Dispose of Your Old Tech Without Putting Yourself at Risk

Dispose of Your Old Tech Without Putting Yourself at Risk

The one truth about technology is that it will always break--usually at the most inopportune time. When it does finally kick the bucket, how are you getting rid of it? It’s not as though you can just toss an old server or printer in the bin. Recycling your technology is the most responsible thing to do, but you have to be cognizant of the company you are trusting to dispose of your Compaq Presario from 1997, because they may not be doing what they are claiming to do; or worse yet, they may be trying to syphon data off your old hardware.

Environmental Impact
In 2017 there was 44.7 million metric tonnes (49.2 tons) of e-waste disposed of in 2017. This was not only a full eight percent increase from 2014, but it is equal in weight to 4,500 Eiffel Towers. This includes all types of electronics, from refrigerators to smartphones and everything in between. E-waste is the fastest-growing part of the world’s waste stream and is expected to see a further 17 percent growth over the next four years.

The main issue with e-waste, and why it such a problem for any environment in which it is dumped, is that many of these electronics have circuitry or other mechanisms that hold require the use of poisonous metals. Over time these metals, and other deadly chemicals get into the water and it can have devastating consequences for whole communities of people. Since this is a problem that isn’t just going to go away, finding solutions to mitigate the damage to people is going to extremely important for the foreseeable future.

Political Impact
Beyond the physical harm done, there is a large political question surrounding e-waste. Many environmental advocates have begun to support a strategy of mandatory recycling, but it hasn’t been ascertained who will be responsible to foot the bill for these programs. Some have suggested that manufacturers should be somewhat responsible for the good that they produce. Since today, manufacturers aren’t asked to take-back any of their products, many entities have begun calling for them to begin some type of program where they shoulder more of the responsibility.

Of course, this strategy has its detractors. Firstly, in order to afford to trash/recycle the goods these manufacturers would have to pass on the cost of doing so onto the consumer. While this isn’t as bad of a plan as poisoning land in water in some developing nations somewhere. In essence, the cost would be passed onto the consumer, especially since many people purchase and use so many electronic devices. The problem becomes that companies would likely claim that any rise in cost would throw their perfect equilibrium, where they work to maximize profit for their shareholders, while providing a cost-effective product for their customers.

This hasn’t stopped several states from proposing (and passing) extended producer responsibility laws aimed at getting more private money to spend on the proper disposal of e-waste. Moreover, champions of this legislation rightfully state that it is also advantageous for manufacturers, as a vast majority of this e-waste has components that, when recycled, could be utilized in the manufacturing of other products.

Personal Impact
Okay so your computer is junk. Everyone reading this has been through it. You get rid of it at the local recycling place, or via a garbage or recycling service. Think for a minute, did you just get the photos and videos off of your old machine and toss it? A personal computer, and more so a mobile device has a lot of data on it. Even if you choose to wipe the hard drive on these devices, if they are disposed of and picked up by someone who knows what they are doing, your personal information is likely in danger. Before trashing your hardware, be sure to take some time and go through your machine to know exactly what you’ve left on there, and if you don’t like what you find, be sure to destroy the hard disk of the computer in question. Nothing is worse than getting caught up in identity theft or phished relentlessly because you chose not to properly dispose of your old junk computer.

What You Can Do?
When your electronics get old, or at least when you replace them, try to find someone that can use them. If you don’t find any takers, you have to know that there are several organizations committed to reducing e-waste. Doing some diligent research to find out where a company takes its e-waste and promoting a company that is trying to do some good, can go a long way toward helping the problem. This waste isn’t just going to go away, but with proper disposal and recycling, good can be accomplished.

If you are looking for a way to dispose of your organization’s old technology, call the IT professionals at BNMC. We will put you in contact with reputable disposal vendors, or better yet, help you repurpose or gift your antiquated or old technology to people that can use it. For more information call us today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Network Security Hackers Business Computing Business User Tips Tech Term Google Software Computer Internet Microsoft IT Services Efficiency Hosted Solutions Ransomware Mobile Devices Productivity Communication Data Hardware Smartphone Small Business IT Support Android Backup Saving Money Managed IT Services Business Continuity Cloud Computing Browser Innovation Windows 10 Windows Data Management Internet of Things Data Recovery Managed IT Services App Microsoft Office Data Backup Cybersecurity Productivity Business Management Workplace Tips Windows 10 Gmail Word Artificial Intelligence Outsourced IT Office 365 Disaster Recovery Encryption Mobile Device Remote Monitoring Passwords Server Upgrade Facebook Phishing communications Network Tip of the week Website IT Support Money Employer-Employee Relationship BYOD Vulnerability Smartphones Applications Chrome Infrastructure Managed Service Provider Analytics Users Company Culture Maintenance YouTube Social Media Risk Management Government Data storage Office Tips Antivirus Big Data Managed Service VoIP Access Control Google Drive Bandwidth IT Management Content Filtering Router Settings Information Save Money Robot Miscellaneous Automation End of Support Storage Printing Virtual Reality Firewall Managing Stress Two-factor Authentication SaaS Hacker Avoiding Downtime Wireless Development Scam Holiday Laptop Spam Computing Outlook WiFi HIPAA Operating System Alert The Internet of Things Networking Paperless Office Employee-Employer Relationship LiFi Display Mobile Security Hosted Solution Administration Downtime VPN Data Security Vendor Management Mouse Monitors Unified Threat Management Server Management Data loss Business Intelligence Business Technology Touchscreen Virtual Private Network Telephone Systems Education Quick Tips desktop Apple Disaster Slack Language Value Halloween Google Wallet Statistics Tablet Digital Print Toner Regulations Bitcoin How To Lenovo Downloads Content Mirgation Recycling Business Growth Mail Merge Blockchain Collaboration IoT Safety Password VoIP Unified Threat Management Digital Signage Augmented Reality K-12 Schools Legal Shortcut Distributed Denial of Service Cookies MSP Remote Computing Superfish Uninterrupted Power Supply Monitoring Computing Infrastructure Professional Services Scary Stories Unified Communications Drones Bluetooth Comparison Document Management Spyware Shortcuts Social Networking Network Congestion Windows 8 Firefox Running Cable Computer Care IBM Streaming Chatbots eWaste Address Permissions File Sharing Star Wars Mobile Device Management User Error Solid State Drive Troubleshooting Wearable Technology Network upgrade Wi-Fi Buisness Deep Learning Patch Management Managed IT Service Nanotechnology Writing Customer Relationship Management Spying Alerts USB Sports Specifications Identity Theft Security Cameras Motherboard Computers Cables Virtual Desktop Cost Management Heating/Cooling Multi-Factor Security Training Corporate Profile Human Error Identity Dark Data Continuity Update Alt Codes Analysis Fraud Time Management Printer Hard Disk Drive Smart Office Bring Your Own Device Break Fix Automobile Screen Reader Retail Charging Social Dell Licensing Dongle Politics Budget Search Black Friday Wires Assessment Information Technology Servers Google Calendar WannaCry Device Customer Service Solar Typing Humor Emergency Cabling Cybercrime Current Events Network Management LED Work Best Practice Dark Web Google Maps Smart Tech Office Samsung PowerPoint Cooperation Service Level Agreement Tech Support Marketing Cyber Monday Voice over Internet Protocol Hotspot Internet Exlporer Gadgets Apps Legislation Mobility Compliance Chromebook Cryptocurrency IT solutions Going Green SharePoint Co-Managed IT IT Technicians Optimization Google Docs Microsoft Excel Connectivity Social Engineering Hacks Techology Onboarding Staff Leominster Websites Managed IT Smart Technology Digital Payment Modem FinTech Meetings Upgrades Gadget Tracking Emoji Cleaning Crowdsourcing CCTV Personal Information Botnet Webcam 3D Printing Cortana Machine Learning Error Processors Point of Sale Ben McDonald shares Unsupported Software Virtualization Travel Mobile Computing G Suite Printers Computer Repair Relocation Mobile Data Supercomputer CrashOverride BDR How To Work/Life Balance Staffing Recovery Motion Sickness Taxes Health Private Cloud Administrator Regulation Web Server what was your? IT Budget Black Market Law Enforcement GPS IT Consultant Electronic Medical Records Notifications Cameras Physical Security Twitter

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3