Secure Government IT Asset Disposals
Servicing Local, State and Federal Government Departments Across AustraliaG1 Asset Management provides compliant and secure IT asset disposal services to a number of Australian government departments, and can tailor solutions to fit your departmental requirements.
NAID AAA Certified and ISM Compliant
G1 Asset Management provides NAID AAA certified data destruction services that are fully compliant with the Australian Government Information Security Manual (ISM) Controls and ISO 27001 for information security.View Available Data Destruction Solutions ›
ISO Accredited to Modern Safety & Information Security Standards
G1 Asset Management is accredited to OHSAS 18001 and AS/NZS 4801 safety standards, and ISO 27001 for information security. Our staff will comply with any on-site induction or site-specific safety requirements.View Our Accreditations ›
Reporting Tailored To Your Requirements
We can customise the fields and format of all asset reports to provide a simple interface into your existing asset management software.View Sample Asset Reporting ›
Reports are available in XLSX, CSV and PDF formats, with delivery available via direct email and secure online portal.
Disposal Solutions for Network Infrastructure
Our Cisco™ certified technicians will handle the erasure and disposal of your networking assets. We can also arrange the removal and recycling of server racks, UPS devices and other large or heavy IT assets.
Servicing All Australian Metro and Regional Areas
We provide collection coverage to all eastern capital cities. Our service area also extends to regional centers throughout New South Wales, Queensland, Victoria and the ACT.
BHP Laptop Donation To Indigenous Students During COVID-19
Assisting BHP to donate laptops to the Murri School through our Tech To Country iniatiative.
20 Essential Tips For GDPR Compliance
Ensure your business isn't risking serious penalties for GDPR non-compliance.
10 Global Data Breaches Exposed
There's a lot to be learned about what (not) to do, as we examine some of the highest-profile data breaches of the past decade.