The first step in our methodology is to process all received donations at our local staging centers.
Sort, Test & Itemize
We sort, test and itemize all equipment received.
Our data destruction process: During this step, we destroy any data on hard drives to meet the specifications outlined in NIST 800-88 4 and 800-14 publications. If the data on the drive cannot be sanitized through software, the drive is physically destroyed. Networking equipment will be cleared of all logs and reset to default factory settings.
We strive to take all measures in order to remain compliant with Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), Fair and Accurate Credit Transactions Act (FACTA), Federal Information Security Management Act (FISMA), Personal Information Protection and Electronic Documents Act (PIPEDA), and the Sarbanes-Oxley Act.
Non-Profit Schools are identified based on needs and the ability to support the desired technologies.
Site Survey and Remediation
Bits2Bytes performs an on-site survey to evaluate site readiness and gathers any required data to build a bill of materials list for the technologies to be implemented. We then review our current inventory and purchase new/used devices if necessary.
Design and Staging
Every solution goes through design, staging and pre-configuration at our US-based staging Center. During this phase, we develop a detailed Low-Level Design (LLD) document and acquire any necessary approvals from the recipient’s department/ministry of government before beginning the implementation process. The entire solution is configured and shipped ready for installation so as to minimize the time required on-ground to place the technologies in production.
Shipment & Delivery
After going through rigorous testing, we properly package, ship and deliver the solution to the designated recipients.
We install, implement and test the equipment for full functionality before going live. Along with the implementation, one of the most important responsibilities is the testing knowledge transfer we provide after.
We facilitate an introduction (typically led by a volunteer instructor or teacher) to some of the many tools on the internet that can now be used to empower the academic lives of both teachers and students.
We teach about the donated technology - how to manage and maintain it. Exposure to the actual administration of the technology is a crucial step to helping build a local workforce who can meet the changing demands of the 21st century technology industry.