Blog
home
  • Register

Data Net Blog

How to Safely and Securely Dispose of an Old Computer

How to Safely and Securely Dispose of an Old Computer

How long have you been working on the same computer? Depending on your answer, it may be time to replace it with a new model. That’s simple enough (especially with our help), but the question remains: what are you supposed to do with the old one?

Believe it or not, there is a very wrong way to dispose of your old business technology that could easily create far greater problems than even continuing to use it might cause. To help you avoid these circumstances, we wanted to share the safe version of this process with you… starting with the one that might circumvent the biggest impact upon your business.

Data Concerns

There is a major difference between disposing of the equipment you’ve been using and disposing of the equipment you’ve been using (along with all the important data that might still be on it). It is FAR better to go with the first option, which means you will need to back up any data saved on the device before definitively removing it.

Why take the time to remove it?

Consider, for a moment, the kind of data that could potentially be hidden away in the storage of this to-be-discarded device. Once your technology is no longer in your possession during the disposal process (as we will discuss later), what guarantee do you have that the equipment will be sufficiently secured? As soon as your equipment is out of your hands, you have no way to confirm that the data left on it won’t be extracted and copied before disposal.

However, really protecting your data is going to take more than just pressing the delete button. Instead, you need to acquire a special software that both deletes and overwrites your data, stymying any attempts to recover it. After completing that process, your security measures should continue:

  • Encrypt the drive
  • Deauthorize any accounts associated with that device
  • Wipe all browsing history
  • Uninstall all programs and delete all files on the device

Finally, once all that is done, perform a factory reset just for safe measure. Alternatively, you could also remove your hard drive to keep it as an archive (making sure that it is completely secure) or physically destroy the component itself.

If you choose to go the destruction route, make sure that the hard drive is good and destroyed when you’re done. You’d be amazed what data has been extracted from before. 

Yes, You Still Need to Do This If the Device Won’t Turn On

Here’s the thing: a dead device isn’t the same thing as a device that’s been wiped of data. In fact, if your computer will not turn on, there’s a very good chance that the data on it is still safe and sound. This is because the kind of issues that typically “kill” your device may not affect the hard drive.

This can be good, or bad, depending on the circumstances. If you want your data, you know that you can still get it with the help of someone who knows what they are doing. The problem is, many hackers will also know what they are doing, and could extract your data if they got their hands on your old hardware.

Speaking of your old hardware…

Properly Disposing of the Equipment

Even if you are positive that your data is good and gone, you can’t just toss the computer to the curb with the rest of the trash. Computers and other electronics contain some materials (including heavy metals) that can severely damage the environment. Therefore, just having it sent to a landfill can cause some significant problems down the line.

It is far better to recycle any of your old, unwanted hardware. Unfortunately, even that can be trickier than it sounds. You must be careful about picking a recycling company to handle it, as some will just ship your discarded device to a developing nation. Once it’s there, children will expose themselves to the hazardous contents we just mentioned while trying to extract the materials in a computer that have some value. Once they are done, all those hazardous materials are left to seep into their groundwater, causing even more damage.

Make sure you find a recycling company that abides by a code of ethics in its operations.

Another alternative you might consider is to donate your old system once the hard drive is fully wiped or replaced with a fresh one. There are many charitable organizations that would welcome a computer but can’t spare the resources to procure one.

For assistance with properly recycling your old business technology, reach out to Data Net! Discuss it with us directly by calling (760) 466-1200.

Data Lake or Data Warehouse... Which One’s for You...
Tip of the Week: Effectively Training Your Staff
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 30, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Productivity Network Security Data Privacy Efficiency Smartphones Malware Innovation IT Support Communication User Tips Hackers Google Hardware Email Microsoft Software Computer Tech Term Managed IT Services Workplace Tips Small Business Users Communications Internet Cybersecurity VoIp Android Mobile Device Outsourced IT Cloud Windows 10 Mobile Devices Business Management Collaboration Ransomware Miscellaneous Cloud Computing Passwords IT Services Business Backup Social Media Apps Network Wi-Fi Data recovery Browser Information Data Backup Hosted Solutions Upgrade Gadgets Holiday Smartphone Facebook Phishing Applications Windows Internet of Things Microsoft Office Bandwidth Managed Service VPN BDR Blockchain Managed IT services Patch Management Employer-Employee Relationship Networking Access Control Chrome Gmail Marketing Wireless Word Value Router Compliance Managed IT Service Business Intelligence Saving Money Automation Save Money Quick Tips Apple Laptop Going Green Processor Net Neutrality Cortana Remote Monitoring Voice over Internet Protocol Data Management Data Security Government Remote Computing Wireless Charging Mobility How To Virus Retail Office Virtual Assistant G Suite Tech Terms Cost Management Batteries Telephone System Virtualization Computers Physical Security Employee-Employer Relationship Windows 7 Office 365 Bring Your Own Device Data Protection RAM Excel Remote Monitoring and Management Settings Business Continuity Artificial Intelligence Telephony Password Payment Cards Scam Data Breach Medical IT Social Network Business Technology Connectivity Company Culture Healthcare iPhone Paperless Office Hard Drives Certification Website Hard Drive Firewall Current Events WhatsApp Movies Touchscreen Windows Server 2008 R2 Conferencing Lead Generation Co-Managed IT Eliminating Downtime Server Management Vulnerabilities Scams Education GDPR Analytics Managing Stress Operating System Recycling Licensing Recovery Ink Digital Websites Solid State Drive Fleet Management News Microsoft Office 365 SSD Display Processors Profiles Maintenance Plug-In Telecommute Human Resources Mobile Office eCommerce Taskbar Humor BYOD Cryptocurrency Project Management Live Streaming Streaming Media Storage Troubleshooting Personal Information Tech Support Law Enforcement Telecommuting Virtual Reality PowerPoint Safety Hard Disk Drive Multi-Factor Authentication Unified Communications Authentication Training Benchmarks User Tip Spyware Shadow IT Internet Explorer Proactive IT Data loss Managed Services Provider Sales Online Shopping Help Desk National Security Remote Support Content Filtering Memes Wireless Internet Database Search Downloads Dark Web Big Data Technology Tips Virtual Private Network Update Network Attached Storage Environment E-Commerce Bitcoin Alert Vulnerability Sports Reporting Edge Video Mobile Device Management Cleaning Server Authorization IT budget Twitter Security Cameras Risk Management Computer Repair Threat HP Spam Electronic Health Records Vendor Tablet WannaCry IT Amazon Cybercrime Time Management Insurance User Security Trends Error Customer Relationship Management Hybrid Cloud Outlook e-waste Payment Workers Dongle Customer Service Holidays Comparison Microsoft Teams Inventory Wearables Tip of the week IT Service Printing Document Management Antivirus Health Updates HIPAA Hosted Desktop Machine Learning Tactics Chrome OS File Management Congratulations Voice over IP A.I. Backup and Disaster Recovery Botnet Specifications Managed Service Provider Cables Profitability disposal instant Messaging Threats Travel File Sharing Millennials SaaS OneNote Disaster Recovery IT Management Mobile Security Mobile Paper Staff Employees Distribution Knowledge Battery Printers WiFi Regulation Remote Thank You Financial Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123