Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Recycling Technology: Is It the Best Answer?

Recycling Technology: Is It the Best Answer?

Let me ask you a simple question: how many cell phones have you had over the years? For some of us, upgrades are a yearly occurrence. For others possibly bi-yearly. Have you ever wondered where your old cell phone goes after it is out of your hands? 

Recycling is an important, but commonly forgotten topic in today’s digital age. Electrical devices are not something that can be mixed into your local landfill. It is a very toxic, hazardous waste. In various states across the US, it is actually illegal to dispose of electronics in the trash. So why is this?

Take a Look at What Is Inside

Inside of most electrical devices, you’ll find common materials such as aluminum, copper, and sometimes gold. Aluminum is typically used to create the structure of these electrical devices. It is a very common, strong, lightweight material. Copper and gold are excellent conductors and very resistant to corrosion when housed correctly. However, contained within most electrical devices are also toxic elements and materials. Sulfur, mercury, lead, chromium, beryllium oxide, cadmium; some or all of these could be lurking in that computer monitor you’re about to send off to the local landfill. 

Dispose of them Safely

As you might imagine with the ever-growing amount of electrical devices, there isn’t one set in stone procedure for all of this waste. There are also devices which most people do not even consider to be e-waste but should not be thrown away. When devices are sent away, typically they are crushed into as small of a space as possible. In this process, toxic chemicals and materials become exposed. Electrical devices typically need to be disassembled in order to be disposed of safely. E-waste is typically sent to processing plants which specialize in disassembling these products. While this is a safer route -- deconstructing these products is still a dangerous task. Let’s take a look at one example.

Samsung Note 7 -- A Hot Topic 

In the manufacturing industry, recalls are not uncommon. Devices are typically rigorously tested before leaving the plant, but what happens when a fatal flaw appears? This is exactly what happened with the Samsung Note 7. While models were quickly pulled from shelves, the batteries that powered them still are used in a variety of products. These batteries became notorious for short circuiting, which led to them combusting or even exploding. These devices required manual disassembling. 

Workers at the recycling plant were in charge of disassembling these potentially dangerous devices. They were equipped with heavy duty gloves, tongs, and even fire containment bins. What makes these devices different from the AA batteries you change every few months in your TV remote, is the fact that they are lithium ion batteries. These contain thousands of connected cells meaning they have an incredible amount of potential energy. This is why they can be so destructive.

Different battery technologies are enabling consumers to have longer lasting, more powerful devices. Whether it’s your new and improved battery in your smartphone, or your battery powered lawn mowers, hedge trimmers, or even the self-balancing hover board you purchased for Tim’s 12th birthday that just broke; these electrical devices need to be handled responsibly.

So, what do you do? Recycle battery powered devices, or dispose of them?

All devices, whether it’s your outdated cell phone, your undersized computer monitor, or even your in-home appliances -- all should be handled properly if you decide their product life has expired. You don’t know what toxic material is lurking in the underbelly of your device, and when dealing with your environment waste plant workers lives; it’s better to be safe than sorry.

If the time has come and replacing office devices has become imminent, 415 IT can help. Our professionals have the know-how to make sure you are disposing of your devices safely and in a responsible manner, without risking losing or exposing critical data. Call (415) 295-4898 to learn more.

Why Managed Services: Proactive Maintenance and Ma...
Tip of the Week: Extend Your IT Budget
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 16 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions IT Support Network Security Data Privacy Cloud Data Recovery Software Outsourced IT IT Services Internet Email Malware Tech Term Managed IT Services Business Computer User Tips Innovation Hackers Windows 10 Business Management Cloud Computing Small Business Ransomware Efficiency Microsoft Collaboration Paperless Office Upgrade Google Mobile Devices Android Hardware Phishing VoIp Encryption Server Remote Monitoring Business Continuity Managed Service Managed Service Provider Smartphones Workplace Tips Backup Communication Communications Artificial Intelligence Office 365 Vulnerability Managed IT Wi-Fi Help Desk Quick Tips Save Money Document Management Healthcare Saving Money Cybersecurity Browser Applications Internet of Things Managed IT services Passwords Laptops Business Technology Holiday Data Management Government Bandwidth Antivirus Automation Microsoft Office Compliance Blockchain Mobile Device BDR Processor Smartphone Project Management Employer-Employee Relationship Tip of the week Information Disaster Recovery Scam Avoiding Downtime VPN Analytics Customer Relationship Management Windows 7 Access Control BYOD Social Media Website Windows Data Security Infrastructure RMM Two-factor Authentication Vendor Management Chrome IT Management Router Assessment HIPAA Bring Your Own Device Remote Monitoring and Management Financial Users Machine Learning Networking Operating System Network Management Professional Services Training Consultation Mobile Security Employees Unified Communications Files Facebook Recycling Downtime Virtual Private Network The Internet of Things Company Culture Gmail Network Risk Management Cooperation Word Remote Workers Unified Threat Management IoT Software as a Service Net Neutrality Regulations Patch Management Management Mobility Tablet File Sharing Internet Exlporer Server Management Data Loss Dark Web Alert Proactive Smart Technology Storage Monitoring Redundancy Maintenance Virtual Reality PowerPoint Display Utility Computing OneNote Permission Travel Value of Managed Services Websites Social Networking Technology Laws Remote Worker Screen Reader Emergency Multi-Factor Security Authorization Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Cybercrime Politics Return on Investment Remote Computing Comparison Licensing Options Modem High-Speed Internet Printer Data Warehousing Flexibility Tech Support Search How To Test Technology Tips OneDrive Managed Services SaaS G Suite Unified Threat Management Office Private Cloud Database Management Smart Tech WPA3 Legislation Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Instant Messaging Settings Personal Information Consulting Specifications 5G Touchscreen Hacking Development ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Digital Payment Hotspot Manufacturing Time Management Vendor Motherboard Chromebook Bookmarks GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Virtualization Batteries Heating/Cooling IT Consulting Cyberattacks Social Managed IT Service SharePoint Customer Service Transportation Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Trending Cookies Cables Favorites Apps Money Wasting Time Current Events Superfish Wireless Mouse Language Password Statistics Vulnerabilities Mail Merge User Error Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Servers Managing Stress Data Breach Read Only Security Cameras Break Fix Wires Downloads MSP Finance Permissions Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Nanotechnology Conferencing Microsoft Excel Database Miscellaneous Recovery Mirgation Hard Drive Computing Infrastructure Hard Disk Drives Bluetooth Mobile Computing Address WiFi Notes Wearable Technology Star Wars Human Error File Management Spam Enterprise Content Management Printing Augmented Reality App Authentication Google Calendar Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Proactive Maintenance Meetings Voice over Internet Protocol Gadgets Projects Cache Electronic Medical Records Computing Alerts Solid State Drives Geography Daniel Stevens Regulation Twitter Smart Devices Education Sensors CEO Printers Students Marketing

Latest Blog

Managed services offer businesses an improved means of obtaining and managing the technology they rely on. With data being so important to the modern business, much of this technology is devoted to storing, securing, and leveraging this data. Working with a managed service p...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...