Feeds

HP recyles PCs – for a price

Will take any vendor's kit

  • alert
  • submit to reddit

Hewlett Packard today kicks off a fee-based recycling scheme in the US that offers to take unwanted computers from any manufacturer.

The service, available via HP's Website, is part of the US vendor's Planet Partners Program.

The recycling scheme includes pickup and transportation for products such as PCs, printers, servers, monitors and scanners. Prices will range from $13 to $34, CNET reports.

According to HP, equipment will first be evaluated to see if it is fit to be donated to charities. The remaining equipment will be recycled in an environmentally-friendly way.

The launch comes as the European Commission mulls over a directive to make manufacturers pay to recycling unwanted electrical and electronic goods. The Waste of Electrical and Electronic equipment (WEEE) directive is expected to become law within the next 18 months, and will effect all companies that trade within Europe.

The European stage of HP's recycling service is expected to start on June 1.

According to figures from the National Safety Council, the amount of PCs deemed obsolete in 2002 will exceed the number of new PCs shipped. ®

Related Stories

EU inches toward PC recycling levy
E-Minister slams IT recycling claims

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.