Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What To Do With a Wet Smartphone

Tip of the Week: What To Do With a Wet Smartphone

Even though no one will admit to it themselves, everyone knows that person that, for some reason or another, has dropped his/her smartphone in the toilet, or into the sink, or into a puddle. Needless to say that dropping electronics into any bit of water isn’t typically recommended, but today we will talk about what to do if this happens to you.

Before we begin we should mention that many smartphone manufacturers are now creating devices that are at least water resistant. These devices are given an IP score. IP stands for International Protection as drawn up by the International Electrotechnical Commission (IEC), which is a classification given to a device that rates the type of protection a consumer should expect. If your device is classified as IP67, it is resistant to dust and can be submerged in water no more than one meter deep for up to a half an hour. The only difference between IP67 and IP68, is that devices that are classified as IP68, guarantees protection in water up to one and a half meters deep for a half hour.

Regardless of how your smartphone is classified, it is probably not a great idea to expose it to water for very long. If it does happen, following these steps will give you the best chance of saving the device.

1. Turn off your device.
If it is off, do not turn it on.

In fact, there are a bunch of things you will not want to do. Don’t plug it in. Don’t shake it. Don’t blow in it. Don’t try and use a blow dryer to save it. In fact, if this happens to you, don’t do anything to the device except the outlined suggestions in this list.

2. Remove your SIM and any expandable storage you have inside your device.

3. If your phone has a battery that can be removed, remove the battery
If you don’t have a phone where you can easily access the battery, don’t just pry it open. Either take it to a professional to do so, or check out the many YouTube tutorials available to properly take your phone apart and remove the battery.

4. Use an absorbent rag to dab your phone dry.
Do not wipe it around as it could spread the liquid to more, harder to reach parts of your phone.

5. Bury the phone in a ziplock bag filled with uncooked rice.
The rice will absorb the liquid.

6. Let your phone dry for a day or two before trying to turn it on.

7. After that time, try turning it on.
If it doesn’t turn on, try charging it. If it doesn’t charge, your battery was probably damaged. At this point you’ll want to take it to a professional if you haven’t done so already.

8. If it seems to work properly, makes sure it does.
If all seems well, you’ll want to test the display for responsiveness, test your speakers and your microphone to makes sure they work properly.

If you follow these eight tips, you may just have a chance to save your (likely expensive) smartphone from the eWaste pile at your local landfill. If you like this tip, return to our blog weekly for more tips and tricks to help you get the most out of your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 March 2019
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Hackers Business Management Efficiency Productivity Hosted Solutions User Tips Innovation Backup Managed Service Provider Workplace Tips Malware Business Mobile Devices IT Services windows Computer Hardware Network Security Upgrade Email Communication IT Support Miscellaneous Saving Money Productivity Data Virtualization Smartphones Gadgets Windows 10 Business Continuity Smartphone Apps Disaster Recovery Browser VoIP Server Small Business Network Microsoft Office Mobile Device Management Social Media Mobile Computing Tech Term Information Technology Health Quick Tips Passwords Android Cybersecurity Operating System Mobile Office Going Green Holiday Data Backup Office 365 Chrome Windows 10 Save Money Application Office App spam Alert Best Practice Collaboration Cybercrime Outsourced IT communications Internet of Things Ransomware Employer-Employee Relationship Data Security Users Law Enforcement Managed IT Services BYOD Marketing Data Recovery Search Wearable Technology The Internet of Things Apple Vendor Management Facebook WiFi Bring Your Own Device Remote Computing Tablet Maintenance Saving Time Router Wireless Technology Mobility BDR History User Error Remote Monitoring Unified Threat Management Antivirus IT Support Money Avoiding Downtime Hacking iPhone Phishing Risk Management Cost Management Tech Support Big Data Encryption Customer Relationship Management OneNote Government Automation Bandwidth Office Tips Password Cloud Computing Data Management Computers Hard Drives Social IT Solutions Telephone Systems Outlook Artificial Intelligence Gmail USB Budget PowerPoint Analytics Phone System Proactive IT Firewall Wireless Two-factor Authentication Information Update Lithium-ion battery Current Events Unsupported Software Wi-Fi Shortcut VPN Humor Website Vulnerability Net Neutrality Networking Google Drive Printer Social Networking Applications Virus Managed IT Entertainment administration Recovery Blockchain Personal Information Streaming Media Disaster Identity Theft Trending Managed IT Services Audit Intranet Work/Life Balance Excel Laptop Augmented Reality Content Filtering Mobile Device Meetings Politics Travel IT COnsultant Education Television Computer Repair Retail Social Engineering Access Control Human Resources Fax Server Mobile Security DDoS Instant Messaging Emails WannaCry Data Breach Project Management Computing Touchscreen Cortana Hard Drive Sports Uninterrupted Power Supply Hybrid Cloud Sales Evernote Samsung Benefits Computer Accessories eWaste Battery Value SaaS Automobile Cleaning HaaS Save Time Data Protection Online Currency Windows 8 Computer Care Word Managing Stress Storage Google Assistant Conferencing IT Management hacker Devices Managed Service Point of Sale Legal Hosted Solution Transportation Printer Server Commerce Patch Management End of Support Business Intelligence Flexibility Telephony Customer Service Programming Twitter Fraud Biometrics Google Docs Private Cloud Virtual Reality Display Data Storage Scam Amazon Business Technology HIPAA Paperless Office Internet Exlporer Wireless Charging Youtube Screen Mirroring Ciminal Employer Employee Relationship Adobe Text Messaging IT consulting Testing Medical IT Consultant File Sharing Books Touchpad Ebay Financial Microblogging Cast Admin Reliable Computing Camera Compliance Identity Distributed Denial of Service Black Market Electronic Medical Records Bloatware Monitors IT budget Keyboard Shortcuts Licensing Projects Inbound Marketing Data Privacy Webinar Legislation Images Files Safety Operating Sysytem Virtual Assistant Webinar Nanotechnology Workers Windows 7 Payroll Training Tablets Branding 3D Printing Mouse Chromebook Surge Protector IT solutions Comparison Root Cause Analysis Updates Chromecast HBO Alexa for Business Co-Managed Services Identities Security Cameras Company Culture NFL WIndows 7 Network Congestion Printing Windows 10s Specifications Microsoft Word Help Desk Reputation Regulations Debate Telephone Language Machine Learning Bluetooth Worker Commute Administrator junk Solid State Drive Settings Device Security Keyboard Cameras Software as a Service User Hyperlink Community Downtime Windows Ink SharePoint Video Games Access ISP filter Computer Forensics Hard Disk Drive Gifts Hiring/Firing WIndows Server 2008 Virtual Desktop Intrantet Presentation Best Available Wasting Time Proactive E-Commerce Google Maps Teamwork Science Lifestyle Blogging Management Tutorial Credit Cards Spyware Smart Technology Vendor Accessory Websites Payment Cards Data Loss Robot Wireless Internet FAQ Sync Buisness Advertising Employee-Employer Relationship Peripheral Co-managed IT Data Theft Employee Running Cable Scalability Experience Data storage Gamification iOS Charger Edge PDF Near Field Communication Nokia App store Break/Fix Upgrades Microsoft Excel How To Music OneDrive Gift Giving Memory Print Server Computer Fan