Circular Economy: Difference between revisions

Elxroid (talk | contribs)
m Why it is a problem: removed template content
Elxroid (talk | contribs)
Copy changes of subsections and grammar edit
Line 9: Line 9:


==Why it is a problem==
==Why it is a problem==
===Point 1===
===The Digital Millennium Copyright Act===
Potential pitfalls antithetical to the concept and implementation of circular economy in the United States of America include but are not limited to existing provisions of and potential addenda to the [[Digital Millennium Copyright Act]]<ref name=":2">{{Cite web |date=28 Oct 1998 |title=DIGITAL MILLENNIUM COPYRIGHT ACT |url=https://www.congress.gov/105/plaws/publ304/PLAW-105publ304.pdf |url-status=live |access-date=6 May 2025 |website=www.congress.gov}}</ref>" (DMCA) enacted into federal law. .
Potential pitfalls antithetical to the concept and implementation of circular economy in the United States of America include but are not limited to existing provisions of and potential addenda to the [[Digital Millennium Copyright Act]]<ref name=":2">{{Cite web |date=28 Oct 1998 |title=DIGITAL MILLENNIUM COPYRIGHT ACT |url=https://www.congress.gov/105/plaws/publ304/PLAW-105publ304.pdf |url-status=live |access-date=6 May 2025 |website=www.congress.gov}}</ref>" (DMCA) enacted into federal law. .


===Point 2===
===Storage Devices===
Certain common computer components including but not limited to storage devices, such as SSDs / HDDs, Network Interface Devices (NICs) and other devices which have embedded MAC addresses, and other devices containing sensitive information stored as data represent devices with core functionality that could represent potential privacy concerns were they improperly introduced into the circular economy.
Certain computer components including but not limited to storage devices, such as SSDs / HDDs, Network Interface Devices (NICs) and other devices which have embedded MAC addresses, and other devices containing sensitive information stored as data, represent devices with core functionality that could represent potential privacy concerns were they improperly introduced into the circular economy.


==Examples==
==Examples==