Browse Definitions:

Reduce, reuse, recycle (R3)

What is reduce, reuse, recycle (R3)? 

Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.

R3 is sometimes called the waste hierarchy. Here's how that hierarchy might apply to computers:

  • The concept behind the first R, reduce, is that you should limit the number of purchases that you make in the first place. So, for example, you might limit your household to a single computer.
  • The concept behind the second R, reuse, is that you should reuse items as much as possible before replacing them. For example, it generally makes more environmental sense to update your computer rather than get rid of it and buy a new one. However, if you do replace your computer, you should ensure that it, or its components, are reused. Many charitable organizations welcome donations of second-hand computers.
  • The concept behind the third R, recycle, is that you should ensure that items or their components are put to some new purpose as much as possible. If your computer is not fit for reuse as is, you can donate it to one of several organizations, such as StRUT (Students Recycling Used Technology), which will refurbish it or recycle its components.

Sometimes a fourth R is added to the three basic ones, generally standing for either "rethink" or "recover." Rethink is sometimes added to the front of the hierarchy, meaning that we should consider our options and think about their impact on the environment. Recover, which is the last R, refers to the practice of putting waste products to use. For example, decomposing garbage produces methane gas (one of the greenhouse gases), which some landfill sites recover and burn for energy rather than letting it dissipate.

Learn More About IT:
Wikipedia has more information about R3 in its entry for the waste hierarchy.

This was last updated in November 2008

Join the conversation


Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

very nice


File Extensions and File Formats

Powered by:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.