Slide background

Data Security Information

At Firefly we adhere to strict policies for control, security and protection of all wireless and IT assets that enter our facility. We take great measures to ensure all procedures are followed and perform regular and secondary audits for confirmation upon completion.

z-spacer-slim

Documentation includes purchase order confirmation, ESN tracking, Certificate of Data Deletion and Certificate of Data Destruction. This documentation provides our clients with the empirical data necessary to ensure their devices have been handled correctly and with the highest integrity. A detailed description of our Data Security Process is available.

Copyright © 2010-2014 Firefly IT Asset Recovery, Inc. All rights reserved