Browse Definitions :
Definition

precycling

Precycling is the practice of avoiding the acquisition of unnecessary items that will eventually have to be recycled or dealt with as waste. 

Examples of precycling include:

  • Limiting purchases to things that you need.
  • Delaying purchases that aren't urgently needed.
  • Buying in bulk to avoid extra packaging. 
  • Selecting products that will last. 
  • Sharing items rather than buying individually.

Precycling is perhaps even more effective in a business setting than it is in the home. In a hot desking environment, for example, employees outnumber workstations, which leads to lower overhead costs. Furthermore, the BYOD (bring your own device) trend also means that employees often use their own computers at work, rather than requiring one for the office and one for home. Limiting printing and using digital formats rather than hard copies is another way to save resources and money. 

Many business purchases can be delayed. Not so long ago, for example, a three-year-old computer was considered obsolete. However, recent advances in technology mean that computers have a much longer effective life span and don't need to be replaced so often. 

Precycling is an opposing concept to planned obsolescence, the practice of designing and developing products that will be functional or useful for a limited time period, as a means of promoting consumption. 

 

See also: upcycling, downcycling

This was last updated in December 2012

Continue Reading About precycling

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close