Archived publication
This publication is no longer current or has been superseded.
| Ref | Choose: | Avoid: |
|---|---|---|
|
2.1 |
Suppliers who have implemented, or are planning to implement, an environmental management system that is consistent with ISO 14001: EMS32: 2004, EMAS,33 or a demonstrated equivalent standard. Independent accreditation to ISO 14001 and public CSR34 reporting is preferred. |
Suppliers who cannot provide evidence of sustainable manufacturing processes |
|
2.2 |
Equipment that meets the European Union Restriction of Hazardous Substances (RoHS) Directive 2002/95/EC, where feasible. |
|
|
2.3 |
Equipment made from materials with recycled content. |
|
|
2.4 |
Equipment with the US Energy Star mark for power use. |
|
|
2.5 |
Printers that have duplex printing functionality. |
|
|
2.6 |
Liquid crystal display (LCD) monitors. |
Cathode ray tube (CRT) monitors. |
|
2.7 |
Suppliers who provide the option to take back equipment packaging where this cannot be reused or recycled by the buyer. |
|
|
2.8 |
Eco-label certified equipment, where the labels have a third-party check or where there are independent verification processes for self-claim certification. |
|
|
2.9 |
Suppliers who provide spare parts and service for the life of the equipment. |
Suppliers unwilling to support equipment beyond 3-4 years. |
|
2.10 |
Equipment that can be easily disassembled for maintenance. |
|
|
2.11 |
Suppliers who provide take-back options for ICT equipment with a reuse and recycling service, and can also demonstrate environmentally sound disposal practices. |
Suppliers who do not take responsibility for end-of-life equipment by providing safe environmental reuse, recycling or disposal. |
| Ref | Choose: | Avoid: |
|---|---|---|
|
3.1 |
Server centralisation or outsourcing to data centres. |
Proliferation of server infrastructure in multiple sites (with associated costs of air-conditioned environments). |
|
3.2 |
To set hard disks to turn off after 30 minutes of inactivity.* |
Leaving non-critical computers powered on when not in use for more than 20-30 minutes. |
|
3.2 |
A screen saver message reminding staff to turn equipment off when not in use. |
Leaving screen savers running, as these consume power. |
|
3.3 |
To set monitors to turn off after 10 minutes of inactivity.* |
|
|
3.3 |
To train staff to turn off monitors, printers, scanners and other ICT equipment at night. |
|
|
3.4 |
Laptops for office and staff flexibility. |
|
|
3.4 |
To encourage the use of conferencing technologies – audio and video – for staff training and meetings, to reduce the need for travel. |
|
|
3.5 |
Centralised multi-function networked printing and scanning devices, deployed based on a workflow studies. |
Proliferation of desktop peripherals such as printers, scanners, fax machines. |
|
3.6 |
To set printing defaults to duplex, black and white, and set these to automatically restore if they are changed. |
Staff re-setting printing defaults to single-sided. |
* These defaults are already set for Energy Star-compliant products.
Security cleansing of hard drives is a critical first step in the disposal of computer equipment. These security-cleansing guidelines are included primarily to draw attention to the issue, and are not intended as a substitute for, or to replace, the guidelines provided by the Government Communications Security Bureau on their website for government agencies (see Security in the Government Sector http://www.security.govt.nz/sigs/html/index.html).
| Ref | Choose: | Avoid: |
|---|---|---|
|
4.2 |
Security-wiping software compliant with US Department of Defense standard 5220.22-M, or equivalent. |
Recyclers who do not use recognised security-wiping software and other secure disposal practices. |
|
4.2 |
Recyclers who provide certification of successful security wiping. |
Recyclers who do not provide certification of security wiping. |
|
4.2 |
Physical destruction of hard drives with bad sectors by drilling. |
Chemical and heat methods of destruction such as acid bath destruction. |
|
4.2 |
In-house security cleaning of equipment used for highly classified and sensitive material. |
|
|
4.3 |
Recyclers who can provide evidence of the chain of custody for the entire disposal process. |
|
|
4.3 |
To remove SIM cards from all GSM mobile devices before disposal. |
|
|
4.3 |
To manually delete all directory information from Telecom phones before disposal and return to factory settings. |
|
|
4.3 |
The auto-synchronisation facility to delete all data in hand-held PDAs before disposal. |
Storage of sensitive data on portable media. |
|
4.3 |
Procedures and policies for restricting the storage of sensitive data on portable media. |
| Ref | Choose: | Avoid: |
|---|---|---|
|
4.4 |
Take-back or reuse and recycling services in computer procurement contracts. |
Buying equipment from companies that do not specify disposal procedures. |
|
4.5 |
Trusted recyclers and refurbishers to dispose of monitors, computers, computer peripherals and fax machines using environmentally sound methods.35 |
Sending monitors, computers, computer peripherals and fax machines to landfills. |
|
4.7 |
Service contracts for ICT equipment such as multi-function printing devices, hand-helds and mobile phones. |
|
|
4.8 |
Service providers who provide a collection service for the reuse and recycling of surplus handsets. |
Sending surplus handsets to landfills. |
32 EMS – Environmental Management System.
33 EMAS – Eco-Management and Audit Scheme.
34 CSR – Corporate Social Responsibility.
35 The Ministry for the Environment is developing good practice WEEE recycling guidelines. These will be available early 2008. Adherence to these guidelines could be made a contractual requirement for all refurbishers and recycling providers.