BNMC Blog

Dispose of Your Old Tech Without Putting Yourself at Risk

Dispose of Your Old Tech Without Putting Yourself at Risk

The one truth about technology is that it will always break--usually at the most inopportune time. When it does finally kick the bucket, how are you getting rid of it? It’s not as though you can just toss an old server or printer in the bin. Recycling your technology is the most responsible thing to do, but you have to be cognizant of the company you are trusting to dispose of your Compaq Presario from 1997, because they may not be doing what they are claiming to do; or worse yet, they may be trying to syphon data off your old hardware.

Environmental Impact
In 2017 there was 44.7 million metric tonnes (49.2 tons) of e-waste disposed of in 2017. This was not only a full eight percent increase from 2014, but it is equal in weight to 4,500 Eiffel Towers. This includes all types of electronics, from refrigerators to smartphones and everything in between. E-waste is the fastest-growing part of the world’s waste stream and is expected to see a further 17 percent growth over the next four years.

The main issue with e-waste, and why it such a problem for any environment in which it is dumped, is that many of these electronics have circuitry or other mechanisms that hold require the use of poisonous metals. Over time these metals, and other deadly chemicals get into the water and it can have devastating consequences for whole communities of people. Since this is a problem that isn’t just going to go away, finding solutions to mitigate the damage to people is going to extremely important for the foreseeable future.

Political Impact
Beyond the physical harm done, there is a large political question surrounding e-waste. Many environmental advocates have begun to support a strategy of mandatory recycling, but it hasn’t been ascertained who will be responsible to foot the bill for these programs. Some have suggested that manufacturers should be somewhat responsible for the good that they produce. Since today, manufacturers aren’t asked to take-back any of their products, many entities have begun calling for them to begin some type of program where they shoulder more of the responsibility.

Of course, this strategy has its detractors. Firstly, in order to afford to trash/recycle the goods these manufacturers would have to pass on the cost of doing so onto the consumer. While this isn’t as bad of a plan as poisoning land in water in some developing nations somewhere. In essence, the cost would be passed onto the consumer, especially since many people purchase and use so many electronic devices. The problem becomes that companies would likely claim that any rise in cost would throw their perfect equilibrium, where they work to maximize profit for their shareholders, while providing a cost-effective product for their customers.

This hasn’t stopped several states from proposing (and passing) extended producer responsibility laws aimed at getting more private money to spend on the proper disposal of e-waste. Moreover, champions of this legislation rightfully state that it is also advantageous for manufacturers, as a vast majority of this e-waste has components that, when recycled, could be utilized in the manufacturing of other products.

Personal Impact
Okay so your computer is junk. Everyone reading this has been through it. You get rid of it at the local recycling place, or via a garbage or recycling service. Think for a minute, did you just get the photos and videos off of your old machine and toss it? A personal computer, and more so a mobile device has a lot of data on it. Even if you choose to wipe the hard drive on these devices, if they are disposed of and picked up by someone who knows what they are doing, your personal information is likely in danger. Before trashing your hardware, be sure to take some time and go through your machine to know exactly what you’ve left on there, and if you don’t like what you find, be sure to destroy the hard disk of the computer in question. Nothing is worse than getting caught up in identity theft or phished relentlessly because you chose not to properly dispose of your old junk computer.

What You Can Do?
When your electronics get old, or at least when you replace them, try to find someone that can use them. If you don’t find any takers, you have to know that there are several organizations committed to reducing e-waste. Doing some diligent research to find out where a company takes its e-waste and promoting a company that is trying to do some good, can go a long way toward helping the problem. This waste isn’t just going to go away, but with proper disposal and recycling, good can be accomplished.

If you are looking for a way to dispose of your organization’s old technology, call the IT professionals at BNMC. We will put you in contact with reputable disposal vendors, or better yet, help you repurpose or gift your antiquated or old technology to people that can use it. For more information call us today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Microsoft Network Security Software Computer Internet Google IT Services Hosted Solutions Business Tech Term Mobile Devices Ransomware User Tips Small Business Managed IT Services Android Backup Efficiency Smartphone Productivity Browser Windows Innovation Data Recovery Internet of Things IT Support Data Management Saving Money Business Continuity Hardware Cloud Computing Cybersecurity Communication Managed IT Services App Data Data Backup Windows 10 Encryption Remote Monitoring Passwords Server Facebook Microsoft Office Business Management Windows 10 Gmail Artificial Intelligence Network Employer-Employee Relationship Applications Productivity Money Smartphones IT Support Office 365 Chrome Managed Service Provider Phishing Infrastructure Workplace Tips Upgrade Tip of the week Analytics Word communications Outsourced IT Website Vulnerability Disaster Recovery Data storage Big Data IT Management Government Settings BYOD Google Drive Content Filtering Bandwidth YouTube Miscellaneous Social Media Maintenance Risk Management Office Tips Antivirus Save Money Robot The Internet of Things End of Support Virtual Reality VPN Mobile Device VoIP Business Intelligence Paperless Office Spam Computing Data Security Outlook Server Management WiFi Business Technology Operating System SaaS Virtual Private Network LiFi Company Culture Touchscreen Hosted Solution Holiday Administration Data loss Unified Threat Management Alert Users Mouse Telephone Systems Managing Stress desktop Display Information Two-factor Authentication Apple Firewall Vendor Management Avoiding Downtime Storage Monitors HIPAA Scam Mobile Security Laptop Wireless Automation Smart Tech Search Black Friday Monitoring Identity Theft Work Networking Hacker Servers Google Calendar Safety Training Corporate Profile Cooperation Service Level Agreement Emergency Deep Learning Streaming Router Voice over Internet Protocol Remote Computing Hard Disk Drive Hotspot Internet Exlporer Dark Web Troubleshooting Automobile Compliance Network Management Access Control Dell Cybercrime Connectivity Cyber Monday Spying IT Technicians Downtime Optimization Alt Codes Network Congestion Legislation Analysis Marketing WannaCry Staff Leominster Bring Your Own Device Cabling Modem FinTech Writing Gadgets Language Value Microsoft Excel Budget Wi-Fi Google Maps Regulations SharePoint Social IoT Managed IT Smart Technology Employee-Employer Relationship Information Technology Mirgation Recycling Quick Tips Techology Typing Humor Computers Statistics Tablet Managed Service Current Events Augmented Reality K-12 Schools How To Lenovo Best Practice Dark Data Update Cookies MSP Downloads Retail Computing Infrastructure Halloween Professional Services Mail Merge Blockchain LED Social Networking Star Wars Shortcut Apps Distributed Denial of Service PowerPoint Politics Digital Payment Chatbots eWaste VoIP Unified Threat Management Cryptocurrency Development Bluetooth IT solutions Comparison Going Green Digital Wearable Technology Network upgrade Firefox Superfish Google Docs Customer Service Disaster Nanotechnology Education Hacks Office Samsung Alerts Scary Stories USB Address Permissions Co-Managed IT Collaboration Motherboard Cables Fraud Running Cable Cost Management Patch Management Managed IT Service Onboarding Google Wallet Tech Support Identity Continuity User Error Bitcoin Uninterrupted Power Supply Screen Reader Charging Specifications Slack Printing Document Management Spyware Buisness Smart Office Customer Relationship Management Business Growth Chromebook Heating/Cooling Multi-Factor Security Password Social Engineering Computer Care IBM Licensing Sports Dongle Content Legal File Sharing Virtual Desktop Wires Solid State Drive Assessment Unified Communications Break Fix Digital Signage Drones Websites Solar Time Management Printer Windows 8 Point of Sale Ben McDonald shares Regulation Upgrades Gadget Emoji Mobile Device Management Crowdsourcing Travel G Suite Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana Mobile Computing Staffing Motion Sickness Processors Taxes Printers Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget Virtualization GPS IT Consultant Computer Repair Relocation Cameras Mobile Data How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Private Cloud CCTV Black Market Law Enforcement Webcam Notifications Electronic Medical Records BDR Physical Security Error Twitter

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3