Month: March 2017 Page 1 of 2

Recycling your E-waste: How to do it right

Here are 10 hot tips to get you recycling your e-waste now. 

1. One in-two out: While a lot of e-waste ends up in landfill, a lot more gets stashed in cupboards, garages, spare rooms and shelves – meaning we have to keep mining our soil rather than recycling all the precious materials accessible above-the-ground in old technology. For every new piece of technology you welcome into your business, commit to recycling two unwanted pieces; this is the “one-in, two out” rule.

2. Stay data safe: Always wipe important personal or confidential files from your computer before taking it to any recycling service.

3. Packaging pollutes: According to Indian Institute of Packaging total packaging waste is 200million metric tons/year and the recycled percentage is 36 only. So, don’t forget to thoughtfully dispose of the cardboard box and any plastic packaging that came with your new purchase, or that you’ve kept from your old one.

4. Mark your calendar: Circle a month, even twice a year, in your calendar that you’ll round up and dispose of all your e-waste/waste every year, and make it a tradition. February is a great time, after everyone’s back from summer holidays and you’re likely to have new technology after the Christmas/New Year sales.

5. Contact your local self-government to see if they will accept your e-waste/waste.

6. Reincarnated relics: Over 90 per cent of the raw materials (including precious metals, glass and plastic) found in a computer can be recycled or re-used if handled by a top-notch recycling service. So, your old faithful laptop could be reincarnated as jewellery, outdoor furniture, or in plastic fence posts in its next life if you recycle it.

7. Influence waste recycling in your workplace. Pool resources and do one trip to your nearest collection site with everyone’s home and office e-waste/waste together.

8. Tied up in knots: Those random power cables from your old TV, computer, printer or accessory can also be recycled. Even if they’re all knotted up in a drawer and you don’t know which cable belongs to which device, bring it with you to your nearest collection site, and thanks to recycling something beautiful could be made out of it.

9. Pay it forward: If your computer or TV is still in good working condition, give it to a family member or friend.

10. Encourage your friends, family and colleagues to get involved and take responsibility for their e-waste/waste. Lead by example and help out those that may need it, collect your grandparents’ or parents’ recyclable waste/e-waste and make sure it is recycled responsibly.

For more information or to find your nearest e-waste recycling ,call +91-9962222459

Source for Idea:-Team Techcollect

Responsible Hard-Drive Destruction / Recycle

What happens to the confidential data on hard drives and other storage media in your organization when you replace them? It’s a vital question to ask – because unless the data is completely erased, there’s a good chance that it could come back to haunt you. There’s no shortage of stories of valuable data found on hard drives bought second-hand or salvaged from the garbage.

There are also numerous state and federal regulations, as well as specific industry regulations such as the health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS), which require personal and other information be securely deleted before storage media are discarded or reused.

The National Institute of Standards and Technology’s Guidelines for Media Sanitization recommends three different ways to “sanitize” a hard drive:Let’s take a look at each of these methods in turn.

Method # 1: Wiping Data from Your Drive

Disk wiping is a secure method of ensuring that data, on your computer and storage devices is irrecoverably deleted before recycling or donating the equipment. Because previously stored data can be brought back with the right software and applications, the disk wiping process will actually overwrite your entire hard drive with data, several times. Once you format you’ll find it all but impossible to retrieve the data which was on the drive before overwriting.

Disk Wiping Standards

The government standard (DOD 5220.22-M), considered a medium security level, specifies three iterations to completely overwrite a hard drive six times. Overwriting the entire contents of a drive with 0s, 1s, or random data is a technique used to make the original contents unreadable. To be sure that this is as effective as possible, some agencies recommend overwriting multiple times, using 1s, then 0s, and then random data – but recent research suggests that a single overwrite is in fact sufficient. Disk wipe applications will typically overwrite the master boot record (MBR), partition table, and every sector of the hard drive.

There are a variety of products available for different operating systems that you can purchase, or freely downloaded online to perform more secure disk wipes. If time to perform the disk wipe is a consideration, there are also tech security companies who offer disk wipe services. One of different data wiping software is Tabernus which provides you with:-

  • Certified secure data erasure
  • Detailed reports which can be used as evidence of successful erasure
  • Auditable process – requirement for compliance with IT security
  • Erasure solutions for every need ,offer a full suite of products

Method # 2: Purging Data from Your Drive-Degauss

The easiest way to purge a drive – is Purging data by degaussing:

A Degausser creates a strong magnetic field. When any magnetic media such as a hard disk drive, floppy disk, magnetic tape, or Zip drive is inserted and the machine activated, the media are completely erased and rendered permanently inoperable in a matter of a few seconds.

Portable HD Degausser[Fig:-Garner HD-3WXL-300 drives/hour] are also available now a days and people can make sure that their old hard drive leave the building, clean of all data.

Method # 3: Physically Destroying Your Drive

Destroying a storage medium ensures that its data is unreadable. Typically this is carried out at an outsourced metal destruction or incineration facility with specific capabilities to perform these activities effectively, securely, and safely.

Surprisingly, damaging disks by bending the platters by as little as a few millimeters has been found to destroy the disks beyond any form of practical data recovery – even though the data is still intact on them.

Happy deleting!

For queries/doubts you can reach me on +91-9962000271 /

Should You Never Sell a Smartphone Due to Data Trails?

The majority of us own a smartphone. How quick do you move onto a newer model?For some this will be related to their contract, often for one or two years, whereas others will opt for the latest phone based on technology each time.

Smartphones are expensive pieces of kit, but we’ve got into the habit of churning through them pretty quickly. Unlike a TV which a lot of people will keep until there’s a massive innovation or until it breaks, there’s more of a routine and cycle to buying smartphones, even when there’s not much difference from last year’s models.

Of course, with so many excess smartphones, it’s no surprise that people want to sell these on in order to offset the costs of their newer device. So they remove their SIM card, take out the SD card if they have one and then factory reset the phone. Then it’s as good as new, right? All your personal data should now be off the device? In fact, it’s not quite as simple as that.

A study by researchers at Cambridge University found that a vulnerability exists on Android device, allowing unscrupulous types to recover some of your data even after a factory reset has been performed. This could be anything that’s ever been stored on your phone’s internal storage, like saved passwords, emails or text messages.

The researchers found that some data is still left in some partitions on a device following a factory reset. This is because Android devices use flash memory, which limits the amount of memory that it allows to be overwritten. There’s no driver that allows the NAND chips to be totally wiped and manufacturers have found it difficult to implement a factory reset feature that completely works.

It’s estimated that around 500 million Android devices don’t have their data fully wiped. The researchers were able to recover the Google master token, which allows access to Gmail and Calendar data, following factory reset on 80% of phones. It’s not just the data that was once stored on the phone that’s at risk, it’s the trails that lead to all the other services you use.

There’s some contention about whether this is a good enough technique, with the researchers claiming that the factory reset doesn’t remove the decryption key from the device – meaning that if the ‘crypto footer’ is recovered then the encryption could be broken offline.

Does this mean you should never sell your smartphone? If you’re more worried about data security, you could use data wiping facilities provided by data recycling companies at a minimal cost.

But if you’re really security conscious then the device is best destroyed than sold.

Share your thoughts /


Page 1 of 2