Bredy Network Management Corporation Blogs

4 minutes reading time (840 words)

Dispose of Your Old Tech Without Putting Yourself at Risk

Dispose of Your Old Tech Without Putting Yourself at Risk

The one truth about technology is that it will always break--usually at the most inopportune time. When it does finally kick the bucket, how are you getting rid of it? It’s not as though you can just toss an old server or printer in the bin. Recycling your technology is the most responsible thing to do, but you have to be cognizant of the company you are trusting to dispose of your Compaq Presario from 1997, because they may not be doing what they are claiming to do; or worse yet, they may be trying to syphon data off your old hardware.

Environmental Impact
In 2017 there was 44.7 million metric tonnes (49.2 tons) of e-waste disposed of in 2017. This was not only a full eight percent increase from 2014, but it is equal in weight to 4,500 Eiffel Towers. This includes all types of electronics, from refrigerators to smartphones and everything in between. E-waste is the fastest-growing part of the world’s waste stream and is expected to see a further 17 percent growth over the next four years.

The main issue with e-waste, and why it such a problem for any environment in which it is dumped, is that many of these electronics have circuitry or other mechanisms that hold require the use of poisonous metals. Over time these metals, and other deadly chemicals get into the water and it can have devastating consequences for whole communities of people. Since this is a problem that isn’t just going to go away, finding solutions to mitigate the damage to people is going to extremely important for the foreseeable future.

Political Impact
Beyond the physical harm done, there is a large political question surrounding e-waste. Many environmental advocates have begun to support a strategy of mandatory recycling, but it hasn’t been ascertained who will be responsible to foot the bill for these programs. Some have suggested that manufacturers should be somewhat responsible for the good that they produce. Since today, manufacturers aren’t asked to take-back any of their products, many entities have begun calling for them to begin some type of program where they shoulder more of the responsibility.

Of course, this strategy has its detractors. Firstly, in order to afford to trash/recycle the goods these manufacturers would have to pass on the cost of doing so onto the consumer. While this isn’t as bad of a plan as poisoning land in water in some developing nations somewhere. In essence, the cost would be passed onto the consumer, especially since many people purchase and use so many electronic devices. The problem becomes that companies would likely claim that any rise in cost would throw their perfect equilibrium, where they work to maximize profit for their shareholders, while providing a cost-effective product for their customers.

This hasn’t stopped several states from proposing (and passing) extended producer responsibility laws aimed at getting more private money to spend on the proper disposal of e-waste. Moreover, champions of this legislation rightfully state that it is also advantageous for manufacturers, as a vast majority of this e-waste has components that, when recycled, could be utilized in the manufacturing of other products.

Personal Impact
Okay so your computer is junk. Everyone reading this has been through it. You get rid of it at the local recycling place, or via a garbage or recycling service. Think for a minute, did you just get the photos and videos off of your old machine and toss it? A personal computer, and more so a mobile device has a lot of data on it. Even if you choose to wipe the hard drive on these devices, if they are disposed of and picked up by someone who knows what they are doing, your personal information is likely in danger. Before trashing your hardware, be sure to take some time and go through your machine to know exactly what you’ve left on there, and if you don’t like what you find, be sure to destroy the hard disk of the computer in question. Nothing is worse than getting caught up in identity theft or phished relentlessly because you chose not to properly dispose of your old junk computer.

What You Can Do?
When your electronics get old, or at least when you replace them, try to find someone that can use them. If you don’t find any takers, you have to know that there are several organizations committed to reducing e-waste. Doing some diligent research to find out where a company takes its e-waste and promoting a company that is trying to do some good, can go a long way toward helping the problem. This waste isn’t just going to go away, but with proper disposal and recycling, good can be accomplished.

If you are looking for a way to dispose of your organization’s old technology, call the IT professionals at BNMC. We will put you in contact with reputable disposal vendors, or better yet, help you repurpose or gift your antiquated or old technology to people that can use it. For more information call us today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 25 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Internet Software Network Security Microsoft Google Hosted Solutions Ransomware Business Computer Smartphone Mobile Devices Android IT Services Windows Data Management Managed IT Services Tech Term Backup Windows 10 Browser Innovation Small Business Cloud Computing Internet of Things Cybersecurity App Business Continuity User Tips Hardware Data Recovery Encryption Server Saving Money IT Support Remote Monitoring Data Gmail Artificial Intelligence Business Management Disaster Recovery IT Support Outsourced IT Word Smartphones Productivity Windows 10 Chrome Productivity Managed Service Provider Facebook Tip of the week Phishing Office 365 Efficiency Data Backup Vulnerability Infrastructure IT Management Data storage Money Passwords Big Data Robot Settings Google Drive Communication Bandwidth Upgrade Government Antivirus Applications Analytics YouTube communications Risk Management Social Media Office Tips Managed IT Services Data Security Network Server Management Business Technology Monitors The Internet of Things Firewall Vendor Management Virtual Private Network Maintenance Outlook Save Money Spam Computing VoIP WiFi Automation LiFi End of Support Hosted Solution Employer-Employee Relationship Administration Virtual Reality Two-factor Authentication HIPAA Content Filtering Mouse Avoiding Downtime Miscellaneous Workplace Tips Mobile Device Scam Mobile Security Paperless Office SaaS Apple Storage Holiday Microsoft Office BYOD Website Data loss Alert Unified Threat Management Telephone Systems VPN Hacker Virtual Desktop Digital Payment Language Value Cyber Monday Sports desktop Regulations Company Culture Customer Service Digital IoT Office Samsung Legislation Laptop Disaster Mirgation Recycling Deep Learning Cookies Touchscreen SharePoint Collaboration Augmented Reality K-12 Schools Tech Support Microsoft Excel Chromebook Quick Tips Techology Alt Codes Computing Infrastructure Professional Services Managed IT Smart Technology Social Networking Managing Stress Lenovo Bring Your Own Device Operating System Document Management Spyware Star Wars Social Engineering Statistics Tablet Uninterrupted Power Supply Chatbots eWaste How To IBM Nanotechnology Downloads Social Cybercrime File Sharing Wearable Technology Network upgrade Websites Mail Merge Blockchain Budget Downtime Computer Care VoIP Unified Threat Management Typing Humor Wireless Alerts USB Shortcut Distributed Denial of Service Information Technology Marketing Solid State Drive Motherboard Cables Firefox Superfish Best Practice Identity Theft Fraud Cost Management Safety Bluetooth Comparison Current Events Gadgets Identity Continuity Training Corporate Profile Screen Reader Remote Computing Smart Office Address Permissions Network Congestion User Error Cryptocurrency Automobile Licensing Dongle Patch Management Apps Managed IT Service Hard Disk Drive Wires Customer Relationship Management Google Docs Assessment IT solutions Specifications Going Green Users Halloween Dell Solar WannaCry Smart Tech Writing Heating/Cooling Education Multi-Factor Security Hacks Cabling Work Wi-Fi Computers Time Management Printer Bitcoin Google Maps Cooperation Service Level Agreement Break Fix Google Wallet Router Voice over Internet Protocol Networking Business Growth Hotspot Internet Exlporer Search Black Friday Printing Scary Stories Compliance Business Intelligence Dark Data Connectivity Retail Servers Google Calendar Password Running Cable IT Technicians Optimization Emergency Legal Display Network Management Access Control Windows 8 Staff Leominster Politics Unified Communications Dark Web Drones Buisness Modem How To Work/Life Balance Cameras Recovery Tracking Mobile Device Management Meetings Health Private Cloud Black Market Cleaning Law Enforcement CCTV Notifications Mobile Computing Webcam Electronic Medical Records Twitter Physical Security Emoji Error Upgrades Gadget Crowdsourcing Point of Sale Ben McDonald shares Travel Personal Information Botnet Cortana 3D Printing G Suite BDR Supercomputer CrashOverride Staffing Processors Motion Sickness Machine Learning Virtualization Administrator Unsupported Software Taxes IT Budget Web Server what was your? Update GPS Computer Repair Relocation Mobile Data IT Consultant FinTech

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3