Give Kids Devices For Learning.
DONATE A DEVICE
Fill out the form below to pledge your device. Early counts of these device donations help us plan and reduce costs of future device purchases for children experiencing homelessness.
|
1. Fill out our Donation Form
2. Fill out and print the Tax-Deduction receipt 3. Place Tax-Deduction receipt into box 4. Send package from FedEx/UPS/Post office to C2K using the address: Computers 2 Kids Attn: Bridging Tech 8324 Miramar Mall San Diego, CA 92121 |
What happens to my device?
Info from our partners at Computers 2 Kids (C2K)
How Do We Refurbish the Computers?
C2K understands the importance of security to our individual and corporate technology donors. Thoroughly deleting confidential data is essential and for businesses looking for ways to comply with the security requirements of legislation like the Sarbanes-Oxley Act and The Health Insurance Portability and Accountability Act of 1996, a sound policy on data control and destruction is crucial.
C2K receives computers systems and electronic devices from members of the community and from corporate donors. Often, many of the donated devices contain electronic data that is stored on the computer systems hard drive and electronic media. Much of this data consists of confidential and sensitive information, including student records, financial data, personnel records, and research information.
Protecting sensitive data.
STAGE 1: C2K uses a method of disk sanitation that is equivalent to the procedures detailed in the US Department of Defense National Industrial Security Program Operating Manual DoD 5220.22-M.
Hard drives that are not reusable are destroyed. At no time do hard drives pass through C2K’s custody without either being sanitized or destroyed through a secure Degaussing process.
Upon completion of our sanitation process all personal data as well as the Windows operating system and everything else on the hard drive is erased.
STAGE 2: As a Microsoft Registered Refurbisher, the next stage of the computer refurbishment process is to load a new Windows Professional operating system, Microsoft Office Suites, Microsoft Security Essential anti-virus software and various other useful software programs. Microsoft Certificates of Authenticity labels are then attached to each computer.
STAGE 3: The final stage involves checking the various components, such as memory chips, CD Rom drive, sound and video to make sure everything is in proper working order.
Continuous donations and pledges of other technology as it becomes available from our partners is the fundamental corner stone of our program. In an effort to obtain a steady and large supply of working, refurbished computers, we are constantly seeking new partnerships with corporations within our community to help achieve our growth goals.
Donate your computer or electronics and make the world a better place!
C2K understands the importance of security to our individual and corporate technology donors. Thoroughly deleting confidential data is essential and for businesses looking for ways to comply with the security requirements of legislation like the Sarbanes-Oxley Act and The Health Insurance Portability and Accountability Act of 1996, a sound policy on data control and destruction is crucial.
C2K receives computers systems and electronic devices from members of the community and from corporate donors. Often, many of the donated devices contain electronic data that is stored on the computer systems hard drive and electronic media. Much of this data consists of confidential and sensitive information, including student records, financial data, personnel records, and research information.
Protecting sensitive data.
STAGE 1: C2K uses a method of disk sanitation that is equivalent to the procedures detailed in the US Department of Defense National Industrial Security Program Operating Manual DoD 5220.22-M.
Hard drives that are not reusable are destroyed. At no time do hard drives pass through C2K’s custody without either being sanitized or destroyed through a secure Degaussing process.
Upon completion of our sanitation process all personal data as well as the Windows operating system and everything else on the hard drive is erased.
STAGE 2: As a Microsoft Registered Refurbisher, the next stage of the computer refurbishment process is to load a new Windows Professional operating system, Microsoft Office Suites, Microsoft Security Essential anti-virus software and various other useful software programs. Microsoft Certificates of Authenticity labels are then attached to each computer.
STAGE 3: The final stage involves checking the various components, such as memory chips, CD Rom drive, sound and video to make sure everything is in proper working order.
Continuous donations and pledges of other technology as it becomes available from our partners is the fundamental corner stone of our program. In an effort to obtain a steady and large supply of working, refurbished computers, we are constantly seeking new partnerships with corporations within our community to help achieve our growth goals.
Donate your computer or electronics and make the world a better place!