What To Keep & What To Shred: Document Retention Policy

Data Retention & data destruction

At Security In Shredding, document shredding is done with confidentiality and security is paramount when carrying out data destruction service. Data breaches occur when people are negligent or not aware of a breach. The most recent high profile story being the “Panama Papers” leak.

The Panama Papers is the latest mega data breach where millions of confidential documents from a Panamanian law firm were leaked, exposing offshore bank accounts – and possibly tax havens – for wealthy clients.

In light of this recent breach “I think we need to change the fundamental design of the way each and every document is created and managed,” –  commented Bill Anderson of cyber security company OptioLabs, in a cnet.com story about the Panama Papers.

While there are many aspects to data security, a sound document retention policy is one of the most important. Knowing what confidential documents to keep and which ones to permanently destroy should be of concern to everyone. Maintaining a clean desk policy will also help minimise the risk of confidential documents getting lost with other data.

This high profile case may sound like it won’t happen to you but the chances are that the data breach occurred by improper use or destruction of a data. All it takes is one wrong move for all your data to be accessed.

Below are some document retention policy guidelines to help keep your information secure.

  • Information Audits: Use audits to identify the types of documents the business produces, and to create an inventory and keep it updated.
  • How Long To Keep Tax Records? There are two parts to data retention: how long documents will be useful to the business, and how long they must be retained based on government and industry requirements. Checking with Revenue.ie on how long to retain your tax returns.
  • Fines – either way: While it’s law to keep certain documents, if you retain a record for too long you might also expose yourself to litigation risks and fines. Like most privacy laws, Data Protection Act compliance stipulates the record must be securely disposed of when the official retention period is over.
  • Emails: Records are paper files, digital documents, and correspondence including emails. According to wired.com, the Panama Papers leak included more than 4.8 million emails (as well as 3 million database files and 2.1 million PDF’s). If emails aren’t part of an important business or legal use or not subject to regulatory compliance, delete them within the appropriate time frame.
  • Controlled Access: Index all documents for easy retrieval. Store in a secure, locked location and/or in a password protected file. Control who can access sensitive documents and logging when this information has being accessed. Storing unwanted documents increases the risk of a Data Breach and adds to clutter.
  • Secure disposal: The only acceptable way to discard paper or digital documents when they are no longer needed is to completely destroy them. Industrial Shredding companies can dispose large quantity of documents, and outsourcing eliminates risk. Partner with a reputable shredding company that has secure chain of custody processes for information destruction. A Certificate of Destruction will document compliance and should be issued after every shred.

At Security In Shredding data security is equally important as confidential data destruction. An on site service or off site service is available throughout Ireland. Please visit our site for more information.

Data Breach Incidents in Educational Institutions

paper-vs-digital

Shredding companies in Ireland are employed by educational institutions such as colleges and universities. These institutions are considered easy targets because of their open structure and long information retention periods.

Data Breaches have occurred in educational institutions ranging from lost laptops with sensitive information to targeted cyber-attacks and student identification cards. There are lots of other confidential data that is useful to attackers beyond payment data and student records; such as employee records, patient health information and scientific research data. Paper shredding or document shredding will reduce the risk of data breaches

Negative public exposure regarding a breach will have a negative impact on the reputation of the educational institution as well as the enormous knock on effect it would have regarding peoples data. In order to minimise the risk of any size of a data breach a Risk Reduction Strategy must be established.

Security in Shredding recommend a number of methods to include in a Risk Reduction Strategy;

  1. Data Security” has to become “second nature” within the colleges and universities from the top down. A Data Security Informational Event should be organised by the educational institutions to inform in a fun way, the students and employees the importance of data protection and data security. You could look upon this as a form of training – Knowledge is key.
  1. Make students and employees aware of the Data Security Policies and Procedures. Use means such as bulletin board, posters, newsletters etc.
  1. Regular risk assessments should be conduct on an on-going basis to identify where the gaps in information security exist and to establish and provide the solutions.
  1. Physical Security of all sensitive data is very important. Secure restricted authorised access for key personnel is an important measure to take to minimise the number of unauthorised access events.
  1. Maintain a “Clean Desk Policy” and place all sensitive paper records that is no-longer required in the lockable secure console that is provided by the contracted Data Destruction Service Provider such as Security in Shredding.
  1. Implement and utilise IT security tools such as firewalls, encryption, anti-virus software etc. It is important to protect both digital data and hard paper data.
  1. Establish and use a Document Management Process for the tracking of documents, generation, storage and destruction of documents.
  1. Use the professional secure recognised services of a registered data processor whom is an established Full Data Management Service Provider, such as Security in Shredding whom provides a complete secure chain of custody for your data needs.

If you would like to find out more about on site paper shredding and or off site paper shredding, contact Security in Shredding’s Data Consultant Team on 067 24848. They are glad to help.

4 Reasons Why A Paper Shredding Service Is Needed

Security In Shredding on site service

Paper shredding or document shredding is vital for protecting confidential and sensitive information / data. Most of us create and keep files with sensitive data; examples of which are bills, financial statements, marketing plans, employee files, and even delivery packages. Industrial shredding services are used by Government offices, non-commercial organizations, small and large businesses, and private citizens. These document shredding specialists will shred the documents securely beyond recognition.

1. Compliance With The Law

We all have the right to protection of personal information. The Data Protection Commissioner was put in place to enforce the obligations of businesses to protect data. Failure to comply, as there are laws that penalize improper disposal of documents with sensitive and confidential content. Businesses and Organizations that hold personal data but neglect to protect it face financial and legal consequences. Employers for example use paper shredding services to get rid of employee files which are no longer in use.

2. Positive Recycling Habit

Reducing the amount of paper used in an office is a good reduction method, while reduction also ensures that there is less of a chance data breaches from misplaced documents. The paper and documents shredded by a mobile paper shredding service will be put into a compost heap and reused at a later stage. This creates a good recycling method for your business and benefit the environment overall.

Data Protection, Paper Shredding, limeirck paper shredding

3. Preventing Identity Theft

Without shredding or destroying documents before disposing them, Identity theft is a possibility. All it takes is someone to simply look into a bin and grab what they can. With data now widely available is now more of an issue. Any data is far better shredded before disposal, all it takes is one piece of information in the wrong hands for a data breach to occur. These breaches are damaging for a business or organisations reputation.

clear out paper shredding

4. Eliminating Clutter & Hazards

Papers occupies space and cause clutter and increase the risks of fire. Once a document has served its purpose, offices need to constantly get rid of these papers as part of an organization-wide records management system. A paper shredding policy within an organisation for when to retain and destroy documents will help an employee to take care of the proper disposal and destruction of paper documents. However shredding services are available throughout Ireland and hiring a industrial paper shredding company is more cost effective.

Document shredding is important part of business practice. Mobile paper shredding services are available. Along with an awareness to data breaches and compliance with the law will ensure data security.

Security In Shredding provide high quality secure shredding services. They provide a Confidential Waste Disposal service both on site and off shredding available. If you are in the Limerick area then please visit our Limerick page for more details.

5 Best Practises Regarding Document Management

paper-vs-digital

Paper shredding is important practice for businesses in Ireland. A confidential shredding specialist will remove unwanted document and destroy them in a secure manner while also help remove clutter from the office.

Offices should avoid having files, documents and detailed paper information scattered on top of filing cabinets and desks. In every organisation regardless in size, it has a responsibility to manage the information it handles in a secure and organized way. It should be a priority or each and every organisation to minimise the risk of a data breach;

Security in Shredding have outlined below the top five best practises for Document Management whom they encourage every business to follow;

  1. Indexing & Filing:

    An organised document management system has an effective and current index system based on the file contents and compliance requirements. The organisation should manages file creation in an efficient manner whereby no duplication or irrelevant copies are filed and records retention periods are clearly labelled on the files or storage boxes. Security in Shredding would recommend implementing an electronic file tracking system to manage where documents are in their life cycle, and show whether documents are active, archived, or ready for disposal.

  2. Secure Storage:

    Sensitive data stored on hard paper data and e-data should be securely stored and protected either in locked cabinets or a locked room. Many organisations produce a substantial volume of paper as a result from employees conducting their duties, making notes, printing of emails, discussion notes, to do lists – the list goes on. It is just as vital that this paper production is securely stored in lockable consoles when the employee has not longer got a requirement for it. Security in Shredding encourage organisations to implement a Shred-all policy whereby all paper produced in the offices that is no longer required is placed in the secure consoles for destruction at a scheduled date.

  1. Limited Access:

    It is vitally important that limited access is maintained with hand-picked specific employees having the secure access to the file sharing system the organisation has in place. Security in Shredding recommend using a system that uses authentication and password protection to control access and track and manage who can view them.

  2. Retention and Destruction Schedule:

    All documents and files should be clearly labelled by what they contain, retention period, and end of life date. When documents reach their end of life they must be securely destroyed. Security in Shredding recommend outsourcing the destruction of all or any sensitive data to a certified professional whom are registered data processors. Also the Data Destruction Service Provider should provide a chain of custody from the time the material is placed in the secure lockable consoles to the secure removal of documents for shredding. The service provider should be able to provide certification for their ability to shred the sensitive confidential data to Shred No. 6 of the EN 15713 European Shredding Standard. A Data Processing Certificate should be issued post every service delivery.

  1. Staff Training:

    It is imperative that all employees are trained and fully understand the importance of Data Protection. Security in Shredding recommend every organisation to employee a Data Compliance Officer to enforce information security policy and ensure all aspects of Data Protection Legislation are adhered to.

If anyone has any queries regarding any of the important points illustrated, please do not hesitate to contact us to speak to our Data Consultants.

Our confidential document shredding services are available throughout Ireland. We regularly operate in the Limerick, Galway, Dublin and Cork areas.

Please visit our site for more information: https://www.securityinshredding.com/

10 Threats Against Data Security For Small Business

privacy-data-security

Bigger companies incorporate off site data destruction practices, small businesses often don’t have the financial resources to house large scale IT departments, purchase the latest and greatest technology or invest into data security.

Many a cash-strapped small business finds itself operating its critical systems on computers that are old, slow and often times insecure. This leaves them susceptible to a wide array of security pitfalls and privacy threats, including data leaks and identity theft.

Fortunately, beefing up your security doesn’t necessarily mean draining your bank account. There are many inexpensive options to improve the security of your small business and protect your information.

Geoffrey Arone, serial entrepreneur and co-founder of SafetyWeb, gave his take on 10 very real threats facing small businesses and how they can be addressed in ways that are free or inexpensive.

1. Data Breach Resulting From Poor Networking Choices
Enterprise-level networking choices that are found in large IT departments around the world carry costs that price small or medium businesses out of the market. SMBs that have networks often use networking devices targeted at home users. Some may forgo the use of routers at all, plugging directly into the internet.

Business owners can block most threats by using a quality router, like a NETGEAR or Buffalo brand router, and making sure to change the router password from the default to something more secure.

2. Data Breach Resulting From Improper Shredding Practices
Trivial as it may seem, dumpster diving identity thieves target businesses that throw out paperwork without shredding it. Your small office shredders will NOT suffice for a secure document destruction, but a industrial paper shredding company is a wise investment if private or sensitive information is printed and shredded daily.

3. Identity Theft Resulting From Public Databases
Individuals, especially business owners, often publish lots of information about themselves in public databases. Businesses are registered with governments, telephone numbers are in the phone book, and many individuals have social media profiles with their address and date of birth. Many identity thieves can use information obtained across various public forums to construct a complete identity.

4. Identity Theft Resulting From Using A Personal Name Instead Of Filing An OA
Sole-proprietors that have not registered a business name to receive “operating as” designation are at a far higher risk of identity theft due to their personal name, rather than their business name, being published publicly.

5. Tax Records Theft Around Tax Time
Businesses should ensure that tax returns are dropped off at the post office and refunds are collected promptly from the mailbox. Identity thieves often steal tax returns from an outbox or mailbox.

6. Bank Fraud Due To Gap In Protection Or Monitoring
Business owners know that it is vital to balance their accounts every month to ensure that checks are not being written out of business funds by embezzlers, but many businesses rarely, if ever, check what kind of credit accounts have been opened under the business name. Monitoring services like myID.com can alert business owners when new credit accounts are opened fraudulently.

7. Poor E-mailing Standards
Many businesses treat e-mails as confidential communications, but this is far from the case. They are available to a number of people other than the recipient. It’s more appropriate to treat e-mails as postcards, rather than sealed letters.

8. Failing To Choose A Secure Password
In fact, many security experts are recommending the use of a pass phrase, rather than a pass word. Pass phrases are several words long, at least three, and are far more secure than passwords. A pass phrase like “Friday blue jeans” can be typed far quicker than a complicated password, and it doesn’t need to be written down on a post-it. The length of a password increases security.

9. Not Securing New Computers Or Hard Drives
Businesses that had their IT system professionally installed may opt to upgrade a computer or two by themselves. This is strongly discouraged on a business network, as new computers must be professionally secured or else they pose a serious threat and an entry point for hackers.

10. Social Engineering
Social engineers are individuals that call and claim they are from another organization. They may even claim to be with a firm that a business owner does business with. If someone you do not know calls on the phone, be sure that it is the person you think it is before revealing passwords or confidential information.

For more information on a paper shredding or confidential document shredding service in the Cork, Limerick, Galway and Dublin area, please visit: https://www.securityinshredding.com/

Like, Subscribe and Follow us on Twitter: @Securityinshred

Addressing Incorrect Data Destruction Habits

Data Protection, Paper Shredding, limeirck paper shredding

Shredding confidential paper in a business must be done and there are legislations in place to protect against data breaches. Failure to enforce these laws or inadequate data protection in place by a business will result in a hefty fine of up €100,000.

Human error is is arguably the biggest cause of data breaches are caused by employees and contractors. Human error is not solely to blame. Even high profile hacking cases involve employees inappropriately clicking on links and allowing the bad guys in. It is quite easy with a little bit of know how you can be easily tricked and baited into clicking a malicious link that will cause a data breach.

When it comes to proper data destruction, or avoiding data breaches due to improper destruction of data and confidential information. It comes down to employees knowing the dangers and pitfalls of potential data breaches within the office. Despite any amount of training, however, there is one lesson too many data controllers have learned the hard way. In order to maximize compliance, proper disposal of information has to be easy for the employee.

Some organisations might require employees to use a shredder in the copy room which is not easy. So much so that it is not even reasonable to think they will consistently do it. Whether because of carelessness, workload issues, pressures outside work, or laziness, compliance failure is inevitable. Nor is it reasonable to give employees the discretion on what is destroyed or options on where information-bearing media should go. Whenever a recycling bin is next to a shred bin, it is easy to find confidential information in the recycling bin. Making this process as easy as possible for our customers is recommended. We clearly have each console labelled so our customers know exactly what we can and can’t take in our locked consoles. We provide staff awareness days to help businesses improve their data security.

Data Protection, Secure Paper Shredding

The same goes for IT asset disposal. Since employees are less likely to toss out computers, it can be less of an issue. However, leaving the decision to the IT department instead of dictating the procedure through security and compliance can cause a problem. With electronic storage devices there is no true way to destroy the data using software. A physical destruction of the device must be done to ensure data destruction.

Educate and Awareness for you and your employees benefits with proper data destruction. Contacting a Secure Confidential document destruction service to incorporate into the business practice will improve your data security and destruction.

For more information on a secure document destruction service in Ireland, then please visit: https://www.securityinshredding.com/ or

please like, share and follow us on Twitter: @Securityinshred

Adopting A Secure Document Shredding Strategy For Business

 confidential shredding, clean desk policy

A secure document shredding policy is integral to any business and protecting customer data is legislative. The Data Protection Commissioner implements the provisions of EU Directive 95/46. Not only are these regulations that require businesses to shred documents securely, but it is also part of running a business and maintaining a positive business reputation.

Why Businesses Need To Securely Destroy Documents?

Every day, companies create paper documents and these documents require shredding. Practically any document that contains data and especially sensitive data needs to be shredded. In particular data containing the following would be regarded as sensitive data:

  • Person’s Name
  • Address
  • contact information
  • Account Details
  • Credit Card Details
  • Budget Reports
  • Medical Reports
  • Payroll information
  • Legal contracts
  • Receipt Information

This is a snippet of what data to shred any and all documents should be securely destroyed by a secure document shredding service.

How This Data Can Be Used Against You?

Not only is forgery and fraud a major issue but also there is of course the potential for bad publicity, loss of customers and lawsuits to name but a few of the dangers. Identity theft is a common issue with data breaches. Criminals will use this data to either make purchases or obtain more data under the pretence of your name.
It is important that all businesses shred or destroy certain sensitive documents. Law enforcement, legal industries, government agencies, banks, health care providers, insurance providers, financial brokers, and real estate are just a few industries where managing paperwork is crucial.

How To Manage Business Documents Safely & Effectively?

A detailed security policy for every type of document your business handles is essential and employees need to know these policies before starting work.

For example:

What are the shredding requirements for the various document types that your company frequently uses? What are employees allowed to photocopy? Incorporating a reputable Confidential Shredding Company that has a good track record. While also training employees about the correct method of destroying sensitive documents and ensuring correct secure policies about how long to hold and when to destroy documents.  Access to company records should be controlled and restricted to a small number of trusted individuals and there should be rules relating to access of these records. A notification or logging system can also be in place to account for what and where data is being used.

At Security In Shredding we operate throughout Ireland and frequently do business in areas of Dublin, Galway, Limerick, Cork and Waterford areas.

For a more information on Shredding confidential paper Services & data destruction service, please visit: www.securityinshredding.com

Like, Subscribe to our Twitter: @Securityinshred

How to incorporate Recycling into Data Management Security

Improve Office Environment Usage

Many organisations are unfamiliar with how to incorporate methods of recycling in the workplace whilst maintaining Data Security. Shredding companies in Ireland can provide you with a recycling service for your business.

Security in Shredding recommend to have the following;

  • All open and unsecured paper recycling bins in the workplace replaced with Security in Shredding’s lockable office friendly consoles. The benefit of using these consoles is that you know your confidential documents are safe from prying hands and eyes. Your documents cannot be retrieved as the consoles have bevelled slots.
  • Each and every desk should have a specific paper waste bin that is used only for office paper waste. At the end of each employee’s working day, the employee takes the waste paper bin to the lockable console and empties the contents into the console. If an Organisation implements and enforces this process, it will greatly reduce the risk of a possible data breach. As many data breached are as a result of human error, the employer is not relying on the employees to distinguish the confidential paper from the non-confidential paper. This Policy is call a Shred-All Policy.
  • A service provider that employees security-vetted staff to conduct service deliveries. The client has assurance that the personnel whom handle the confidential documents have received extensive security awareness training and have a great understanding of Data Protection Legislation.
  • A service provider whom provides its onsite and offsite shredding services via shredding technologies that are certified to Shred No. 6 of the EN 15713 shredding standard. The benefit of having a Data Destruction Service Provider whom is certified to this shredding standard is that you have total peace of mind and you know that the shredding service is off its highest level.
  • The vast majority of organisations are Data Controllers. Therefore these Data Controllers should most certainly use a Data Processor to processes its confidential data when I reaches its end of life. A Data Processor should issue its client a Data Processing Certificate detailing the quantity of material destroyed, the material type, date of destruction, name and location of the client and the shred number and shredding standard the material was shredded to. The certificate is proof of destruction and allows the client to keep track of data destruction for compliance and other data management purposes.
  • Security in Shredding transport all destroyed paper material to licensed and permitted recycling facilities. The paper material is sent to paper mills. Printing ink is removed and the material is turned into pulp and it is then used to manufacture new paper products. An interesting fact; one tonne of recycled paper saves 17 mature trees and reduces carbon emissions.

By implementing these changes you are contributing to making your organisation greener and whilst increasing the level of data security. For more information on a paper / document shredding service please visit our site for more information.

www.securityinshredding.com 

Clear-out Shredding & File Purging

clear out paper shredding

We all know the saying “A clear space a clear mind” and clutter builds quite easily without you realising. A document clear-out of old documents is available. At Security In Shredding we offer an excellent clear-out shredding service both on site and off site shredding is available.

De cluttering your office space will give many positive benefits for yourself and work colleagues. For a number of reasons listed below:

  1.  Gives back your space

Paper documents take up space. While you might only leave few documents lying around, over time these build up into large piles. This takes away space in the office that could be used for a better purpose. If the documents are in a pile this could mean that a) the documents served their purpose and no longer in use and b) its and not an organised pile. If this is the case then it is time to hire a secure shredding service.

  1. Eliminates dust and mites

Any item left idle for an extended period of time will gather dust. Dust presents its own problems. For some people dust can cause asthma flare ups. There can be other factors that cause asthma flare ups but with a clear space will make it easier to clean the area and prevent dust from gathering.

With dust comes dust mites. These bugs are microscopic to the eye and are everywhere. Not necessarily representative of a dirty office but can cause irritation to people with asthma.

  1. Large quantity removal in one easy process

We receive a massive amount of documents over time. Be it brochures, newsletters, advertisements and or your own documents on top of that. Most likely these will get recycled but the documents that are left around that had a purpose and were kept as reference. After a while we can forget what was left where and newer documents get put on top of the old.

There is a potential here of sensitive data getting mixed in with these documents. Chances are it won’t happen but in case there are confidential documents then hiring a on site secure shredding service will remove all your documents in a large quantity.

At Security In Shredding we regularly preform clear-out shredding of documents and confidential documents. With all this new space available there will be “so much room for activities.

Please visit our site and contact our team for a consultation about clear out shredding. Please like and subscribe to our social media. Join the conversation and

Follow us on Twitter here: @SecurityInShred

Common Mistakes Businesses Do When Maintaining Security Of Sensitive Data

Answer;              

Not properly classifying the sensitive information, managing it accordingly and in turn protecting it against current threats.

 

Secure Paper Shredding Hard Drive Shredding WEEE Destruction

 

As you read this from your mobile, tablet and or computer you are viewing data digitally. Paper shredding in Ireland and industrial paper shredding services offer data protection services for said devices. Knowing technology pitfalls is a massive part to data protection while also knowing how and when to share your digital information must also be considered.

There are three critical points to the proper protection of sensitive data.

  1. Data Classification

In line with European Standards; Companies must understand what data needs to be protected and create a Data Classification Policy. This policy in turn will classify data based on sensitivity. At a minimum three levels of data classification are needed.

    • Restricted: This information requires very high protection, Unauthorised dissemination would have serious terminal consequences for the company and infringe trade confidentiality obligations, contracts or laws. It is essential that the confidentiality of personal data is maintained. Otherwise there is a risk to the health and safety or personal freedom of the affected persons.

All data that reaches its end of life should be destroyed to a minimum of Shred No.6 of EN 15713 to ensure destruction beyond reconstruction.

    • Confidential or Private: This is moderately sensitive data that would cause a moderate risk to the company and could infringe legal obligations or laws if compromised. Access is internal to the company or department that owns the data. There would otherwise be a considerable risk to the social standing and financial situation of the affected persons.

All data that reaches its end of life should be destroyed to a minimum of Shred No.4 of EN 15713.

    • Public: This is non-sensitive data that would cause little or no risk to the company if accessed. Access is loosely, or not, controlled.

All data that reaches its end of life should be destroyed to a minimum of Shred No.3 of EN 15713.

 

  1. Encryption – All Organisations should have an encryption strategy in place to ensure all staff are aware and capable of utilising it correctly. The essential element to a good encryption strategy is to use strong encryption and detailed key management.

 

  1. Cloud Misuse – Essentially cloud storage translates to storing your data on someone else’s computer. When it is uploaded, the control over it is no longer only yours. Encryption should always be implemented prior to uploading to the Cloud. It is always advisable to read through the cloud providers policies with regard to handling data.

 

The most important thing for business is to be aware of the technology pitfalls. Secure document destruction in Ireland and its data protection laws are different to other countries. While the laws may be different country to country, the method of data breaches are usually the same. The more you know the better you can protect yourself and business from data breaches.

For more information on a secure document shredding service in the Dublin, Cork, Limerick or Galway area please visit: www.securityinshredding.com

Feel free to join in on the conversation @securityinshred