Does your organization have a program to refurbish or recycle devices?


165 views6 Comments

Managing Director in Software, 1,001 - 5,000 employees
I have long been involved in the life cycle of devices, so there was always a program in place. We didn't realize we were really good at recycling, we were just saving the company money by taking devices that were state of the art three years ago and giving them to somebody else in the organization that was just starting up, whether they were an intern, or a new hire or in a different department who didn't require all the bells and whistles. So in terms of managing assets and being smart about it, that's always been a part of IT.

Another thing we used to do with older equipment was refurbish them to a point, removing any sensitive data, and then provide them to the local schools, or to underprivileged kids in economically challenged regions, because there still is a digital divide. Being able to give people a device at no cost is still a working system that helps a lot. And there are many organizations that do similar things.
1
CEO in Manufacturing, 11 - 50 employees
My company, Virtual Power Systems, builds products that unlock stranded power and data centers. Of the 104 gigawatts of capacity that's out there, 36 gigawatts of it is stranded. The most sustainable data center is the one that's never built, so we should use what we have already and unlock all that capacity. But from a circular economy standpoint, one of our partners is an IT asset disposition (ITAD) vendor called ITRenew.

From a CIO perspective, they take the waste stream from the biggest players—think of Facebook, Google, and Amazon—and turn it into a supply chain. That supply chain becomes an OEM of hardware. They take these things and sell them as brand new equipment with a three-year warranty, just like Dell, HP, and Lenovo do.

It's less than half the cost for the same processing and memory and storage compatibility—like the old laptops that work great because you don't need more bells and whistles from an infrastructure standpoint. And 70% of the embedded carbon is removed because it doesn’t require the rare earth minerals, shipping, and manufacturing, etc. There’s an incredibly powerful sustainable circular economy story in that. If they sold all the inventory they have, they'd be the fourth largest OEM in the world.
1
Director of IT in Software, 201 - 500 employees
We have a 4-year cycle for pc’s, everyone gets a new pc at 4 years mark. For laptops we have 2-year and 4-year programs depending on the model.
2
AVP and Deputy CIO in Education, 10,001+ employees
Yes. We have two programs. A surplus store where items with perceived end user value but is beyond the life cycle of business use and everything else is sold to an eRecycler.
1
CEO in Services (non-Government), 2 - 10 employees
Yes we do. We re-image old equipment and donate to schools and colleges. We also provide old equipment to hardware manufacturers who refurbish and provide a second life. Almost every hardware manufacturer has a program where they can take old hardware and do refurbishment and second life.
2
Director in Manufacturing, 1,001 - 5,000 employees
For Cellphones each regional office collects the replacement phones, and those that are still operational get donated for use for emergency calls, frequently for Womens' shelters or Battered Women's organizations.

All of our other equipment, PC's, laptops, Servers, Storage etc, are leased and returned to lessor.
3

Content you might like

Senior Director, Technology Solutions and Analytics in Telecommunication, 51 - 200 employees
Palantir Foundry
3
Read More Comments
6.1k views15 Upvotes48 Comments

Iaas/PaaS/On-premise DLP solution18%

Iaas/PaaS/On-premise UEBA solution27%

Access Management solution28%

SWG Solution (Secure Web Gateway)7%

SEG Solution (Secure Email Gateway)0%

Firewall solutions12%

Antivirus Protection2%

Cloud Security Posture Management (CSPM)4%

Other3%

No Protection1%

We don’t host data in public clouds or on-premises1%


169 PARTICIPANTS

999 views1 Comment

Attack Surface Management47%

Account Takeovers59%

Executive Protection51%

Hacktivism/Disinformation32%

Brand Abuse/Impersonations22%

Phishing Attacks41%


217 PARTICIPANTS

608 views