Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Recycling Technology: Is It the Best Answer?

Recycling Technology: Is It the Best Answer?

Let me ask you a simple question: how many cell phones have you had over the years? For some of us, upgrades are a yearly occurrence. For others possibly bi-yearly. Have you ever wondered where your old cell phone goes after it is out of your hands? 

Recycling is an important, but commonly forgotten topic in today’s digital age. Electrical devices are not something that can be mixed into your local landfill. It is a very toxic, hazardous waste. In various states across the US, it is actually illegal to dispose of electronics in the trash. So why is this?

Take a Look at What Is Inside

Inside of most electrical devices, you’ll find common materials such as aluminum, copper, and sometimes gold. Aluminum is typically used to create the structure of these electrical devices. It is a very common, strong, lightweight material. Copper and gold are excellent conductors and very resistant to corrosion when housed correctly. However, contained within most electrical devices are also toxic elements and materials. Sulfur, mercury, lead, chromium, beryllium oxide, cadmium; some or all of these could be lurking in that computer monitor you’re about to send off to the local landfill. 

Dispose of them Safely

As you might imagine with the ever-growing amount of electrical devices, there isn’t one set in stone procedure for all of this waste. There are also devices which most people do not even consider to be e-waste but should not be thrown away. When devices are sent away, typically they are crushed into as small of a space as possible. In this process, toxic chemicals and materials become exposed. Electrical devices typically need to be disassembled in order to be disposed of safely. E-waste is typically sent to processing plants which specialize in disassembling these products. While this is a safer route -- deconstructing these products is still a dangerous task. Let’s take a look at one example.

Samsung Note 7 -- A Hot Topic 

In the manufacturing industry, recalls are not uncommon. Devices are typically rigorously tested before leaving the plant, but what happens when a fatal flaw appears? This is exactly what happened with the Samsung Note 7. While models were quickly pulled from shelves, the batteries that powered them still are used in a variety of products. These batteries became notorious for short circuiting, which led to them combusting or even exploding. These devices required manual disassembling. 

Workers at the recycling plant were in charge of disassembling these potentially dangerous devices. They were equipped with heavy duty gloves, tongs, and even fire containment bins. What makes these devices different from the AA batteries you change every few months in your TV remote, is the fact that they are lithium ion batteries. These contain thousands of connected cells meaning they have an incredible amount of potential energy. This is why they can be so destructive.

Different battery technologies are enabling consumers to have longer lasting, more powerful devices. Whether it’s your new and improved battery in your smartphone, or your battery powered lawn mowers, hedge trimmers, or even the self-balancing hover board you purchased for Tim’s 12th birthday that just broke; these electrical devices need to be handled responsibly.

So, what do you do? Recycle battery powered devices, or dispose of them?

All devices, whether it’s your outdated cell phone, your undersized computer monitor, or even your in-home appliances -- all should be handled properly if you decide their product life has expired. You don’t know what toxic material is lurking in the underbelly of your device, and when dealing with your environment waste plant workers lives; it’s better to be safe than sorry.

If the time has come and replacing office devices has become imminent, 415 IT can help. Our professionals have the know-how to make sure you are disposing of your devices safely and in a responsible manner, without risking losing or exposing critical data. Call (415) 295-4898 to learn more.

Why Managed Services: Proactive Maintenance and Ma...
Tip of the Week: Extend Your IT Budget
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 27 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud Data Recovery Software IT Services Email Malware Outsourced IT Internet Managed IT Services Tech Term Efficiency Business Innovation Computer Upgrade Windows 10 User Tips Cloud Computing Small Business Hackers Microsoft Mobile Devices Business Management Hardware Phishing Collaboration Cybersecurity Business Continuity Ransomware Google Workplace Tips Backup Paperless Office Managed Service VoIp Android Communication Server Office 365 Smartphones Encryption Communications Remote Monitoring Managed IT Managed Service Provider BDR Internet of Things Passwords Artificial Intelligence Vulnerability Business Technology Holiday Data Management Healthcare Saving Money Facebook Browser Applications Mobile Device Managed IT services Smartphone Miscellaneous Laptops Disaster Recovery Help Desk Wi-Fi Document Management Quick Tips Government Save Money Windows 7 Automation Social Media Microsoft Office Compliance Network Blockchain Processor Tip of the week Project Management Employer-Employee Relationship Information Redundancy Scam Avoiding Downtime Antivirus Bandwidth Website Access Control BYOD Virtualization Windows Data Security Infrastructure Software as a Service RMM Data Loss Chrome Two-factor Authentication Vendor Management IT Management Router Maintenance VPN Analytics Customer Relationship Management Machine Learning Professional Services Training Consultation Search Mobile Security OneDrive Employees Unified Communications Files Social Network Recycling Consulting Downtime Virtual Private Network Employee-Employer Relationship Gmail The Internet of Things Company Culture Cooperation Risk Management Managed Services Provider Unified Threat Management Apps Word Remote Workers Password IoT Net Neutrality Regulations Patch Management Mobility Co-Managed IT Management File Sharing Hard Drive Tablet Dark Web Internet Exlporer File Management Server Management Smart Technology Alert Proactive Payment Cards Gadgets Storage Monitoring Assessment HIPAA Utility Computing Bring Your Own Device Financial Remote Monitoring and Management Network Management Users Networking Operating System G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Tech Support IT Assessment How To Test Technology Tips Managed Services SaaS Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech Credit Cards WPA3 Legislation Shared resources Going Green Mobile Shortcut Proactive IT 5G Touchscreen Mobile VoIP Hacking Development Instant Messaging Settings Personal Information Specifications Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Digital Payment Hotspot Manufacturing Time Management Vendor Cyberattacks Social Managed IT Service GDPR Connectivity Samsung Computers Fleet Tracking Zero-Day Threat Batteries Heating/Cooling IT Consulting Black Friday Wireless Internet Big Data Trending Cookies Cables SharePoint Windows Server 2008 Customer Service Transportation Active Directory Migration eWaste Mobile Device Management Smart Devices Statistics Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events Superfish Wireless Mouse Language Data Breach Read Only Security Cameras Break Fix Holidays Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Servers Managing Stress Cyber Monday Staff Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Permissions Windows Server Chatbots Point of Sale Tech Terms Hard Disk Drives Sensors Bluetooth Mobile Computing Address WiFi Conferencing Microsoft Excel Database Recovery Mirgation Computing Infrastructure Printing Augmented Reality Notes Wearable Technology Star Wars IT Human Error Spam Enterprise Content Management Theft Proactive Maintenance Solid State Drive App Optimization Authentication Google Calendar Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Solid State Drives Geography Meetings Voice over Internet Protocol Projects Cache Electronic Medical Records Computing Alerts Technology Laws Remote Worker Virtual Reality PowerPoint Display Business Telephone OneNote Permission Travel Value of Managed Services Websites Social Networking Features Firewall Cybercrime Cyber security Screen Reader Emergency Multi-Factor Security Virtual Machines Authorization Teamwork Information Technology Identity Outlook Disaster Resistance Options Telephone Modem High-Speed Internet Printer Politics Return on Investment Remote Computing Comparison Licensing Regulation Digitize Twitter Education Printers CEO Students Marketing Daniel Stevens

Latest Blog

All work and no play makes Jack a dull boy, as the saying goes, but is this really useful advice if you’re trying to keep Jack, Jill, and the rest of your team engaged in the workplace? As it happens, it is! Let’s explore how you can use gamification to your business’ benefi...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...