizations take a more responsible, secure and profitable approach to wireless recycling. e-Cycle buys used mobile phones that still retain value and recycles all others at no charge through an EPA-registered facility. The information on every device is either deleted or destroyed through rigorous mobile security measures. The company has a zero landfill policy. For more information, visit http://e-Cycle.com.

About JDRF

JDRF is the leading global organization focused on Type 1 Diabetes (T1D) research. Driven by passionate, grassroots volunteers connected to children, adolescents, and adults with this disease, JDRF is the largest charitable supporter of T1D research. The goal of JDRF is to improve the lives of every person affected by T1D by accelerating progress on the most promising opportunities for curing, better treating, and preventing T1D. For more information, visit http://www.jdrf.org.

About America Recycles Day
America Recycles Day, a program of Keep America Beautiful, is the only nationally recognized day dedicated to promoting and celebrating recycling in the United States. Every year on or around November 15 (America Recycles Day), millions turn out to thousands of local events held throughout the country to celebrate and learn more about their recycling programs. For more information, visit http://americarecyclesday.org/.

Businesses Request a Quote Button

 

October 12, 2011No Comments

Tips to Actively Prevent Corporate Mobile Security Attacks | e-Cycle

As threats to mobile data security become more common each day, businesses and organizations have a major responsibility to protect sensitive corporate data. To prevent company information from being compromised, businesses need to take a proactive approach to this growing issue and ensure their confidential information remains secure.

Cybercrime has become a lucrative business and is no longer limited to individual hackers. These criminals will use advanced, undetectable methods to steal data and wreak havoc on corporate networks. Many corporations are taking an “if it’s not broke, don’t fix it” approach to mobile security. While enforcing current mobile security protocols is an essential first step to the process, company mobile security procedures need to be reexamined and adapted to manage emerging trends.

When creating or modifying mobile security policies, companies need to consider not only the authentication of devices but also how devices are used outside of the corporate network. Another important factor businesses need to take into account is the accessibility of these devices to third parties such as employee family or friends. Overlooking any of these circumstances can lead to instances of inadvertent compromising of confidential company information.

Social Media has also become a big issue for mobile security threats. Not only does this media produce direct risks such as malicious links, these news feeds cause unintentional dangers as well. Social media has caused a cultural evolution in how our society communicates both on a personal and corporate level. While posts to Facebook and Twitter may not cause an immediate mobile threat, the analysis of various feeds could allow a hacker to track a users location or find weakness in a corporate network.

While social media provides unique marketing tools, it also provides an opportunity for security breach. Employees can unintentionally leak confidential company information through social media outlets. Companies need to develop a corporate procedure for social media etiquette and incorporate this into employee training to encourage proper online conduct. It is essential for businesses not only to implement security protocols but also help employees understand why it is crucial to implement them. Educating employees on current trends and increasing mobile threats will help prevent against security breaches.

The use of cloud computing is creating a large mobile security concern as well. When confidential company data is outsourced to third party vendors, businesses need to be aware of data management and accessibility. Organizations need to know their partner, understand their partner’s privacy policy and ensure it is being enforced.

Despite these and other security risks on mobile devices, the security initiatives are at the beginning stages. Corporate policies need to be modified so they apply to new and expanding technologies. Waiting to change these policies until there is an issue is a risk that companies cannot afford to take. Reviewing existing business procedures, consolidating IT infrastructure and implementing educational sessions among employees will all provide a level of defense to protect businesses from mobile security threats.

For more information view the full story Common oversights in enterprise data security by Kevin Kwang at http://www.zdnetasia.com/common-oversights-in-enterprise-data-security-62302289.htm.

e-Cycle provides secure end-of-life mobile phone asset recovery and recycling for businesses
Mobile phone security is becomes more tempting to hackers and cyber criminals everyday. Trusted by more than 7,000 organizations nationwide, including some of the largest companies in the world, e-Cycle not only provides complimentary mobile phone recycling and wireless device buyback services to businesses but also provides these organizations peace of mind through rigorous, end-of-life data security processes. To find out more on e-Cycle’s mobile phone asset recovery, recycling, and data deletion services, visit www.e-cycle.com.

Businesses Request a Quote Button

 

August 16, 2011No Comments

Congratulations to e-Cycle’s Summer Recycle Your Mobile Phone Apple iPad2 Giveaway Winners

To help raise awareness of the growing e-waste issue with cell phones and devices and to promote environmental protection, e-Cycle encouraged companies to practice responsible mobile phone recycling and data protection through our summer Apple iPad2 give away. Businesses and organizations that sold and/or recycled used mobile phones through the end of July 2011 were entered into a random drawing to win one of four Apple iPad2s.

Congratulations to our Apple iPad2 winners

  • Jana L., Construction Industry, Central Texas region
  • Clarence C., Transportation Industry, Washington D.C./Baltimore/Virginia region
  • Kevin S., Healthcare Industry, Southern California region
  • Telecom Professional, Human Resources Industry, Washington D.C./Baltimore/Virginia region

e-Cycle is trusted by more than 7,000 businesses, including some of the largest organizations in the world, for their wireless recycling and data protection needs. Providing businesses complimentary cell phone recycling and data security services, e-Cycle also increases their client’s revenue with a wireless buyback program. Since its inception in 2005, e-Cycle has purchased or recycled more than one million devices, keeping more than 250,000 pounds of toxic materials out of landfills.

For more information, visit www.e-cycle.com or call 1.877.215.5255.

Businesses Request a Quote Button

 

Let's start a conversation! Email us today.

1.877.215.5255

©2020 — e-Cycle. All rights reserved.
Designated trademarks and brands are the property of their respective owners. e-Cycle is not affiliated with the manufacturers of the items available for cash buyback.

Privacy Policy | Terms & Conditions | Site Map