{"id":1490,"date":"2019-11-13T12:08:45","date_gmt":"2019-11-13T12:08:45","guid":{"rendered":"https:\/\/www.securityinshredding.com\/blog\/?p=1490"},"modified":"2019-11-19T10:51:50","modified_gmt":"2019-11-19T10:51:50","slug":"4-steps-to-avoid-mistakes-in-physical-data-management","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/4-steps-to-avoid-mistakes-in-physical-data-management\/","title":{"rendered":"4 Steps to Avoid Mistakes in Physical Data Management"},"content":{"rendered":"\n<p>Recently we have been discussing in detail the risks associated with digital devices and cyber security however physical documentation needs to be secure too and there are some measures you can put in place to ensure this is paramount.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"632\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Files-1-1024x632.jpg\" alt=\"Files\" class=\"wp-image-1495\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Files-1-1024x632.jpg 1024w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Files-1-300x185.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Files-1-768x474.jpg 768w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Files-1-486x300.jpg 486w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Files-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nIndex your files<\/h2>\n\n\n\n<p>The majority of the files that your business will gather\nover time may never even be used or accessed after a certain length of time.\nHaving an indexing system in place will allow you to keep track of each and every\ndocument, when they are received and what purpose they serve for the company.\nIt will be convenient for finding and accessing documents efficiently. <em><\/em><\/p>\n\n\n\n<h2>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nRetention &amp; Disposal Schedules<\/h2>\n\n\n\n<p>Included with your indexing system you can schedule each documents lifespan. The recommended maximum time to keep most documentation is seven years however this will depend on the individual document. Therefore, when you index each file add an end date. It will allow you to quickly find anything you need. It will also assist you in removing the clutter of documents you no longer need and keep you compliant with the \u2018<a rel=\"noreferrer noopener\" aria-label=\"EU General Data Protection Regulation\u2019 (GDPR) (opens in a new tab)\" href=\"https:\/\/www.dpnetwork.org.uk\/gdpr-data-retention-guide\/\" target=\"_blank\">EU General Data Protection Regulation\u2019 (GDPR)<\/a><\/p>\n\n\n\n<h2>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nStorage<\/h2>\n\n\n\n<p>Use document storage boxes which are secure and locked. Taking\nall of these precautions and then having a filing cabinet which is open and\naccessible to anyone and everyone will just undermine any security measures you\nhave put in place. <\/p>\n\n\n\n<h2>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nShredding<\/h2>\n\n\n\n<p>Last but not least is your method of destruction once your documents have reached their use by date. You will need to decide what kind of service best suits you; onsite shredding or offsite shredding. Having your secure paper shredding service scheduled regularly can be convenient. Just contact us and we can discuss what option would suit you best. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"682\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-1024x682.jpg\" alt=\"Shredded Paper\" class=\"wp-image-1493\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-1024x682.jpg 1024w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-300x200.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-768x512.jpg 768w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-450x300.jpg 450w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Recently we have been discussing in detail the risks associated with digital devices and cyber security however physical documentation needs to be secure too and there are some measures you can put in place to ensure this is paramount. 1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/4-steps-to-avoid-mistakes-in-physical-data-management\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,71,25,24,3],"tags":[89],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1490"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=1490"}],"version-history":[{"count":4,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1490\/revisions"}],"predecessor-version":[{"id":1515,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1490\/revisions\/1515"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=1490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=1490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=1490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}