Dispose of Your Old Tech Without Putting Yourself at Risk

Dispose of Your Old Tech Without Putting Yourself at Risk

The one truth about technology is that it will always break--usually at the most inopportune time. When it does finally kick the bucket, how are you getting rid of it? It’s not as though you can just toss an old server or printer in the bin. Recycling your technology is the most responsible thing to do, but you have to be cognizant of the company you are trusting to dispose of your Compaq Presario from 1997, because they may not be doing what they are claiming to do; or worse yet, they may be trying to syphon data off your old hardware.

Environmental Impact
In 2017 there was 44.7 million metric tonnes (49.2 tons) of e-waste disposed of in 2017. This was not only a full eight percent increase from 2014, but it is equal in weight to 4,500 Eiffel Towers. This includes all types of electronics, from refrigerators to smartphones and everything in between. E-waste is the fastest-growing part of the world’s waste stream and is expected to see a further 17 percent growth over the next four years.

The main issue with e-waste, and why it such a problem for any environment in which it is dumped, is that many of these electronics have circuitry or other mechanisms that hold require the use of poisonous metals. Over time these metals, and other deadly chemicals get into the water and it can have devastating consequences for whole communities of people. Since this is a problem that isn’t just going to go away, finding solutions to mitigate the damage to people is going to extremely important for the foreseeable future.

Political Impact
Beyond the physical harm done, there is a large political question surrounding e-waste. Many environmental advocates have begun to support a strategy of mandatory recycling, but it hasn’t been ascertained who will be responsible to foot the bill for these programs. Some have suggested that manufacturers should be somewhat responsible for the good that they produce. Since today, manufacturers aren’t asked to take-back any of their products, many entities have begun calling for them to begin some type of program where they shoulder more of the responsibility.

Of course, this strategy has its detractors. Firstly, in order to afford to trash/recycle the goods these manufacturers would have to pass on the cost of doing so onto the consumer. While this isn’t as bad of a plan as poisoning land in water in some developing nations somewhere. In essence, the cost would be passed onto the consumer, especially since many people purchase and use so many electronic devices. The problem becomes that companies would likely claim that any rise in cost would throw their perfect equilibrium, where they work to maximize profit for their shareholders, while providing a cost-effective product for their customers.

This hasn’t stopped several states from proposing (and passing) extended producer responsibility laws aimed at getting more private money to spend on the proper disposal of e-waste. Moreover, champions of this legislation rightfully state that it is also advantageous for manufacturers, as a vast majority of this e-waste has components that, when recycled, could be utilized in the manufacturing of other products.

Personal Impact
Okay so your computer is junk. Everyone reading this has been through it. You get rid of it at the local recycling place, or via a garbage or recycling service. Think for a minute, did you just get the photos and videos off of your old machine and toss it? A personal computer, and more so a mobile device has a lot of data on it. Even if you choose to wipe the hard drive on these devices, if they are disposed of and picked up by someone who knows what they are doing, your personal information is likely in danger. Before trashing your hardware, be sure to take some time and go through your machine to know exactly what you’ve left on there, and if you don’t like what you find, be sure to destroy the hard disk of the computer in question. Nothing is worse than getting caught up in identity theft or phished relentlessly because you chose not to properly dispose of your old junk computer.

What You Can Do?
When your electronics get old, or at least when you replace them, try to find someone that can use them. If you don’t find any takers, you have to know that there are several organizations committed to reducing e-waste. Doing some diligent research to find out where a company takes its e-waste and promoting a company that is trying to do some good, can go a long way toward helping the problem. This waste isn’t just going to go away, but with proper disposal and recycling, good can be accomplished.

If you are looking for a way to dispose of your organization’s old technology, call the IT professionals at Haber Group. We will put you in contact with reputable disposal vendors, or better yet, help you repurpose or gift your antiquated or old technology to people that can use it. For more information call us today at 866.625.3560.

How to Be Sure Your Business Continuity Plan is Co...
Tip of the Week: Edit PDFs in Microsoft Word


Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Hackers Privacy Malware Business Internet Business Computing Microsoft Hosted Solutions Computer Software Ransomware Google Backup Network Security Windows 10 Mobile Devices Smartphone IT Services User Tips Android Hardware Data Management Small Business Gmail Productivity Tech Term Windows Browser Managed IT Services Data App Facebook Server Business Continuity Cloud Computing Saving Money Internet of Things Managed Service Provider Data Recovery Efficiency Business Management IT Support Remote Monitoring Encryption Office 365 Artificial Intelligence Upgrade Phishing Disaster Recovery Smartphones Cybersecurity Word Government Innovation Infrastructure Office Tips Outsourced IT Chrome Productivity Microsoft Office Spam IT Support Windows 10 Big Data Data Backup Tip of the week Workplace Tips Social Media Employer-Employee Relationship VoIP Firewall Communication Customer Service Passwords WiFi Applications Avoiding Downtime Apple Managed IT Services The Internet of Things Settings IT Management Two-factor Authentication Content Filtering Analytics Data storage Bandwidth YouTube communications Miscellaneous Money Vulnerability Robot Risk Management Antivirus Administration Automation VPN Customer Relationship Management Holiday End of Support Hacking Unified Threat Management Data Security HIPAA Wi-Fi Computing Google Drive Data loss Business Technology Password Mouse Vendor Management Virtual Private Network Augmented Reality Save Money Presentation BYOD Network LiFi Safety Server Management Mobile Security Hacker Office Wireless Technology Storage Hosted Solution Recovery Telephone Systems Maintenance Mobile Device Website Virtual Reality Outlook Scam Search Paperless Office Monitors Tablet IBM SaaS Apps Wireless Printing Smart Technology Motherboard Remote Computing Operating System WannaCry User Computing Infrastructure Dongle Mobile Device Management Running Cable Recycling Hacks IT service Heating/Cooling Refrigeration Budget Hard Disk Drive Public Speaking Permissions Assessment Cryptocurrency Time Management Legislation Identity Virtual Desktop Competition FCC Smart Tech Bring Your Own Device sip Firefox Access Control Buisness How To Cabling Distributed Denial of Service Router IT solutions Alerts Service Level Agreement Lithium-ion battery Laptop Digital Payment eWaste BDR Servers Fraud Internet Exlporer Politics Bitcoin Network Congestion Network Management Comparison Chromebook Managed IT Title II Connectivity Best Practice telephony Techology SharePoint 5G Collaboration Cables Information Technology Managed IT Service Modem Cortana Google Docs Digital Lenovo Licensing Halloween Continuity Writing Google Maps Undo Mail Merge Value Tech Support Document Management Smart Office Windows 8 Computers Touchscreen Marketing Specifications Compliance Fun Google Wallet Disaster Shortcut Online IoT Computer Care Business Growth Unified Threat Management Gadgets Application Downloads IT Technicians Downtime File Sharing Wires Break Fix Cookies Samsung Spyware Superfish Cooperation Scary Stories Solar Current Events Retail Statistics Virtualization Legal Address Hotspot Professional Services IP Address Cybercrime Websites Identity Theft Work Display Black Friday Regulations Voice over Internet Protocol Drones Uninterrupted Power Supply Patch Management Microsoft Excel Star Wars Training Alt Codes Dark Data Quick Tips User Error Users Multi-Factor Security Mirgation Dark Web Nanotechnology Knowledge Staff Sports Automobile Business Intelligence Going Green Social Engineering Bluetooth Education Corporate Profile Language USB Mobile Office Optimization Social Hard Drives Cyber Monday Social Networking Solid State Drive Blockchain Cost Management Typing VoIP Google Calendar Chatbots Net Neutrality Screen Reader Experience Unified Communications Deep Learning Humor How To Networking Printer Wearable Technology Web Server Emergency Machine Learning IT Budget Mobile Data GPS Update IT Consultant Computer Repair Managing Stress Processors Cameras Relocation Tracking Meetings Cleaning Health Alert CCTV Private Cloud Mobile Computing Webcam Physical Security Emoji Upgrades Work/Life Balance Electronic Medical Records Error Black Market Point of Sale 3D Printing Law Enforcement Travel Notifications G Suite CrashOverride Twitter Botnet Supercomputer FinTech Unsupported Software Domains Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Company Culture