ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Problem with E-Waste is Worse Than We Thought

b2ap3_thumbnail_ewaste_is_a_problem_400.jpgSo you got yourself a shiny new laptop. That’s great, but what are you going to do with your old device? The right thing to do is to dispose of it with a company that handles e-waste properly. Otherwise, if you just chuck it in the trash, you’ll be contributing to an already serious environmental problem.

The Problem Starts with Our Culture...
One of the root problems that feed the e-waste crisis is the throwaway approach of the electronics industry. The average laptop is used for approximately two years. Cell phones are worse, averaging only 18 months before they’re traded in for a newer model; despite the fact that many of these replaced devices work perfectly fine. Often times, the buyer feels the need to upgrade in order to “keep up with the Joneses.” It’s very difficult to change this consumerist mindset, especially when it’s the primary way technology manufacturers make their money. At the same time, there’s some merit to owning the latest product in terms of having better security and increased productivity.

...And Spreads Around the World
Do you know what happens to your old electronics once they’re discarded? You’ll be surprised to learn that most e-waste doesn’t end up in your Arizona landfill. Instead, 70-to-80 percent of e-waste is shipped to landfills in other nations. But not just any nations; e-waste has a special destination: underdeveloped countries. Why’s this you ask? It’s not because the garbage industry wants to bless needy people with working secondhand electronics. Instead, e-waste is sent to underdeveloped countries, so that it can be processed in under-regulated environments.

Take for example Guiyu, China, the world’s largest processing hub of e-waste, where 5,500 businesses process 1.5 million pounds of junked devices every year. The e-waste businesses in Guiyu are able to thrive because of the lack of environmental laws, but it’s at the cost of the groundwater being poisoned by lead. This leads to high levels of lead poisoning in local children and an elevated rate of miscarriages. See for yourself images of Guiyu from Time:

in blog waste 1

in blog waste 2

in blog waste 3

Not being accountable to pesky environmental laws means that irresponsible disposal companies can simply burn the e-waste in order to extract its scrap metal. Burning e-waste like this is banned in developed countries for a reason--it releases toxins into the environment. One obvious problem with this approach is that both underdeveloped and developed nations share the same ozone.

What Make E-Waste so Bad?
One toxic chemical found in the batteries of computers and monitors is cadmium, which is extremely toxic to humans and the environment. Here are four more toxic chemicals commonly found in many electronics:

  • Lead: Used in most electronic equipment.
  • Beryllium: A lightweight metal found in many electronics.
  • Mercury: Used in many lighting displays.
  • Polyvinyl chloride: Often used for cabling in circuit boards.

Tons and Tons of E-Waste
To give you some perspective of how much e-waste is out there, and how much more is on the way, check out these e-waste statistics reported by TechRepublic:

In 2012, the US generated more than 9 million tons of e-waste, which was a huge jump from its 2 million tons in 2005. According to the EPA, 141 million mobile devices were ready for end-of-life management in 2008, but they made up less than 1% of discarded electronics. Of the electronic waste the US generated, only 25% was recycled. The other 75% was sent to landfills in the US or abroad.

Keep in mind that these stats only apply to the U.S. The global picture of e-waste is much larger, and the growing trend in America can be applied around the world. E-waste is a global problem that’s exponentially growing.

What Can You Do About It?
You’ve got a few options to make a difference. The first thing you can do is to reevaluate how your business participates in the throwaway culture in which we all live. Before you toss out a perfectly-good and working device, consider the option to repurpose it and reuse within your company. Or, you can donate it to a nonprofit organization that would get some use out of it.

If you need to dispose of your old electronics, then give ClearView IT a call at 866-326-7214. As an IT company, we deal with e-waste every day and take the proper precautions to recycle it in such a way that has minimal impact on the environment. Got an old busted computer that you don’t know what to do with? Don’t toss it in the trash. Give us a call today and we’ll take care of it for you!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Covid-19 Holiday Disaster Recovery IT Support Browser Managed Service Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Workplace Strategy Networking Windows Gadgets Artificial Intelligence Managed IT services Encryption Blockchain Business Technology App Virtualization WiFi Remote Mobile Device Management Spam Information Server Bandwidth Gmail Budget Office Two-factor Authentication Employee/Employer Relationship Office 365 Apple Information Technology History BDR Analytics Wi-Fi Big Data Conferencing Access Control Data Security Cybercrime Health Save Money Remote Computing IT Management Help Desk Hacking Training Cost Management Vendor Hacker Voice over Internet Protocol Patch Management Employer-Employee Relationship Document Management Compliance Remote Monitoring Alert IBM Hiring/Firing Website Outlook Data loss Password BYOD Computing Vendor Management Hard Drive Applications Money Search... Customer Service Mobile Office Unified Threat Management Vulnerabilities Firewall Best Practice Legal Managed Services Retail Augmented Reality Data storage Project Management Word How To Content Filtering Travel Virtual Reality Websites Social Engineering User Cryptocurrency Mobility Meetings Router Black Market Cleaning Windows 11 The Internet of Things Google Maps YouTube Robot Scam Chrome Laptop VPN Data Breach Mobile Computing Update Twitter Marketing Running Cable Sports Law Enforcement Social Remote Workers SaaS Paperless Office DDoS End of Support Printer Antivirus Monitoring Storage Windows 7 Maintenance Healthcare Free Resource iPhone Education Cortana Start Menu Solutions Google Docs Computers Lithium-ion battery Bitcoin Downloads Computer Care Bluetooth Telephone HIPAA Distributed Denial of Service Integration Office Tips Vulnerability Images 101 Private Cloud Display Processors Memory Software as a Service Data Protection Excel Employees Politics Avoiding Downtime Machine Learning Settings Holidays Virtual Assistant Solid State Drive Wireless Technology PowerPoint Cooperation eWaste Video Conferencing Administration Tech Terms Downtime Chromebook Presentation Drones Managed IT Virtual Machines Digital Computer Repair Processor Specifications Safety Automobile IT Consultant Professional Services Virtual Desktop Taxes How To Experience Customer Relationship Management Microchip Co-Managed IT Flexibility Entertainment Multi-factor Authentication Managed Services Provider Virtual Private Network Physical Security Hack Disaster Identity Theft Notifications Saving Time Current Events Unified Communications Text Messaging Error Competition Proactive IT Touchscreen FinTech Administrator Recovery IT Assessment Bring Your Own Device Bookmark Computer Malfunction Troubleshooting Emergency CES Piracy Vendor Mangement Supply Chain Management LiFi Term Value Download Entrepreneur Application Music HTML Organization Samsung Cyber security Documents Uninterrupted Power Supply Smart Devices Browsers Webcam Nanotechnology Business Intelligence Software License Business Mangement Remote Working Smart Technology Google Play Upload Securty Social Network AI Botnet Tablets Trend Micro Electronic Health Records Rental Service Data Analysis Business Owner Transportation Domains Micrsooft Screen Reader Digital Security Cameras Mobile Technology Google Calendar Security Cameras Supercomputer Wasting Time Flash Trends Telephone Systems Customer Resource management Modem Business Growth Devices Virus eCommerce Surveillance Fileless Malware Motion Sickness Tip of the week Videos Company Culture Comparison Google Drive Supply Chain Managing Costs Gamification Banking Telephone System SSID Public Speaking Google Wallet Regulations Corporate Profile Development Streaming Media Messenger Directions Inbound Marketing Employer/Employee Relationships Deep Learning Backup and Disaster Recovery Knowledge Media Keyboard Desktop Television Telephony Workplace Employer Employee Relationship Virtual Machine Content Business Metrics Electronic Medical Records Hard Drives Hosted Solution Accountants Reviews Cabling Optimization Tablet Books G Suite Teamwork Database intranet 2FA Shortcut Society Mouse VoIP Data Storage Scams Tracking Electronic Payment Hypervisor Wireless Language Health IT Medical IT Heating/Cooling Equifax Environment Shopping Windows XP Reading Web Server SQL Server Monitors Tactics Social Networking Visible Light Communication Hard Drive Disposal Paperless Windows 8 SharePoint PCI DSS Cables Digital Payment Licensing Username Phone System Startup Freedom of Information Gig Economy Worker Humor Business Communications Access Internet Service Provider Relocation Navigation Azure Displays Addiction Advertising email scam Tech Support Mobile Security Time Management Regulations Compliance Point of Sale Public Cloud Managed IT Service Work/Life Balance Memes User Tip Legislation News Audit Human Resources Spyware Net Neutrality Shortcuts Evernote Network Management Computer Accessories Financial Data In Internet of Things File Sharing Staffing IT Hacks Proxy Server IP Address Network Congestion Emails Fake News Redundancy Risk Management Google Apps Cache Be Proactive Reliable Computing Writing Service Level Agreement Computing Infrastructure Device security Unified Threat Management Telework Workers Management Communitications Microsoft 365 Wireless Headphones Microsoft Excel Smartwatch Printing Procurement Workplace Strategies Scalability Tech CCTV Going Green Business Cards

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?