Bredy Network Management Corporation Blogs

4 minutes reading time (840 words)

Dispose of Your Old Tech Without Putting Yourself at Risk

Dispose of Your Old Tech Without Putting Yourself at Risk

The one truth about technology is that it will always break--usually at the most inopportune time. When it does finally kick the bucket, how are you getting rid of it? It’s not as though you can just toss an old server or printer in the bin. Recycling your technology is the most responsible thing to do, but you have to be cognizant of the company you are trusting to dispose of your Compaq Presario from 1997, because they may not be doing what they are claiming to do; or worse yet, they may be trying to syphon data off your old hardware.

Environmental Impact
In 2017 there was 44.7 million metric tonnes (49.2 tons) of e-waste disposed of in 2017. This was not only a full eight percent increase from 2014, but it is equal in weight to 4,500 Eiffel Towers. This includes all types of electronics, from refrigerators to smartphones and everything in between. E-waste is the fastest-growing part of the world’s waste stream and is expected to see a further 17 percent growth over the next four years.

The main issue with e-waste, and why it such a problem for any environment in which it is dumped, is that many of these electronics have circuitry or other mechanisms that hold require the use of poisonous metals. Over time these metals, and other deadly chemicals get into the water and it can have devastating consequences for whole communities of people. Since this is a problem that isn’t just going to go away, finding solutions to mitigate the damage to people is going to extremely important for the foreseeable future.

Political Impact
Beyond the physical harm done, there is a large political question surrounding e-waste. Many environmental advocates have begun to support a strategy of mandatory recycling, but it hasn’t been ascertained who will be responsible to foot the bill for these programs. Some have suggested that manufacturers should be somewhat responsible for the good that they produce. Since today, manufacturers aren’t asked to take-back any of their products, many entities have begun calling for them to begin some type of program where they shoulder more of the responsibility.

Of course, this strategy has its detractors. Firstly, in order to afford to trash/recycle the goods these manufacturers would have to pass on the cost of doing so onto the consumer. While this isn’t as bad of a plan as poisoning land in water in some developing nations somewhere. In essence, the cost would be passed onto the consumer, especially since many people purchase and use so many electronic devices. The problem becomes that companies would likely claim that any rise in cost would throw their perfect equilibrium, where they work to maximize profit for their shareholders, while providing a cost-effective product for their customers.

This hasn’t stopped several states from proposing (and passing) extended producer responsibility laws aimed at getting more private money to spend on the proper disposal of e-waste. Moreover, champions of this legislation rightfully state that it is also advantageous for manufacturers, as a vast majority of this e-waste has components that, when recycled, could be utilized in the manufacturing of other products.

Personal Impact
Okay so your computer is junk. Everyone reading this has been through it. You get rid of it at the local recycling place, or via a garbage or recycling service. Think for a minute, did you just get the photos and videos off of your old machine and toss it? A personal computer, and more so a mobile device has a lot of data on it. Even if you choose to wipe the hard drive on these devices, if they are disposed of and picked up by someone who knows what they are doing, your personal information is likely in danger. Before trashing your hardware, be sure to take some time and go through your machine to know exactly what you’ve left on there, and if you don’t like what you find, be sure to destroy the hard disk of the computer in question. Nothing is worse than getting caught up in identity theft or phished relentlessly because you chose not to properly dispose of your old junk computer.

What You Can Do?
When your electronics get old, or at least when you replace them, try to find someone that can use them. If you don’t find any takers, you have to know that there are several organizations committed to reducing e-waste. Doing some diligent research to find out where a company takes its e-waste and promoting a company that is trying to do some good, can go a long way toward helping the problem. This waste isn’t just going to go away, but with proper disposal and recycling, good can be accomplished.

If you are looking for a way to dispose of your organization’s old technology, call the IT professionals at BNMC. We will put you in contact with reputable disposal vendors, or better yet, help you repurpose or gift your antiquated or old technology to people that can use it. For more information call us today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, August 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Business Computing Software Hackers Microsoft Internet Google Computer IT Services Hosted Solutions Ransomware Business Mobile Devices Network Security Tech Term Small Business Android Backup Managed IT Services Smartphone Data Management Efficiency Saving Money Data Recovery Business Continuity IT Support Hardware User Tips Windows Innovation Internet of Things Data Backup Cloud Computing Cybersecurity App Data Windows 10 Browser Facebook Server Remote Monitoring Artificial Intelligence Gmail Business Management Encryption Money Smartphones Tip of the week IT Support Productivity Outsourced IT Word Chrome Managed Service Provider Phishing Productivity Vulnerability Communication Office 365 Analytics communications Infrastructure Disaster Recovery Windows 10 Managed IT Services Network Robot Settings Antivirus Employer-Employee Relationship Google Drive Content Filtering Bandwidth Upgrade YouTube IT Management Applications Risk Management Government Social Media Website Office Tips Microsoft Office Data storage Big Data Passwords VoIP Firewall Two-factor Authentication Managing Stress Maintenance Spam Computing Avoiding Downtime Monitors Outlook Vendor Management WiFi Scam Save Money LiFi Hosted Solution Wireless Automation Administration End of Support HIPAA Workplace Tips Virtual Reality Mouse Mobile Security Mobile Device Miscellaneous VPN Data Security Paperless Office Business Technology SaaS Apple Information Server Management Business Intelligence Storage Virtual Private Network Holiday Unified Threat Management BYOD Data loss Telephone Systems Alert Company Culture The Internet of Things Address Permissions Computing Infrastructure Professional Services Collaboration Office Samsung Social Networking Star Wars Downtime User Error Chatbots eWaste Alt Codes Cybercrime Patch Management Managed IT Service Tech Support Marketing Document Management Spyware Customer Relationship Management Chromebook Wearable Technology Network upgrade Bring Your Own Device Uninterrupted Power Supply Operating System Spying Specifications Nanotechnology Development Alerts USB File Sharing Budget Analysis Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Gadgets Computer Care Social IBM Websites Fraud Cost Management Information Technology Time Management Printer Identity Continuity Typing Solid State Drive Humor Break Fix Charging Identity Theft Current Events Networking Smart Office Best Practice Employee-Employer Relationship Search Black Friday Screen Reader Emergency Licensing Dongle Managed Service Servers Google Calendar Safety Wires Users Training Halloween Corporate Profile Assessment Automobile Apps Network Management Access Control Remote Computing Solar Cryptocurrency Hard Disk Drive Dark Web Smart Tech IT solutions Going Green Network Congestion Work Dell Google Docs PowerPoint Cyber Monday Cooperation Service Level Agreement Cabling Legislation Router Voice over Internet Protocol Education Hacks Scary Stories WannaCry Microsoft Excel Wi-Fi Hotspot Internet Exlporer Google Maps Google Wallet Touchscreen SharePoint Writing Compliance Bitcoin Running Cable Connectivity Printing Buisness Quick Tips Techology Computers IT Technicians Optimization Business Growth Onboarding Managed IT Smart Technology How To Lenovo Dark Data Staff Leominster Legal Virtual Desktop Slack Statistics Tablet Modem FinTech Password Sports Mail Merge Blockchain Language Value Unified Communications Drones Downloads Retail Regulations Windows 8 Laptop IoT Digital Payment VoIP Unified Threat Management Display Mirgation Recycling Hacker desktop Shortcut Distributed Denial of Service Politics Digital Firefox Superfish Customer Service Augmented Reality K-12 Schools Deep Learning Disaster Monitoring Bluetooth Comparison Cookies MSP Health Private Cloud Cleaning Black Market CCTV Mobile Computing Webcam Law Enforcement Electronic Medical Records Notifications Physical Security Error Twitter Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing BDR Personal Information Botnet G Suite Regulation Supercomputer CrashOverride Cortana 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Virtualization Web Server what was your? Unsupported Software Update GPS Computer Repair Relocation IT Consultant Cameras Mobile Data Mobile Device Management Recovery Meetings How To Work/Life Balance Tracking

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3