Advantage IT Management Blog

Can You Recycle That Battery Safely? Can Anyone?

Can You Recycle That Battery Safely? Can Anyone?

Businesses are often concerned with taking in the latest and greatest technologies, but it seems that less attention is paid to how these technologies are disposed of when the time comes to replace them. Is there a proper way to handle electronics that have outlived their use, and how has our prioritization of upgrade schedules and smaller form factors impacted these processes?

As you might imagine, there isn’t a single set way to properly handle all electronic waste, as it is known. Furthermore, certain devices that you may not consider to be e-waste should not be thrown out

Dealing with Different Materials

There are many materials commonly found in electronics that are relatively safe - including zinc, aluminum, copper, and gold - meaning that it only makes sense to recycle them. However, these materials are often incorporated with hazardous materials, such as sulfur, mercury, and beryllium oxide, as well as cadmium, chromium, and lead. What’s worse, the containment measures that these devices are typically constructed with are frequently compromised during the disposal process.

This is why there are a variety of common electronic devices that should not be thrown out like any trash would be. This ranges from common kitchen appliances, like toasters, blenders, coffee makers, and microwave ovens, to computer monitors and televisions that utilize cathode ray tubes (CRTs), to various other electronics that can easily be found around the average home or office. In fact, in many states in the US, it is illegal to throw electronics in the trash.

However, with how our electronics are now built, even recycling them isn’t completely safe - at least, not for the people tasked with disassembling them.

The Return of the Samsung Note 7’s Fatal Flaw

The Note 7 was notorious for its tendency to suddenly combust, due to the lithium-ion batteries that power them. These batteries would short-circuit and explode. While the phones were quickly pulled from shelves, the rechargeable batteries are still used in a variety of products. These products are often the ones that are recycled, which means they are sent to processing businesses to be disassembled by hand.

The employees at these recycling plants are often equipped with heavy gloves, tongs, and fire containment bins… just in case one of these batteries should rupture as a device is taken apart.

These fires aren’t just contained to the workstations of the employees, either. While there isn’t any official data to connect these batteries to overlying issues, the anecdotal evidence paints a telling picture: in the time since the spring of 2018 alone, batteries were the suspected cause of recycling fires in:

  • New York
  • Arizona
  • Florida
  • Wisconsin
  • Indiana
  • Idaho
  • Scotland
  • Australia
  • New Zealand

These issues aren’t just occurring in recycling centers, either… Apple stores in Switzerland, Spain, and the Netherlands had battery fires in 2018.

Devices themselves have also begun to contribute to the problem, in that smaller devices can be harder to identify in a big pile of waste and are quite hard to take apart. Apple’s AirPods effectively can’t be recycled by these companies, because their three batteries are encased in plastic.

So, when you’re adding a device to your professional or personal Wishlist, consider what will happen to it when the next big advancement in technology comes out, and how easily it can safely and responsibly be disposed of.

Advantage IT Management can help you with the devices that are in your office now. We have the skill and know-how to make sure your data is safe, and that you’re disposing of your old devices in a responsible manner. Call us at 251-662-9770 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 17 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Productivity Network Security Hackers Malware User Tips Hardware Efficiency Google Computer Microsoft Communication communications Data Tech Term Internet Smartphones Cybersecurity Innovation Email Software Managed IT Services Ransomware VoIP Mobile Device Business Management Outsourced IT Backup Business Windows 10 Hosted Solutions Passwords IT Support Smartphone Android Small Business Apps Users Network Social Media Browser Miscellaneous Mobile Devices Alert Gadgets IT Services Managed IT Services Wi-Fi Applications Bandwidth Collaboration Windows Microsoft Office Cloud Computing Data Backup Save Money Workplace Tips Internet of Things Holiday Employer-Employee Relationship Information Data Recovery Saving Money Business Intelligence Business Continuity Facebook Gmail Twitter IT Support Computers Blockchain Router Access Control Password Wireless Office Data Management Upgrade Virtualization Chrome Managed Service Patch Management Law Enforcement Data Breach Laptop Quick Tips Hosted Solution Settings BYOD Government Automation Excel Mobile Device Management Office 365 Telephony Analytics Phishing Physical Security Workers Battery Networking Politics Marketing Company Culture Vulnerability VoIP Cybercrime Value Word Paperless Office Compliance RAM BDR Cortana Retail How To Virtual Assistant VPN Recovery Update Maintenance Telephone Systems Voice over Internet Protocol Healthcare Data Protection Education Artificial Intelligence Website Health Cost Management Net Neutrality Virus Productivity Remote Monitoring and Management Disaster Recovery Operating System Apple Data Security Medical IT Dark Web HIPAA G Suite Mobility Spam Going Green Wireless Charging Processor Managed IT Service iPhone Tip of the week Scam Smart Technology Tech Terms Connectivity Remote Computing Remote Monitoring Server App Hacking Lead Generation Inventory Managed Service Provider Chrome OS Information Technology Network Attached Storage Downloads Telecommuting Managed IT Wireless Internet Bitcoin Social Engineering Files Plug-In instant Messaging Printing Google Drive Specifications Taskbar Benchmarks eCommerce Gadget Live Streaming Printer HP Remote Control Work/Life Balance Error Hard Disk Drive Personal Information Staff Office Tips Cables Wearables Social Mobile Security Remote Support Avoiding Downtime Human Resources Server Management Trends Microsoft Teams Help Desk Payment Cards Proactive IT Vulnerabilities Paper Two-factor Authentication Conferencing Troubleshooting National Security Risk Management Online Shopping Technology Tips Shortcut WhatsApp Lithium-ion battery Document Management Database Spam Blocking Sales Touchscreen Video SaaS Websites Disaster WiFi WannaCry Environment Reporting Employee-Employer Relationship Biometrics Streaming Media A.I. Managing Stress Certification Cryptocurrency Antivirus IT budget Ink Content Filtering Spotify Botnet Outlook Backup and Disaster Recovery Automobile Digital Tactics Email Management Tablet Microsoft Office 365 Customer Service Updates Millennials Safety Emergency Hard Drive e-waste Copy File Sharing Electronic Health Records Tech Support Machine Learning Movies The Internet of Things News Analysis Windows 7 IT Management PowerPoint Multi-Factor Security User Tip Profitability Recycling Hard Drives Amazon E-Commerce DDoS Edge Internet Explorer Knowledge Authentication OneNote Phone System Licensing Sports Processors disposal Paste User Security Search GDPR Employees Entertainment Printer Server Telecommute Unified Communications Uninterrupted Power Supply Windows XP Bring Your Own Device Training Telephone System Time Management eWaste Best Practice Cabling Eliminating Downtime Batteries SSD Payment Distributed Denial of Service Big Data Threat Comparison Current Events Authorization Windows Server 2008 R2 Cleaning Display Windows 10 Voice over IP Dongle Travel Webcam Worker Spyware Business Technology Access Google Maps Storage Solid State Drive Printers Data loss Hybrid Cloud Security Cameras Budget Unified Threat Management Scalability Yahoo Dark Data Computer Care Chromecast Regulation Television Instagram Credit Cards Wireless Technology Encryption Gaming Console Thank You Employer Employee Relationship Vendor Management Video Games Financial Congratulations Freedom of Information IaaS Hiring/Firing CrashOverride Synergy Autocorrect HaaS Trending Administrator Internet Exlporer Staffing Emoji Money Scheduling Samsung Leadership

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Mia Taylor Tip of the Week: How to Handle a Paper Jam Without Freaking Out
13 September 2019
You have posted a fantastic blog! This is the best blog, most concise step by step guide. Toshiba te...
Galvin Caldwell How and Why Cyber Crime is so Effective
06 September 2019
Cyber crime is the crime has the well recognized worth all over the world due to the lack of the sec...
Abby Aspinall Ransomware Increasingly Targets Android Devices
27 August 2019
Ransom ware has some targets that were among the all android devices that were good to be read over ...
JozephChristopher Google Wants You to Tweet Emojis at Them. Here’s Why
22 August 2019
As per my research with a dissertation writing services company, Google was working on this from a l...
Chris Greenwalty Most Noteworthy Data Breaches in 2019
21 August 2019
Since there are many threats that we are listening about data breach. You need to figure out the bes...