Most office IT decommissions are not planned — they are reacted to. The lease expiration or facility closure is known months in advance, but the IT teardown gets scheduled four weeks out because everything else on the project takes priority until it cannot.
Four weeks is enough time to execute a clean office decommission if you know what order to do things in. It is not enough time if you are figuring out the order as you go.
This is a realistic week-by-week timeline for a 30-day office IT decommission, with the items most teams discover too late highlighted throughout.
Before You Start: What You Are Actually Decommissioning
The scope of an office IT decommission is almost always larger than the initial estimate. Most teams are thinking about servers, workstations, and network gear when they start planning. The full scope typically includes:
- Servers and storage (local file servers, NAS devices, backup appliances)
- Workstations, laptops, and monitors
- Networking infrastructure: switches, routers, access points, patch panels, structured cabling
- PBX phone system — physical hardware, analog or IP, including any voicemail storage. PBX systems often store call logs and messages that require data destruction consideration.
- UPS units — uninterruptible power supplies contain large batteries that require specialized disposal. They cannot go with standard IT recycling and they cannot go in a dumpster. Plan this separately.
- AV equipment — conference room displays, projectors, video conferencing units, digital signage controllers. Often overlooked until someone tries to take a screen off the wall on move day.
- Printers and multifunction devices — these contain internal hard drives that require data destruction, not just resale or recycling
- Security hardware — badge readers, access control servers, camera systems, NVRs/DVRs (which contain storage media)
- Any leased equipment — this has to go back to the right vendor, not into your ITAD stream
Build this list in week one. Everything else depends on it.
Week 1: Inventory and Vendor Engagement
Days 1-3: Full Asset Inventory
- Walk every room and closet — not just the server room. Closets and under-desk spaces typically surface 15-20% of assets not on the asset register.
- Document every device: make, model, serial number, asset tag, and ownership status (owned vs. leased vs. employee-owned)
- Identify every device containing storage media — servers, workstations, laptops, NAS, printers, PBX, NVR/DVR, AV controllers. These require chain-of-custody handling and data destruction documentation.
- Flag leased equipment for return to the appropriate vendors. Confirm return deadlines — late returns on leased gear generate penalty fees.
- Identify any equipment under active maintenance contracts. Some vendors require advance notice before equipment is decommissioned.
Days 3-5: Vendor Engagement
- If using an ITAD vendor for data destruction: engage now. Good ITAD vendors have scheduling windows that fill up — 30 days is tight. Confirm their availability for your timeline before committing to your project schedule.
- If using a logistics vendor for transport: engage now. Confirm they have availability for your preferred dates and that they have the appropriate capabilities (chain-of-custody documentation, certificates of destruction if applicable).
- Confirm UPS/battery disposal plan. This requires a vendor who specifically handles industrial batteries — most ITAD vendors do not.
- Confirm structured cabling removal scope with your vendor. Some building landlords require that cabling be removed; others prefer it stay. Check your lease.
Week 2: Data Security Planning and Logistics Prep
Data Classification
Before any device leaves the building, determine the data classification for every storage-bearing device:
- Regulated data (PHI, PII, PCI, financial records): requires NIST 800-88 Purge or Destroy-level sanitization and a serialized certificate of destruction. No exceptions.
- Internal confidential: requires documented destruction, serialized certificate preferred
- Low-sensitivity or already-encrypted with key destroyed: cryptographic erase may be sufficient
Do this classification exercise before you create your ITAD scope of work. A vendor who treats all media the same does not have a technically sound process.
Chain-of-Custody Setup
- Create a serial-number-level asset manifest for every storage-bearing device. This is the starting document for chain-of-custody. Every subsequent handoff references it.
- Designate a single person on your team as the chain-of-custody custodian — responsible for signing manifests, verifying equipment at pickup, and retaining documentation.
- Confirm your ITAD vendor's certificate of destruction format before the engagement begins. Ask for a sample. If it does not list devices by serial number, it will not satisfy an audit.
Logistics Staging
- Designate a staging area in the office — ideally a lockable space — where equipment can be consolidated as it is removed from workstations and storage rooms
- Order packaging materials: anti-static bags for drives and components, server caddies, cable management supplies for organized removal
- Confirm parking and elevator access with building management for your move dates
Week 3: Physical Removal
Sequence Matters
Remove equipment in reverse dependency order — things that other things depend on come out last:
- Workstations and user devices first (lowest downstream dependency)
- Printers, AV equipment, and peripheral devices
- PBX and phone system hardware
- Networking edge gear (access points, floor switches)
- Core networking (distribution switches, routers, firewalls)
- Servers and storage last (everything else depends on these)
⚠️ Do not remove UPS units before the equipment they protect. Powering down a server room without backup power during the removal process is an unnecessary risk if the building power is unreliable.
During Removal
- Photograph each device before removal — serial number visible, current physical condition documented
- Log each removal against the asset manifest: removed by, date, current location (staging area)
- Segregate storage-bearing devices from non-storage hardware in staging. They have different handling requirements and different disposition streams.
- Remove drives from desktop workstations before handing to ITAD if your ITAD vendor requires pre-separation. Confirm this in advance — it varies by vendor.
- ⚠️ Check printers for stored jobs and address books. Multifunction printer hard drives store copies of every document printed, scanned, or faxed. Most organizations miss this entirely.
- ⚠️ Check security cameras and NVR/DVR units. These store footage that may contain sensitive information about your facility, staff, or operations. Treat the storage media as sensitive.
Week 4: Disposition, Documentation, and Final Walkthrough
ITAD Handoff
- Transfer storage-bearing equipment to ITAD vendor with signed, serialized manifest
- Both parties sign the manifest at pickup. Your custodian retains a copy.
- Confirm the destruction schedule — when will you receive certificates of destruction?
- Non-storage hardware can go to separate disposition streams: resale, donation, or recycling depending on condition and value
Cabling and Final Cleanup
- Structured cabling removal if required — confirm scope with your vendor and your landlord
- Patch panels, cable trays, and cable management hardware
- ⚠️ Check ceiling tiles, raised floor panels, and cable chases. Abandoned cable runs in ceilings and walls are a common lease violation finding. Your landlord may charge for cleanup.
- Confirm all wall mounts, rack footprints, and equipment anchors are removed and surfaces restored per lease requirements
Documentation Retention
- Retain: final asset manifest, all pickup manifests with signatures, certificates of destruction (retain for minimum 3-7 years depending on applicable compliance framework)
- Cross-reference certificates of destruction against the original asset manifest — every serialized storage device should appear in at least one certificate
- Document any discrepancies (devices on the manifest not appearing in certificates) and resolve them with your ITAD vendor before closing the project
Final Walkthrough
Walk every room, every closet, every ceiling space, and under every raised floor panel before you hand back the keys. The items most commonly found during final walkthroughs:
- Drives and media left in desk drawers or storage cabinets
- USB drives and external storage forgotten in desks or lockers
- Abandoned cables in ceilings and walls
- Equipment in server room closets that was missed in the initial inventory
- Leased equipment that was not returned to the correct vendor
None of these are acceptable to leave behind. The decommission is not complete until the walkthrough is clean.
The Most Common 30-Day Failures
The recurring failures in compressed office decommission timelines:
- ITAD vendor engaged too late: The vendor is booked, the lease ends on Friday, and equipment is still in the building. Engage ITAD in week one, not week three.
- UPS batteries not planned: Discovered on move day that standard IT recyclers will not take them. Separate vendor, separate scheduling, separate problem.
- Printers not treated as data-bearing: Printer hard drives go to standard recycling because no one asked whether they contained storage media. They do.
- Certificates of destruction received too late: The project closes before all certificates arrive. No one follows up. Six months later, an auditor asks for them.
- Leased equipment mixed into ITAD stream: A leased device is wiped and sent to recycling instead of returned to the lessor. A financial penalty follows.
Every one of these is preventable with a complete inventory in week one and vendor coordination that starts immediately after.