ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Problem with E-Waste is Worse Than We Thought

b2ap3_thumbnail_ewaste_is_a_problem_400.jpgSo you got yourself a shiny new laptop. That’s great, but what are you going to do with your old device? The right thing to do is to dispose of it with a company that handles e-waste properly. Otherwise, if you just chuck it in the trash, you’ll be contributing to an already serious environmental problem.

The Problem Starts with Our Culture...
One of the root problems that feed the e-waste crisis is the throwaway approach of the electronics industry. The average laptop is used for approximately two years. Cell phones are worse, averaging only 18 months before they’re traded in for a newer model; despite the fact that many of these replaced devices work perfectly fine. Often times, the buyer feels the need to upgrade in order to “keep up with the Joneses.” It’s very difficult to change this consumerist mindset, especially when it’s the primary way technology manufacturers make their money. At the same time, there’s some merit to owning the latest product in terms of having better security and increased productivity.

...And Spreads Around the World
Do you know what happens to your old electronics once they’re discarded? You’ll be surprised to learn that most e-waste doesn’t end up in your Arizona landfill. Instead, 70-to-80 percent of e-waste is shipped to landfills in other nations. But not just any nations; e-waste has a special destination: underdeveloped countries. Why’s this you ask? It’s not because the garbage industry wants to bless needy people with working secondhand electronics. Instead, e-waste is sent to underdeveloped countries, so that it can be processed in under-regulated environments.

Take for example Guiyu, China, the world’s largest processing hub of e-waste, where 5,500 businesses process 1.5 million pounds of junked devices every year. The e-waste businesses in Guiyu are able to thrive because of the lack of environmental laws, but it’s at the cost of the groundwater being poisoned by lead. This leads to high levels of lead poisoning in local children and an elevated rate of miscarriages. See for yourself images of Guiyu from Time:

in blog waste 1

in blog waste 2

in blog waste 3

Not being accountable to pesky environmental laws means that irresponsible disposal companies can simply burn the e-waste in order to extract its scrap metal. Burning e-waste like this is banned in developed countries for a reason--it releases toxins into the environment. One obvious problem with this approach is that both underdeveloped and developed nations share the same ozone.

What Make E-Waste so Bad?
One toxic chemical found in the batteries of computers and monitors is cadmium, which is extremely toxic to humans and the environment. Here are four more toxic chemicals commonly found in many electronics:

  • Lead: Used in most electronic equipment.
  • Beryllium: A lightweight metal found in many electronics.
  • Mercury: Used in many lighting displays.
  • Polyvinyl chloride: Often used for cabling in circuit boards.

Tons and Tons of E-Waste
To give you some perspective of how much e-waste is out there, and how much more is on the way, check out these e-waste statistics reported by TechRepublic:

In 2012, the US generated more than 9 million tons of e-waste, which was a huge jump from its 2 million tons in 2005. According to the EPA, 141 million mobile devices were ready for end-of-life management in 2008, but they made up less than 1% of discarded electronics. Of the electronic waste the US generated, only 25% was recycled. The other 75% was sent to landfills in the US or abroad.

Keep in mind that these stats only apply to the U.S. The global picture of e-waste is much larger, and the growing trend in America can be applied around the world. E-waste is a global problem that’s exponentially growing.

What Can You Do About It?
You’ve got a few options to make a difference. The first thing you can do is to reevaluate how your business participates in the throwaway culture in which we all live. Before you toss out a perfectly-good and working device, consider the option to repurpose it and reuse within your company. Or, you can donate it to a nonprofit organization that would get some use out of it.

If you need to dispose of your old electronics, then give ClearView IT a call at 866-326-7214. As an IT company, we deal with e-waste every day and take the proper precautions to recycle it in such a way that has minimal impact on the environment. Got an old busted computer that you don’t know what to do with? Don’t toss it in the trash. Give us a call today and we’ll take care of it for you!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Small Business Upgrade Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Apps IT Support Managed Service Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Networking Artificial Intelligence Workplace Strategy Windows Managed IT services Gadgets Bandwidth Business Technology Encryption Information WiFi App Virtualization Server Spam Remote Blockchain Mobile Device Management Apple Information Technology Gmail Office Two-factor Authentication Office 365 Budget Employee/Employer Relationship History BDR Health Conferencing Cybercrime Analytics Big Data Access Control Data Security Wi-Fi Compliance Cost Management Voice over Internet Protocol IT Management Remote Computing Training Vendor Document Management Help Desk Hacking Save Money Patch Management Hacker Employer-Employee Relationship Remote Monitoring Firewall Vendor Management Retail Hard Drive Alert Augmented Reality Word Hiring/Firing Mobile Office Outlook IBM Website Legal Password Managed Services Applications Data storage Vulnerabilities Search... BYOD Money Best Practice Project Management Customer Service Computing Data loss Unified Threat Management Websites iPhone Mobility Education Cortana Meetings Twitter Remote Workers User Content Filtering Law Enforcement Google Maps End of Support Data Breach Windows 7 Free Resource Scam Printer Router Chrome How To VPN The Internet of Things YouTube Windows 11 Update Travel Monitoring Virtual Reality Healthcare Mobile Computing Social Engineering Cryptocurrency Laptop Black Market Marketing Cleaning Paperless Office Running Cable Robot Antivirus Maintenance Storage Sports Social SaaS DDoS Virtual Machines Start Menu Computer Repair Drones Downloads Computer Care Chromebook Professional Services Disaster Vulnerability Automobile HIPAA Virtual Assistant Software as a Service Data Protection How To Lithium-ion battery Managed Services Provider Microchip Flexibility Virtual Private Network Processor Processors Current Events Hack Identity Theft Notifications Unified Communications Solutions Tech Terms Google Docs PowerPoint Images 101 Bluetooth Administration Multi-factor Authentication Integration Managed IT Display Digital Distributed Denial of Service Office Tips Presentation Wireless Technology Private Cloud eWaste Memory Specifications Taxes Saving Time IT Consultant Employees Avoiding Downtime Downtime Computers Customer Relationship Management Bitcoin Safety Politics Holidays Co-Managed IT Machine Learning Settings Telephone Entertainment Virtual Desktop Physical Security Cooperation Experience Solid State Drive Video Conferencing Excel Books Security Cameras Shopping Trends Mobile Technology Medical IT Touchscreen Staffing Emergency Point of Sale IP Address Computer Malfunction Paperless Language Customer Resource management Society Devices SQL Server PCI DSS Licensing Tip of the week Vendor Mangement Fileless Malware Samsung Reading Gig Economy Monitors Gamification Troubleshooting Humor Visible Light Communication Company Culture Shortcuts Azure Uninterrupted Power Supply Webcam Business Communications Telephone System Internet Service Provider Windows 8 Regulations Regulations Compliance Backup and Disaster Recovery Managed IT Service Business Mangement Directions Tablets Competition Relocation Displays Content Memes Advertising Desktop Recovery Be Proactive Human Resources Work/Life Balance Electronic Medical Records Net Neutrality Tech Support Accountants Financial Data Database Google Calendar LiFi Supercomputer Entrepreneur Application Risk Management Business Owner IT Virus Documents Workplace Strategies In Internet of Things Motion Sickness Business Intelligence Google Apps Health IT Equifax Telework Network Congestion Tactics Comparison Hard Drive Disposal Google Drive Hacks Reliable Computing Smartwatch Writing Username Communitications Microsoft 365 Securty Startup Knowledge Freedom of Information Corporate Profile Domains Procurement Navigation FinTech Addiction Television email scam Telephony Employer Employee Relationship Smart Technology Cabling Scalability CES Inbound Marketing IT Assessment Mobile Security Legislation Value News Tablet Administrator G Suite Text Messaging User Tip Supply Chain Management Proactive IT Evernote Organization Network Management Cyber security Mouse VoIP Tracking Bring Your Own Device Public Speaking Smart Devices Emails Streaming Media Fake News Web Server Proxy Server Electronic Payment Remote Working Music AI Service Level Agreement Trend Micro SharePoint Computing Infrastructure Digital Payment Keyboard Supply Chain Worker Hard Drives Digital Security Cameras Management Electronic Health Records Device security Transportation Wireless Headphones Phone System Wasting Time Microsoft Excel Access Botnet intranet Tech Micrsooft Going Green eCommerce Business Cards Modem Time Management Wireless Public Cloud Shortcut Rental Service Workplace Heating/Cooling Environment Videos Flash Error Surveillance Managing Costs Audit Windows XP Spyware Social Networking Telephone Systems Bookmark Business Growth Term Download Piracy SSID File Sharing Scams Media Development HTML Computer Accessories Employer/Employee Relationships Redundancy Google Wallet Nanotechnology Virtual Machine Cache Banking Browsers Messenger Google Play Reviews Deep Learning Upload Optimization Software License Unified Threat Management Workers Cables 2FA Social Network Teamwork Hosted Solution Screen Reader Hypervisor Printing CCTV Business Metrics Data Analysis Data Storage

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?