3 Part Presentation Identifying responsible recyclers Identifying responsible recyclers Guaranteeing data security Guaranteeing data security Market conditions & equipment values Market conditions & equipment values