Alltech IT Solutions Blog

How to Safely and Securely Dispose of an Old Computer

How to Safely and Securely Dispose of an Old Computer

How long have you been working on the same computer? Depending on your answer, it may be time to replace it with a new model. That’s simple enough (especially with our help), but the question remains: what are you supposed to do with the old one?

Believe it or not, there is a very wrong way to dispose of your old business technology that could easily create far greater problems than even continuing to use it might cause. To help you avoid these circumstances, we wanted to share the safe version of this process with you… starting with the one that might circumvent the biggest impact upon your business.

Data Concerns

There is a major difference between disposing of the equipment you’ve been using and disposing of the equipment you’ve been using (along with all the important data that might still be on it). It is FAR better to go with the first option, which means you will need to back up any data saved on the device before definitively removing it.

Why take the time to remove it?

Consider, for a moment, the kind of data that could potentially be hidden away in the storage of this to-be-discarded device. Once your technology is no longer in your possession during the disposal process (as we will discuss later), what guarantee do you have that the equipment will be sufficiently secured? As soon as your equipment is out of your hands, you have no way to confirm that the data left on it won’t be extracted and copied before disposal.

However, really protecting your data is going to take more than just pressing the delete button. Instead, you need to acquire a special software that both deletes and overwrites your data, stymying any attempts to recover it. After completing that process, your security measures should continue:

  • Encrypt the drive
  • Deauthorize any accounts associated with that device
  • Wipe all browsing history
  • Uninstall all programs and delete all files on the device

Finally, once all that is done, perform a factory reset just for safe measure. Alternatively, you could also remove your hard drive to keep it as an archive (making sure that it is completely secure) or physically destroy the component itself.

If you choose to go the destruction route, make sure that the hard drive is good and destroyed when you’re done. You’d be amazed what data has been extracted from before. 

Yes, You Still Need to Do This If the Device Won’t Turn On

Here’s the thing: a dead device isn’t the same thing as a device that’s been wiped of data. In fact, if your computer will not turn on, there’s a very good chance that the data on it is still safe and sound. This is because the kind of issues that typically “kill” your device may not affect the hard drive.

This can be good, or bad, depending on the circumstances. If you want your data, you know that you can still get it with the help of someone who knows what they are doing. The problem is, many hackers will also know what they are doing, and could extract your data if they got their hands on your old hardware.

Speaking of your old hardware…

Properly Disposing of the Equipment

Even if you are positive that your data is good and gone, you can’t just toss the computer to the curb with the rest of the trash. Computers and other electronics contain some materials (including heavy metals) that can severely damage the environment. Therefore, just having it sent to a landfill can cause some significant problems down the line.

It is far better to recycle any of your old, unwanted hardware. Unfortunately, even that can be trickier than it sounds. You must be careful about picking a recycling company to handle it, as some will just ship your discarded device to a developing nation. Once it’s there, children will expose themselves to the hazardous contents we just mentioned while trying to extract the materials in a computer that have some value. Once they are done, all those hazardous materials are left to seep into their groundwater, causing even more damage.

Make sure you find a recycling company that abides by a code of ethics in its operations.

Another alternative you might consider is to donate your old system once the hard drive is fully wiped or replaced with a fresh one. There are many charitable organizations that would welcome a computer but can’t spare the resources to procure one.

For assistance with properly recycling your old business technology, reach out to Alltech IT Solutions! Discuss it with us directly by calling 954-628-3770.

Data Lake or Data Warehouse... Which One’s for You...
Tip of the Week: Effectively Training Your Staff
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 05 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Artificial Intelligence Sales IaaS Scalability Emoji User Security VPN Internet Explorer Security Cameras Staffing Payment Cards Entertainment Business Technology Browser Display Help Desk Paste Phishing Cloud Business Bitcoin Outsourced IT VoIp Project Management Education Mobility Innovation Software Applications Data Social Network Inventory Backup and Disaster Recovery Printers Printing Risk Management disposal Dark Web IT Support Communication Connectivity Telephony Access Medical IT Cables Hacking Virtual Private Network WhatsApp Employee-Employer Relationship HP Microsoft Office 365 Remote Computing Video Games Windows Server 2008 R2 WiFi Storage HaaS Data Management Big Data OneNote Regulation Managed IT Service Congratulations Automobile Mobile Office Website Computer Care Information Technology Wireless Autocorrect Tablet Computer Emergency Shortcut Eliminating Downtime Hard Drive SaaS Social Media Marketing Windows 10 Google Malware Database Unified Communications Profitability Patch Management Vulnerability Computers Alerts Cortana Current Events Windows 7 Millennials Telephone System Taskbar Going Green Technology Tips Encryption Remote Control Word VoIP Yahoo Technology Router Instagram Cybercrime Analysis Gmail Live Streaming Search How To Cloud Computing Net Neutrality Business Computing Windows 10 Safety Sports Information Workplace Tips Cryptocurrency Money IT Password Customer Relationship Management Recycling Processors Paper Network Personal Information Networking Mobile Scheduling Remote CrashOverride Company Culture Google Maps Comparison Blockchain Staff Employer-Employee Relationship Television Outlook Copy Authorization Dongle Remote Monitoring and Management SSD Tech Terms Two-factor Authentication Office 365 Phone System Video Data Backup Spyware Microsoft Miscellaneous Digital Alert Update Saving Money Business Intelligence Ransomware Collaboration Plug-In E-Commerce Wireless Internet Paperless Office Best Practices Customer Service Fleet Management Smartphones Recovery IT Management Co-Managed IT Managed Service Wearables Scam Specifications GDPR Downloads Cybersecurity Leadership Chrome Workers PowerPoint Android Internet of Things Laptop Holiday Hardware Threats Movies Battery Hosted Solutions Streaming Media Hybrid Cloud RAM Antivirus Twitter Productivity Quick Tips instant Messaging Hosted Solution Passwords Virtual Assistant Environment Voice over Internet Protocol IT budget BYOD Automation Firewall Spam Authentication Users Managing Stress Settings Mobile Devices Office Certification eCommerce Dark Data Time Management Windows Threat Gadget Microsoft Teams Error Remote Support Mobile Device Smart Technology Mobile Security Memes iPhone Access Control Email Hard Drives Business Continuity App Managed IT Services Cleaning Communications Batteries Scams Tactics Webcam Data loss Server Management Electronic Health Records National Security Spotify Human Resources Lead Generation Worker Value Managed IT Voice over IP Data Breach IT Support Thank You Bring Your Own Device Apps Tip of the Week Business Management Synergy Biometrics Insurance News Conferencing Vendor File Management Retail Files Cabling Government Tech Support Amazon Vendor Management Benchmarks Security Work/Life Balance Upgrade e-waste Operating System Network Attached Storage Wi-Fi Hosted Desktop Touchscreen Humor Healthcare User Tips Payment WannaCry Hard Disk Drive Printer Analytics Spam Blocking Productivity Document Management Employees Edge Websites Training Shadow IT Efficiency Troubleshooting Hacker Windows XP Wireless Charging Internet Telephone Systems G Suite Virtualization Unified Threat Management Microsoft Office The Internet of Things Disaster Recovery Botnet Data Recovery Credit Cards Email Management Distribution Data Protection Server BDR Office Tips Multi-Factor Security Printer Server Cost Management Politics A.I. Financial Managed Services Provider Travel Excel Budget HIPAA Proactive IT eWaste Privacy Employer Employee Relationship Mobile Device Management Save Money Network Security Updates Virtual Reality Tip of the week Telecommuting Compliance Chrome OS Gaming Console Google Drive Apple Knowledge Samsung Health File Sharing Virus Machine Learning Backup User Tip Trends Bandwidth Processor Ink Multi-Factor Authentication Smartphone Data Security Tech Term Holidays Solid State Drive Managed IT Services Small Business Facebook DDoS Gadgets Online Shopping Telecommute Hackers Vulnerabilities Freedom of Information Law Enforcement Remote Monitoring Hiring/Firing Licensing Reporting IT Services Content Filtering Avoiding Downtime Profiles Maintenance Managed Service Provider Physical Security