Thank you for considering a donation of equipment to Laptop Upcycle. Your donation of equipment is instrumental to our success, but more importantly, it is what makes a difference in a young adult's life and helps them to realize their goals.
Here's how the process works:
You first complete the Donate Technology form below. We collect your profile/contact information and the type of equipment you are prepared to donate.
Laptop Upcycle will contact you to confirm the information and coordinate drop off or pick up.
Once we receive the equipment, we log it in our system and generate a thank you/tax receipt letter to you or your organization.
Upon delivery to a client you can expect a brief note from that client an/or Laptop Upcycle describing how it is being used.
Equipment Accepted - What We'll Take
"In order to simplify the process and best serve our clients with a stable supportable computing environment, Laptop Upcycle needs to limit the equipment we accept. First we accept only laptops (hence the name). Our experience is that our clients need portable solutions. We accept laptops running Microsoft Windows, recent versions of Apple Macbooks, and Google Chromebooks. In addition we request that laptops meet the following minimum standards:
They must be in working order. All keys, mice, trackpads, and mouse buttons should function properly.
Each machine should include the proper working power adapter.
The internal RAM memory for donated laptops should be 2 GB or greater.
The laptop BIOS should not be locked (sometimes seen on corporate hardware). If the BIOS on your laptop is locked, please have your corporate IT department unlock it prior to donation.
Data Destruction and Your Equipment
Laptop Upcycle will wipe the contents of the hard drive(s) of any donated device prior to the installation of a Ubuntu image (non-chromebooks). We will use industry standard software to completely wipe your data and issue you a certificate of data destruction with every donation. Our current standard for data destruction is SecureErase, Once enabled, SecureErase wipes data to the specification (NIST 800-88 4 and 800-14). Secure Erase is compliant with the following laws: the Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), Fair and Accurate Credit Transactions Act (FACTA), Federal Information Security Management Act (FISMA), Personal Information Protection and Electronic Documents Act (PIPEDA), and the Sarbanes-Oxley Act.