Why Company’s Need To Address Improper Document & Data Disposal

data destruction and collection service

Secure document shredding specialists deal with physical and digital data on a regular bases. How we handle this data is important to ensure confidentially. Confidential shredding and data protection go hand in hand to prevent data breaches occurring.

It is widely known that employees and hackers are biggest cause of data breaches. There have being high profile hacking cases involving employees inappropriately clicking on links that  permits the hackers access to the organisations network and software system.

In order to have an appropriate confidential document and data disposal system in place, you should firstly contact a service provider whom has ample experience in the industry with a 100% clean track record (i.e. an occurrence of zero data breaches). Such a Data Service Provider will be able to answer all your queries and concerns regarding how to implement a secure and efficient document management system – all the way to end of life documents as well as in-house training of staff and policies and procedures. “At the end of the day, you are relying on employees to manage confidential documents in a secure and confidential manner.”


In order for one to have piece of mind, a training programme should be established for the induction and on-going training (in-house) for the organisations employees. When the employees understand the importance of efficient and accurate Data Management and Data Protection Legislation; it minimises the risk of a data breach.

When the data reaches its end of life, it needs to be securely disposed of. This is where a certified professional Data Processor like Security in Shredding provides (at the clients choice) onsite and/or offsite data destruction. A company such as Security in Shredding are specialists in the entire area of Data Management. They have an unblemished record and provide a professional, certified and recognised data destruction services.

In order for an organisation to maximise compliance in the workplace, proper appropriate disposal of information has to be made easily accessible for the employee.

Security in Shredding do not recommend placing a recycling bin in close proximity to a printer of copying machine for example as employees can easily discard the unwanted copies or data into the recycling bin. However, Security in Shredding can implement secure lockable consoles throughout the building in specific locations as requested by the organisation and also in close proximity to the copying or printer machines.

If you wish to have a conversation with any of our Data Consultant Specialists, you can pick up the phone and dial +67 24848 or email us at info@securityinshredding.com.

Hard Drive Must Be Destroyed To Ensure Data Destruction

harddrive destruction, Media Destruction, Confidential Shredding Service

All digital data is stored on a hard drive. Weather its stored locally (your own device) or on a cloud server, the data is stored on a hard drive. The device used to access this data be it a computer, laptop or tablet technology will become outdated or slow to use. When the time comes you may wish to get rid or sell the outdated device.

This is where the data risk lies. Before you sell the device you might have deleted all your local data from the device or even formatted the drive. This does not remove the data from the drive.

The fact is there are software programs designed to help thieves extract data even after data has been electronically destroyed.

At the same time, there are other concerns that make secure e-media and hard drive disposal a critical aspect of device security.

Current Storage Drive Trends:

Affordable.  Hard-drives and storage devices in desktop computers, laptops, servers, phones, USB thumb drives, printers, copiers, and other equipment have become widey available and affordable. In 2015, technology companies shipped more than 2.6 billion devices containing hard drives, according to IT research firm Gartner.

Internet of Things (IoT).  Digital data storage and usage is increasing in businesses and organisations. This increased usage means that more and more devices are connected to a network and can increase the risk of data breaches within a network. Protecting against these potential as data breaches are increasing.

Upgrading.  Electronics become obsolete (and are replaced) within three or four years – and that affects BYOD security and other safeguards. We live in a world where the number of mobile devices exceed the number of people in the world. When upgrading ensure that the older device is destroyed or the data storage device is destroyed.

Cybercrime.  Industry experts predict a continued boom in cybercrime. In America the terms of cost, the average consolidated total cost of a data breach rose 23% to $3.8 million in 2014 compared to the previous year. The 2015 Cost of Data Breach Study: Global Analysis from Ponemon also showed that the average global cost for each lost or stolen confidential record increased from a consolidated average of $145 to $154.

If it can happen in America it can happen anywhere else. Most of the applications you use will be developed globally and the breaches

Responsibility.  Data Protection is a corporate priority and responsibility. The Data Protection Commissioner is set up to ensure that businesses and organisations are protecting data correctly. The DPC also provides guideline on how to protect your business data from breaches. Guidelines can be read here: https://www.dataprotection.ie/docs/Guidance-Material-Menu-Page/m/219.htm

Secure document shredding and media destruction companies will provide secure method of data destruction. For more information please visit our site.


7 Questions Dealing With Sensitive/Personal Data


We live in a digital information age and how this information in gathered and viewed is through mobile or electronic devices. On site document shredding services will handle your paper data and also digital media to be destroyed securely.

Cyber liability, cyber security and information governance are terms that managers and directors are aware of due to high-profile data security breaches in recent events (“Panama papers”). Mason Hayes & Curran covers the critical questions these companies need to be asking.

In an increasingly interconnected world, with the expansion of the internet and development of the internet of things (IoT), there has been a corresponding increase in the vulnerability of information systems to attack.

The Cyber Security for Directors app with the Institute of Directors in Ireland has released an app to help heads of companies to understand their responsibilities regarding digital data security.

The app details the various types of cyber liability and cyber risks, while drawing together the key areas for directors to consider. It also outlines both proactive and reactive strategies to manage cyber security. The app is available on Android and iOS.

Technology has rapidly changed over the past 20 years and continues to grow. People’s reliance on digital devices both for storage and transmission of data, is making data breaches all the more damaging to organisations. How a mobile device operates both the front end (you) and back end(server) is not that transparent unless you have a good understanding of data transfers.

Knowing how this works is not essential but can make it easer to understand where the pitfalls lie within a device will benefit data security.

Where there is liability, there is a corresponding responsibility for that liability. As the duties of directors come increasingly under the microscope, it is clearly in the interests of directors to ensure that they understand their responsibilities in this area.

Below, we have outlined the key questions that directors should ask in relation to the collection and processing of data

1. Are we being transparent?

Data must be obtained fairly and the company must be transparent about the reason the data is being collected and the purpose for which the data will be used. Data must not then be put to a further incompatible use.

2. Do we have consent?

Consent is usually, but not always, required. If the information is non-sensitive, there can be implied consent. If the information gathered is sensitive (such as relating to an individual’s health, race, sex life, religious beliefs or trade union membership) then there must be explicit consent.

3. How long are we retaining data for?

Personal data can only be stored for as long as is necessary. There should be no retention of data ‘just in case’.

4. Are we collecting unnecessary data?

Data should only be collected if necessary. There are PR risks to any company if data is collected and stored unnecessarily.

5. Are we keeping the data secure?

You must have appropriate security measures to protect any data you are storing. Take into consideration the state of the technology you are using, the cost of implementation and the nature of the data and potential harm if a breach occurs.

6. Are we giving the data to third parties?

Are the third parties controllers or processors? In other words, on whose behalf will they use the data? If they are controllers, you will likely need consent for collection. If they are processors, special written contract terms are required.

7. Is the data leaving Europe?

If collected data remains within the European Economic Area (EEA), transfer issues do not arise. If the data is to be transferred outside the EEA then safeguards are required unless it is an approved country, eg Canada.

Check out www.mhc.ie for more information on Tech law.

Industrial paper shredding and media destruction are performed securely and confidentially by our team at Security In Shredding. For more information on our shredding or destruction services please contact us.


Data Breach Incidents in Educational Institutions


Shredding companies in Ireland are employed by educational institutions such as colleges and universities. These institutions are considered easy targets because of their open structure and long information retention periods.

Data Breaches have occurred in educational institutions ranging from lost laptops with sensitive information to targeted cyber-attacks and student identification cards. There are lots of other confidential data that is useful to attackers beyond payment data and student records; such as employee records, patient health information and scientific research data. Paper shredding or document shredding will reduce the risk of data breaches

Negative public exposure regarding a breach will have a negative impact on the reputation of the educational institution as well as the enormous knock on effect it would have regarding peoples data. In order to minimise the risk of any size of a data breach a Risk Reduction Strategy must be established.

Security in Shredding recommend a number of methods to include in a Risk Reduction Strategy;

  1. Data Security” has to become “second nature” within the colleges and universities from the top down. A Data Security Informational Event should be organised by the educational institutions to inform in a fun way, the students and employees the importance of data protection and data security. You could look upon this as a form of training – Knowledge is key.
  1. Make students and employees aware of the Data Security Policies and Procedures. Use means such as bulletin board, posters, newsletters etc.
  1. Regular risk assessments should be conduct on an on-going basis to identify where the gaps in information security exist and to establish and provide the solutions.
  1. Physical Security of all sensitive data is very important. Secure restricted authorised access for key personnel is an important measure to take to minimise the number of unauthorised access events.
  1. Maintain a “Clean Desk Policy” and place all sensitive paper records that is no-longer required in the lockable secure console that is provided by the contracted Data Destruction Service Provider such as Security in Shredding.
  1. Implement and utilise IT security tools such as firewalls, encryption, anti-virus software etc. It is important to protect both digital data and hard paper data.
  1. Establish and use a Document Management Process for the tracking of documents, generation, storage and destruction of documents.
  1. Use the professional secure recognised services of a registered data processor whom is an established Full Data Management Service Provider, such as Security in Shredding whom provides a complete secure chain of custody for your data needs.

If you would like to find out more about on site paper shredding and or off site paper shredding, contact Security in Shredding’s Data Consultant Team on 067 24848. They are glad to help.

4 Reasons Why A Paper Shredding Service Is Needed

Security In Shredding on site service

Paper shredding or document shredding is vital for protecting confidential and sensitive information / data. Most of us create and keep files with sensitive data; examples of which are bills, financial statements, marketing plans, employee files, and even delivery packages. Industrial shredding services are used by Government offices, non-commercial organizations, small and large businesses, and private citizens. These document shredding specialists will shred the documents securely beyond recognition.

1. Compliance With The Law

We all have the right to protection of personal information. The Data Protection Commissioner was put in place to enforce the obligations of businesses to protect data. Failure to comply, as there are laws that penalize improper disposal of documents with sensitive and confidential content. Businesses and Organizations that hold personal data but neglect to protect it face financial and legal consequences. Employers for example use paper shredding services to get rid of employee files which are no longer in use.

2. Positive Recycling Habit

Reducing the amount of paper used in an office is a good reduction method, while reduction also ensures that there is less of a chance data breaches from misplaced documents. The paper and documents shredded by a mobile paper shredding service will be put into a compost heap and reused at a later stage. This creates a good recycling method for your business and benefit the environment overall.

Data Protection, Paper Shredding, limeirck paper shredding

3. Preventing Identity Theft

Without shredding or destroying documents before disposing them, Identity theft is a possibility. All it takes is someone to simply look into a bin and grab what they can. With data now widely available is now more of an issue. Any data is far better shredded before disposal, all it takes is one piece of information in the wrong hands for a data breach to occur. These breaches are damaging for a business or organisations reputation.

clear out paper shredding

4. Eliminating Clutter & Hazards

Papers occupies space and cause clutter and increase the risks of fire. Once a document has served its purpose, offices need to constantly get rid of these papers as part of an organization-wide records management system. A paper shredding policy within an organisation for when to retain and destroy documents will help an employee to take care of the proper disposal and destruction of paper documents. However shredding services are available throughout Ireland and hiring a industrial paper shredding company is more cost effective.

Document shredding is important part of business practice. Mobile paper shredding services are available. Along with an awareness to data breaches and compliance with the law will ensure data security.

Security In Shredding provide high quality secure shredding services. They provide a Confidential Waste Disposal service both on site and off shredding available. If you are in the Limerick area then please visit our Limerick page for more details.

Top 5 Workplace Security Tips

secure data, workplace security

Workplace Security does not just mean a simple office shredder. Data Protection comes in many forms and is worth knowing these methods.

Data Protection is an important part of business practice. Paper shredders are often used to shred confidential documents. Your standard office shredder does not provide adequate security when shredding. An Industrial paper shredding service will provide a secure document destruction method for your business to use.

Along with paper shredding, there are many other forms of security you and your business can incorporate into everyday practice. We live in an age where data breaches are becoming more and more common which makes protecting this data ever more important. Digital data is now an area of protection and is often overlooked. These over sights is what cyber criminals will prey on and thus a Data Breach will occur causing severe damage to your business reputation.


Tip 1: Outsource your secure and confidential document destruction requirements to a certified professional Data Processor whom is reputable and reliable.

Tip 2: Enquire with your current data destruction provider about their e-media services. Hard drives and other types of media should either be shredded or crushed to ensure all the electronic data is securely destroyed and beyond reconstruction. If your service provider does not provide same, contact a member of our team whom are more than happy to help with your enquiry.

Tip 3: Choose a Service Provider that uses secure certified document destruction technologies, lockable consoles and/or locked 240 Litre wheelie bins, issue Data Processing Certificates and operate with a secure chain of custody.

Tip 4: Appoint a Data Compliance Officer in your Organisation whom is responsible for ensuring compliance regarding the correct management of both paper data and digital data within an organisation.

Tip 5: Conduct regular staff refresher training days regarding the importance of information security and the processes associated with same. Have training material prepared and on hand for induction training when new employees begin.


For more information on paper shredding and confidential document destruction in Ireland please visit: www.securityinshredding.com

Why Hard Drive Security Is Vital To Data Security

Data Destruction, Data Security, Digital DataHard drive destruction should also be incorporated with your document shredding process. Data Security comes in many forms and protecting your digital data is equally important as your paper data.The BBC ran a story warning that the only way to prevent cyber criminals from accessing information from old computers is to completely destroy hard drives. Formatting the drive does not erase the data completely. The warning came after a study showed thousands (22,000) of ‘deleted’ or ‘reformatted’ files were recovered from old computers purchased online or elsewhere.

The fact is there are software programs designed to help cyber criminals extract data even after it has been electronically erased from a hard drive.

(The data is not removed, it is allowing the data to be over written)

At the same time, there are other concerns that make secure electronic media and hard drive destruction a critical aspect of device security.

These are hard drive security concerns everyone should be wary of:

  • Volume.  There are more hard drives than ever in the workplace… in desktop computers, laptops, servers, phones, USB thumb drives, printers, copiers, and other equipment. In 2015, technology companies shipped more than 2.6 billion devices containing hard drives, according to US IT research firm Gartner.
  • Internet of Things (IoT).  According to one report, there are about 14 billion objects connected to the Internet today, and by 2020 industry analysts estimate the number will increase to anywhere from 20 billion to 100 billion. Many organisations are integrating IoT devices into the workplace to make work easier and more efficient, but employee IoT devices, which transmit and receive data, are an attack vector for cyber criminals. Safeguards must protect the business and the individual.
  • Upgrades.  Electronics become obsolete (and are replaced) within three or four years – and that affects BYOD security and other safeguards. Sensitive customer information is often stored on mobile devices, yet few employees take the necessary steps to keep corporate data on their devices secure. Many smart phones are not even password protected.
  • Data Protection Laws.  The Data Protection Act and industry guidelines require organisations to securely destroy confidential data at the end of its life. Failing to properly dispose of information could lead to a data breach, resulting in a fine of up to €100,000 being levied by the Information Commissioner’s Office.
  • Cybercrime.  Industry experts predict a continued boom in cybercrime. In terms of cost, the average consolidated total cost of a data breach rose 7% to €2.98 million in 2015 compared to the previous year. The 2015 Cost of Data Breach Study: UK from Ponemon also showed that the average global cost for each lost or stolen confidential record increased from a consolidated average of €120 to €130.
  • Responsibility.  Data stewardship is a corporate priority and responsibility. Security-driven workplace systems and controls help protect against external trends like data breaches and cybercrime. For example, a document management process protects confidential information from its creation to end of life. You will find that Businesses have never disposed of hard drives, USBs and other hardware that contain confidential information. A best practice: partner with a document destruction company that provides secure hard drive destruction as well as other security services and products for the workplace.

It’s important to understand device security and know your electronic media pitfalls and vulnerabilities to avoid being costly data breaches and a damage to your companies reputation.

Like, Comment & Share this story. Get involved in the conversation.

Responding To Data Breaches

Secure Paper Shredding Hard Drive Shredding WEEE Destruction

Paper Data;

Without a confidential document shredding service in place for shredding documents and media devices. Your company or business may become under scrutiny for not having these defensive measures in place to begin with.

It is common practice for a business to securely deal with paper documents in its handling, who can access it and how it is destroyed. Most businesses and organisations will incorporate a reputable paper shredding service and these processes are all above board.

Digital Data;

This trend is still widely used but not with the increase in use of mobile devices globally. Digital Data has become the preferred use of displaying data. How this information is used and the potential of this information being misused. Issues regarding digital use to be an “IT issue” but this is now no longer the case. Data Breaches and leaks have become more and more common due to lack of cyber protections in place. Lack of knowledge for one about cyber security is one factor that causes these issues.

Data Protection

A Data Protection strategy for digital and paper documents must be implemented throughout a business. There are governing bodies in place and bodies localised to your business and is worth knowing what procedures are in place for data protection. In Ireland the Data Protection Commissioner is a governing body directive from the EU.

“The office of the Data Protection Commissioner is established under the 1988 Data Protection Act.  The Data Protection Amendment Act, 2003, updated the legislation, implementing the provisions of EU Directive 95/46. The Acts set out the general principle that individuals should be in a position to control how data relating to them is used.”

The DPC provides guidelines for data protection and methods. If these measures are in place before a data breach occurs, it can save face for a business reputation and wont be scrutinised for not having these measurements in place to begin with.

The DPC site offers guidelines regarding Data Security both physically and digitally and the guidelines can be viewed here.


An Industrial Paper Shredding Service will provide you with credible Data Protection service please visit our site for more information:

Email us at info@securityinshredding.com

When To Disclose A Data Breach

iCloud security wake-up call, data brach

Secure document destruction methods must be in place to comply with Data Protection laws. A confidential document destruction service will benefit your business and its Data Protection.

Technology has brought us accessibility to a global market and small businesses have benefited greatly from this boom in technology. With a greater number of devices connected to an online service has also meant that a increase in the number of cyber attacks. Small businesses in particular are now being targeted.

A report from the Wall Street Journal has shown that small law firms are targeted the most due to the potential high profile client base they may have. That being said law firms do not usually hold social security information and the information obtained by hackers may not be beneficial to them.

Under American law, law firms are required to inform the public that a breach has occurred.

Data Protection Commissioner

Under Irish law the Data Protection commissioner has Data Breach guidelines for you and your business to follow. If a breach occurs it is paramount that the matter is dealt with swiftly to minimise damage. Data Protection Commissioner data breach guidelines can be found at the link below.


The document informs you on what steps to take if a breach has occurred. With this guide you can easily follow the steps needed to take and the information to provide when informing the Data Protection commissioner.

“Failure to comply with these obligations can result in a criminal prosecution with fines up to €5,000 indictment €250,000 per offence.” 

The document also state “Prevention is better than cure.” Setting up company policies and practices for handling of sensitive data should be implemented immediately. A reputable Shredding Service will also improve Data Security within your company. A shredding service will be able to provide an onsite shredding service. Confidential shredding is paramount to shredding services.

A reputable shredding service will comply with the protocols provided by the Data Protection Commissioner. It is a governing body to help protect your personal data and the data of others.

Please visit our site for more information on a Confidential Shredding Service:


Full Article Wall Street Journal Report:



The Future Of Data Security

Secure Paper Shredding Hard Drive Shredding WEEE Destruction

Document shredding service are a vital part of Data Protection. Shredding services in Ireland when a clear out shredding is needed. Offsite shredding services can be incorporated into everyday business to comply with Data Protection laws and improving Data Security.

Siliconrepublic an Irish based article site recently posted an interesting article regarding the future of Data security. Data Security is now more than ever vital for businesses to succeed. Technology has continuously improved and grown over the past number of years. The devices used has greatly helped smaller businesses compete with larger companies. With all this growth in technology aspects of the technology have being lost or information about it has become confusing and conflicting.

Data Security with technology will always be a continuous process. Between encryption, mobile devices and cyber warfare means that there will be no end to this process. Security experts can only protect against known breaches. Hackers have a small window of opportunity to work with.

Data Security Small Business

What does this mean for your business. For one, hiring a confidential shredding service that is also reputable and recognised by governing bodies. A shredding service must comply with Data Protection laws. A shredding service implemented within your business will ensure that you are protecting your data and improving data security.

Data Security is more than just electronic devices and digital data. Paper also contains data. Sensitive data in particular must be accessed and handled correctly. Who has access to this data and how this data is destroyed when no longer in use. A shredding service will handle these documents and devices and destroy them in a confidential and secure manor. ISO 9001:2008 is a good mark to look out for before hiring a shredding service for your business.

This type of data is what hackers and criminals try to achieve and will prey on human error to obtain this data. Dumpster diving will occur and if your documents are not shredded or only used a simple office shredder will not securely destroy data. Digital data can be accessed easily if the data is not encrypted or has not being wiped correctly. USB keys should be kept securely in your possession if they contain data. When shredding ask for the DIN level of shredding required to ensure secure data destruction.

Awareness to these methods is paramount to the success of your business and Data Security. If a data breach occurs then your business can be liable and receive a hefy penalty.

Read the full article here:


Details for a confdential shredding service please visit: