Skip to main content

Choose resale when devices are under three to four years old and retain strong secondary market value—premier enterprise laptops can recover 40 to 60 percent of their original cost. Choose donation when equipment still functions reliably but falls below the resale threshold, creating direct community impact and potential tax benefits for qualifying organizations. Choose recycling when hardware is broken, obsolete, or contains highly sensitive data requiring physical destruction. Most organizations use all three paths simultaneously, routing each asset based on its age, condition, residual value, and data sensitivity.

Your IT closet is full of retired laptops, and someone is asking what to do with them. The answer is not as simple as calling a recycler—because that working three-year-old ThinkPad could fund part of your next hardware purchase, while the one with the cracked screen belongs in a completely different pile.

Choosing the right disposition path for each device determines whether you recover value, create community impact, or simply comply with environmental regulations. According to IBM’s 2025 Cost of a Data Breach Report, the average cost of a data breach in the United States reached $10.22 million per incident—and improperly disposed IT assets are a leading vector. This guide walks you through exactly when resale, donation, or recycling makes sense and how to build an ITAD process that uses all three.

What is IT asset disposition and why does the path you choose matter?

IT Asset Disposition—ITAD—is how organizations securely retire technology at the end of its useful life. It is not a single action but a decision tree. Each device gets routed based on condition, remaining value, and the data it contains. In 2026, ITAD has evolved from a reactive disposal task into a regulated, strategic function driven by accelerated hardware refresh cycles, mandatory ESG reporting, and international data security standards.

Picking the wrong path creates real problems. You might shred equipment that could have generated revenue—the International Electronics Manufacturing Initiative (iNEMI) found in 2026 that vast quantities of fully functional enterprise drives are destroyed unnecessarily due to unfounded security fears. Or you might donate devices with sensitive data still intact. Or miss the chance to help a student who lacks a computer at home. The right path depends entirely on what you are working with.

The three main paths for retiring old IT equipment

Most retired IT assets follow one of three disposition paths. Your job is matching each device to the right one.

PathBest ForValue RecoverySocial ImpactEnvironmental Outcome
ResaleRecent, functional equipment (under 3-4 years old)High (40-60% of original cost for premier enterprise devices)IndirectExtends device lifespan; averts carbon emissions from manufacturing new hardware
DonationWorking devices below resale thresholdTax deduction potential for qualifying organizations (subject to 2026 OBBBA thresholds)Direct community benefit bridging the digital divideExtends device lifespan in underserved communities
RecyclingBroken, obsolete, or high-risk assetsMinimal (raw material recovery only)NoneRecovers copper, lithium, rare earth metals; prevents hazardous materials from entering landfills

What is ITAD resale?

Resale means selling functional equipment on the secondary market to recover a portion of your original investment. Enterprise laptops, servers, and networking gear from tier-one manufacturers—Dell Technologies, Hewlett Packard Enterprise, Cisco, and NetApp—often retain significant value when they are only a few years old.

What is ITAD donation?

Donation transfers working devices to nonprofits, schools, or underserved communities at no cost. Digital equity in 2026 requires three pillars: affordable devices, reliable internet access, and digital skills training. Organizations like Human-I-T address all three through comprehensive donation programs that transform corporate e-waste into measurable social impact.

What is ITAD recycling?

Recycling responsibly breaks down equipment to recover raw materials like copper, aluminum, lithium, and rare earth metals. This path applies when devices have no remaining use value due to age, damage, or obsolescence. Modern electronics recycling is an advanced materials recovery process governed by international compliance frameworks—not rudimentary shredding.

When is resale the best choice for IT asset disposition?

Resale makes sense when your devices are recent enough to command market value and data can be securely sanitized before sale. Organizations that successfully capture residual value from retiring assets can offset between 20 and 40 percent of their original infrastructure investments, according to 2026 industry benchmarks. You are essentially turning a cost center into a revenue stream.

Devices with strong secondary market value

Enterprise laptops under three to four years old, recent-model servers, and current-generation networking equipment typically retain meaningful resale value. Certain premier enterprise laptops retain 40 to 60 percent of their original value after three years. Timing matters—market value drops sharply after manufacturers release new product lines, so acting promptly after decommissioning maximizes your return.

With AI-driven refresh cycles now compressing to 18 to 24 months for high-performance computing infrastructure, the volume of resalable assets entering the secondary market has surged. Forty-four percent of organizations now refresh their compute infrastructure every three years or less, driven by anticipated compute spending increases of up to 20 percent to support AI workloads.

Refresh cycles where cost recovery matters

Organizations on regular technology refresh cycles can offset new equipment costs through structured resale programs. If you are replacing hundreds of laptops every three years, the recovered value adds up. Some IT teams fund entire upgrade projects through strategic resale of outgoing equipment.

When full-system resale is not viable due to localized damage—a cracked chassis, for example—sophisticated ITAD providers execute parts harvesting, stripping out high-value CPUs, memory modules, and GPUs to feed the global repair economy. This maximizes recovery even from partially damaged assets.

The shift from destruction-first to recovery-first

A pervasive “destruction-first” mentality has historically undermined resale potential. Organizations routinely shred drives rather than sanitize and reuse them, destroying hundreds of dollars of recoverable asset value per device while necessitating the carbon-intensive manufacturing of replacements.

Sophisticated enterprises are shifting toward a “recovery-first” model that prioritizes certified, software-based data erasure—leaving physical hardware intact for resale. This approach aligns data security directly with value recovery goals, because modern IEEE 2883-2022 Cryptographic Erase methods sanitize drives to a laboratory-resistant standard while preserving the hardware.

When is donation the best choice for IT asset disposition?

Donation is the optimal path when devices still function reliably but fall below the financial threshold where resale logistics are justified. A five-year-old laptop might command $40 to $100 on the secondary market—a figure easily consumed by listing, shipping, and processing fees. That same device holds immense value for a student without home computer access or a job seeker developing digital skills.

Working devices below the resale threshold

Many functional devices fall into a gap where resale is not practical but donation creates meaningful impact. The resale threshold varies by device category, but as a general rule: if the logistics cost of sanitizing, listing, and shipping a device exceeds its secondary market value, donation delivers greater total return through tax benefits plus community impact.

IT Asset Category2026 Fair Market Value (Good Condition)2026 Fair Market Value (Excellent Condition)
Enterprise Laptop (2-4 years old)$100$350
Desktop Workstation$40$200
Mid-Size Display (32″-50″)$50$200
Legacy Smartphone$20$150

Values reflect realistic secondary market valuations for functioning equipment acceptable under 2026 IRS Fair Market Value guidelines.

Tax deduction eligibility under the 2026 OBBBA framework

The tax landscape for IT equipment donations changed significantly with the One Big Beautiful Bill Act (OBBBA), enacted for the 2026 tax year. Organizations considering donation for tax purposes should understand three critical thresholds:

For non-itemizing taxpayers: The OBBBA introduced an above-the-line deduction of up to $1,000 for single filers and $2,000 for joint filers—but this deduction is restricted to cash contributions only. Non-cash donations including IT hardware are explicitly excluded.

For itemizing taxpayers: A new 0.5 percent Adjusted Gross Income (AGI) floor means charitable contributions are only deductible when they exceed 0.5 percent of AGI. Small, piecemeal hardware donations may yield zero tax benefit unless aggregated into larger disposition waves.

For corporate donors: Corporations face a new 1 percent floor—donations must exceed 1 percent of taxable corporate income before any tax relief is realized. This forces enterprises toward structured, bundled end-of-year IT refresh donations rather than ad-hoc giveaways.

The IRS limits deductions to Fair Market Value—what a willing buyer would pay for the item in its current condition. Per IRS Publication 526, all non-cash donations must be in “good used condition or better,” meaning the device powers on, functions normally, and has all essential components. Non-functional hardware has an FMV of $0. Documentation requirements escalate with value: donations over $250 require written acknowledgment from the charity, and total non-cash contributions over $500 annually require IRS Form 8283.

Consulting a tax professional is essential before factoring deductions into disposition decisions, particularly given the 2026 threshold changes.

Programs tied to CSR and ESG goals

Donation creates measurable metrics for sustainability reporting that go beyond what commercial recyclers can provide. You can document exactly how many devices went to underserved communities, how many households gained technology access, and how many pounds of e-waste stayed out of landfills.

Under the EU’s Corporate Sustainability Reporting Directive (CSRD) and ISSB frameworks, sustainability reporting has become a legally binding financial disclosure for large companies. Scope 3 greenhouse gas emissions—which include end-of-life processing of IT assets—must be reported. ITAD providers that refurbish and redeploy devices can also quantify Scope 4 “avoided emissions”: the carbon prevented by extending a device’s life rather than manufacturing a new one.

Organizations like Human-I-T provide detailed social impact reports alongside standard ITAD documentation, delivering board-ready ESG metrics that transform a compliance requirement into CSR value.

When is recycling the best choice for IT asset disposition?

Recycling is the appropriate path when equipment has no reuse potential—whether due to age, damage, or obsolescence. Think of recycling as the last resort in a responsible ITAD program, not the default. The global recycling landscape in 2026 is governed by significantly stricter international regulations than even two years ago.

End-of-life hardware with no reuse value

Some equipment is simply too old to serve anyone. Devices that cannot run current software, lack available replacement parts, or use obsolete connection standards belong in the recycling stream. Their copper, aluminum, lithium, and rare earth metals can be recovered through advanced hydrometallurgical extraction processes—a sector projected to reach $6.9 billion in 2026 and $37.5 billion by 2035, according to industry forecasts.

Damaged or non-functioning equipment

Physical damage, failed components, or repair costs exceeding replacement value all point toward recycling. If fixing a device costs more than buying a refurbished replacement, recycling recovers what value remains in the raw materials.

Components containing hazardous materials

Batteries, CRT monitors, and certain electronic components contain materials requiring specialized handling. The EU Battery Regulation (2023/1542) now enforces strict lifecycle management for industrial batteries—by 2027, batteries over 2 kWh will require an electronic “Battery Passport” documenting chemistry, supply chain history, and sustainability metrics. By 2031, manufacturers must incorporate a minimum of 6 percent recycled lithium into new batteries.

Certified recyclers—look for R2v3 or e-Stewards certification—follow strict protocols for hazardous materials, ensuring they do not end up in landfills or unregulated export streams. The Basel Convention’s e-waste amendments, which took full effect in January 2025, now require formal Prior Informed Consent for all transboundary movements of electronic waste, making domestic certified recycling the most practical compliance path.

How to decide between recycling, donation, and resale for each IT asset

Most organizations will use all three paths simultaneously. The key is matching each asset to the right one through a systematic decision matrix. A sophisticated enterprise ITAD program evaluates every retiring asset individually rather than defaulting to a single path.

Step 1: Assess device age and functional condition

Start with the basics: does it power on and function normally? Non-functional equipment goes to recycling. Functional devices continue to value assessment. This first filter is straightforward but often skipped when organizations default to recycling everything—destroying potential revenue and community impact.

Step 2: Check secondary market value for functional devices

For working devices, research current secondary market prices. Enterprise equipment under three to four years old from tier-one manufacturers often surprises people with its retained value. If the expected resale price meaningfully exceeds the logistics cost of sanitization, listing, and shipping, resale recovers budget. If not, donation likely delivers greater total value than recycling.

Step 3: Evaluate data sensitivity and compliance requirements

Highly regulated data—healthcare records under HIPAA (where violations average $2.3 million per incident), financial information under PCI DSS, or Controlled Unclassified Information under CMMC 2.0—may require specific sanitization levels or physical destruction regardless of device value. When compliance mandates are strict enough, they override cost recovery considerations.

Federal agencies must follow FISMA and NIST SP 800-88 requirements. Defense contractors handling CUI require NAID AAA certification. Healthcare providers need documented ePHI disposal per HIPAA §164.310(d)(1). In these environments, serialized Certificates of Data Destruction documenting the exact technical standard, device serial number, and technician are mandatory—batch certificates are explicitly rejected.

Step 4: Aggregate donations strategically to meet 2026 tax thresholds

Under the OBBBA’s new 0.5 percent AGI floor for individual itemizers and 1 percent corporate floor, small ad-hoc donations may not yield tax benefits. Organizations should aggregate functional devices below the resale threshold into structured, end-of-year disposition waves that cross the required thresholds—converting depreciated technology into impactful community donations with meaningful tax relief.

Step 5: Consider your organization’s impact goals

Organizations prioritizing community benefit may choose donation over resale even when resale is viable. The financial return from selling a $75 laptop might matter less than putting that device in the hands of someone who needs it—while simultaneously generating ESG metrics for sustainability reporting.

Data security standards that apply across all three ITAD paths

Data destruction requirements apply regardless of whether you resell, donate, or recycle. A device leaving your possession with recoverable data is a liability. In 2026, the standards governing data sanitization underwent a structural shift that every IT leader needs to understand.

The NIST 800-88 and IEEE 2883-2022 framework

In September 2025, NIST released Revision 2 of Special Publication 800-88, fundamentally splitting data sanitization responsibilities between two complementary standards. NIST SP 800-88r2 now functions as a pure governance and programmatic standard—it no longer contains device-specific technical wipe instructions. For the actual technical execution of sanitization, NIST r2 explicitly defers to IEEE 2883-2022.

Enterprise data policies that reference “NIST 800-88 compliance” without also addressing IEEE 2883-2022 are considered technically deficient in 2026. IEEE 2883 defines three sanitization levels:

IEEE 2883-2022 LevelWhat It DoesWhen to Use ItHardware Outcome
ClearLogical block removal protecting against non-specialized recovery toolsInternal redeployment within the same trusted environmentDevice preserved for internal reuse
PurgeFirmware-level commands (Cryptographic Erase) protecting against laboratory-grade forensic recoveryDevices leaving your organization for resale, donation, or lease returnDevice preserved for external secondary market
DestroyPhysical pulverization or incineration meeting strict micro-particle size limitsHighly classified data or media that cannot be logically purgedDevice permanently destroyed

Critical change for 2026: IEEE 2883 removed standard shredding as a recognized destruction method for SSDs and flash memory. Because flash memory chips are extremely small, standard industrial shredders can pass intact chips through their blades, leaving data recoverable. Only micro-pulverization meeting strict particle size limits qualifies. ATA Secure Erase—previously considered reliable—is now flagged as insufficient for modern SSDs, achieving only “Clear” status rather than the “Purge” required for external disposition.

NAID AAA certification

Issued by the International Secure Information Governance and Disposition Alliance (i-SIGMA), NAID AAA guarantees that a facility employs vetted, background-checked personnel, maintains GPS-tracked chain of custody, and passes unannounced third-party audits.

Chain of custody documentation

Documented tracking of devices from pickup through final disposition proves your equipment was handled securely at every step. Erasure certificates must now explicitly document the specific firmware command used, the storage interface type, the verification method, and a timestamp to satisfy auditors under frameworks like GDPR.

Human-I-T provides NAID AAA and ISO-certified data sanitization across all disposition paths—resale, donation, and recycling.

Documentation and reporting you need for each ITAD path

Proper documentation protects you during audits and proves you handled sensitive data responsibly.

Certificates of data destruction are required for all paths, documenting the IEEE 2883-2022 sanitization level, specific firmware commands, device serial numbers, and technician identification. In high-compliance environments (federal, healthcare, financial), serialized per-device certificates are mandatory—batch certificates are not accepted.

Asset tracking reports provide serial numbers, disposition dates, and final outcomes for every device. The EU’s Digital Waste Shipment System (DIWASS), launching May 21, 2026, transitions all waste shipment procedures to a mandatory electronic platform, increasing scrutiny on reuse claims.

Social impact reports document where donated devices went and the community benefit created—households connected, students equipped, job seekers trained. These metrics feed directly into ESG disclosures and sustainability reporting.

Environmental impact documentation tracks pounds diverted from landfill, materials recovered, and carbon emissions avoided. Scope 3 and Scope 4 metrics aligned with the GHG Protocol enable organizations to document progress toward science-based emissions targets.

When regulators or auditors ask questions, complete documentation is your first line of defense.

Common mistakes when choosing an ITAD path

Defaulting to recycling for every device

Recycling functional equipment wastes both financial value and social impact opportunity. According to iNEMI’s 2026 research, vast quantities of fully functional enterprise drives are destroyed unnecessarily because organizations default to shredding. Working laptops get shredded while students go without computers—and each destroyed device necessitates the carbon-intensive manufacturing of a replacement.

Assuming standard shredding destroys SSD data

Under IEEE 2883-2022, standard industrial shredding is no longer recognized as a secure destruction method for SSDs and flash memory. Flash chips can pass intact through shredder blades. Organizations relying on shredding alone for modern storage media face both a data security gap and a compliance gap.

Skipping certified data sanitization before donation or resale

Data breaches from donated or resold equipment create serious liability—averaging $10.22 million per incident in the United States, according to IBM. A factory reset is not sufficient. IEEE 2883-2022 Purge-level sanitization (Cryptographic Erase) is the baseline for any device leaving your organization.

Making small ad-hoc donations without checking tax thresholds

Under the 2026 OBBBA framework, the 0.5 percent AGI floor for individual itemizers and the 1 percent corporate floor mean piecemeal donations may produce zero tax benefit. Aggregate devices into structured disposition waves that exceed the applicable threshold.

Overlooking the environmental value of reuse over recycling

Extending device life through donation or resale has greater environmental benefit than recycling. Manufacturing new devices requires significant energy and resources. Every year you extend a device’s useful life reduces its overall carbon footprint—and Scope 4 avoided-emissions metrics can quantify this benefit for ESG reporting.

How to choose an ITAD partner that handles all three paths

The right partner simplifies disposition by evaluating your assets and routing them appropriately across resale, donation, and recycling. Working with a single partner who handles all three paths eliminates the complexity of coordinating separate vendors.

Certifications and compliance credentials

Look for these four certifications, each verifying a different operational vector:

CertificationWhat It VerifiesKey Requirement
NAID AAASecure data destructionUnannounced third-party audits; GPS-tracked chain of custody
R2v3Responsible recyclingReuse/refurbishment attempted before shredding; landfill disposal prohibited
e-StewardsEthical e-waste handlingNo export of toxic waste to developing nations; Basel Convention aligned
ISO 9001 / 14001 / 45001Quality, environmental, and safety managementContinuous improvement and standardized processing

R2v3 is particularly important because it enforces a strict hierarchy: reuse and refurbishment must be attempted before material recovery or shredding. This aligns directly with a recovery-first ITAD strategy.

Transparent reporting and chain of custody

Detailed documentation from pickup through final disposition matters for both compliance and audit readiness. Ask potential partners what reports they provide, whether erasure certificates document the specific IEEE 2883-2022 method used, and how they track devices throughout the process.

Measurable social and environmental impact

Mission-driven partners like Human-I-T provide impact reports showing devices donated, households connected, and e-waste diverted—with metrics aligned to GHG Protocol and ESG reporting frameworks. This transforms a compliance requirement into demonstrable corporate social responsibility.

Turn your next IT refresh into real community impact

Human-I-T helps organizations navigate all three ITAD paths—resale, donation, and recycling—while maximizing data security, compliance, and community benefit. Devices that can be reused go to underserved communities through digital inclusion programs, addressing all three pillars of digital equity: affordable devices, reliable internet, and digital skills training. Equipment past its useful life gets responsibly recycled through certified processes.

Contact Human-I-T today to discuss your ITAD needs →

Frequently asked questions about choosing an ITAD path

When is it better to choose recycling, donation, or resale for IT asset disposition?

Choose resale for functional enterprise equipment under three to four years old that retains strong secondary market value—this recovers 20 to 40 percent of your original investment. Choose donation for working devices that fall below the resale threshold but still function reliably, particularly when aggregated to meet 2026 OBBBA tax thresholds. Choose recycling only for broken, obsolete, or physically damaged hardware with no remaining use value. Most organizations use all three paths simultaneously, routing each asset based on age, condition, residual value, and data sensitivity.

Is donating IT equipment still tax deductible in 2026?

Yes, but the 2026 One Big Beautiful Bill Act (OBBBA) changed the thresholds significantly. Individual itemizers face a new 0.5 percent AGI floor, and corporations face a 1 percent taxable income floor—meaning small donations may not qualify. The new non-itemizer deduction ($1,000/$2,000) applies only to cash, not hardware. Organizations should aggregate device donations into structured waves that exceed the applicable threshold. All donated devices must be in “good used condition or better” per IRS Publication 526, and consulting a tax professional is recommended.

How quickly does IT equipment lose resale value?

Enterprise IT equipment depreciates rapidly after manufacturers release new product lines, but premier enterprise laptops from tier-one manufacturers can retain 40 to 60 percent of their original value at the three-year mark. AI-driven refresh cycles have compressed to 18 to 24 months for high-performance computing, accelerating the flow of recent equipment into secondary markets. Acting promptly after decommissioning—rather than letting equipment sit in storage—maximizes recovery.

What data sanitization standard should ITAD follow in 2026?

Since September 2025, proper ITAD data sanitization requires compliance with both NIST SP 800-88 Revision 2 (governance framework) and IEEE 2883-2022 (technical execution). IEEE 2883 defines three levels: Clear for internal redeployment, Purge (Cryptographic Erase) for devices leaving your organization, and Destroy for classified data. Notably, standard shredding is no longer recognized as secure for SSDs, and ATA Secure Erase has been deprecated for modern drives.

Can leased IT assets be donated or resold?

Leased equipment typically returns to the lessor per your agreement terms. Device-as-a-Service (DaaS) contracts increasingly embed reverse logistics with pre-scheduled pickups and documented compliance as part of the original SLA. Review your lease contract to confirm disposition requirements before planning donation or resale—failure to return assets promptly or sanitize them to certified standards can trigger vendor penalties.

What is the difference between R2v3 and e-Stewards certified recyclers?

R2v3 and e-Stewards are both recognized certifications for responsible electronics recycling, but they emphasize different priorities. R2v3, administered by SERI, enforces a strict reuse-before-recycling hierarchy and mandates secure data wiping. e-Stewards strictly prohibits the export of toxic e-waste to developing nations and bans prison labor in recycling facilities. Both certifications indicate verified environmental and data security standards. Elite ITAD facilities often hold both alongside ISO 9001, 14001, and 45001 certifications.

What compliance frameworks govern ITAD for regulated industries?

Federal agencies follow FISMA and NIST SP 800-88. Defense contractors handling Controlled Unclassified Information must meet CMMC 2.0 requirements and hold NAID AAA certification. Healthcare providers must comply with HIPAA §164.310(d)(1) for ePHI disposal, where violations average $2.3 million per incident. Financial services and retail must meet PCI DSS Requirement 9.8.2, rendering cardholder data completely unrecoverable upon hardware retirement. The GSA’s January 2026 IT Security Procedural Guide (Revision 1) requires contractors to implement NIST SP 800-171 Rev 3 with nine mandatory “showstopper” controls.

Lo Terry

About Lo Terry