{"id":1532,"date":"2019-12-04T15:25:47","date_gmt":"2019-12-04T15:25:47","guid":{"rendered":"https:\/\/www.securityinshredding.com\/blog\/?p=1532"},"modified":"2019-12-04T15:28:19","modified_gmt":"2019-12-04T15:28:19","slug":"what-needs-to-be-securely-shredded","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/what-needs-to-be-securely-shredded\/","title":{"rendered":"What needs to be Securely Shredded?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" width=\"1280\" height=\"853\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper.jpg\" alt=\"Document Destruction\" class=\"wp-image-1493\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper.jpg 1280w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-300x200.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-1024x682.jpg 1024w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-768x512.jpg 768w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Shredded-Paper-450x300.jpg 450w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>No one questions the necessity of secure paper shredding for documents such as a person\u2019s financial, medical or legal details. However, they are not the only papers that require elimination in order to protect sensitive data. If you are having a company come to shred on site or off site, for your own sake and to get the most out of your document destruction service, it is important to know what documents specifically require shredding.<\/p>\n\n\n\n<h2>Receipts<\/h2>\n\n\n\n<p>Sometimes they will include part of your account numbers or\ncard numbers and even part of this information being leaked can give those out\nto do your business harm a leg up. <\/p>\n\n\n\n<h2>Job Submissions &amp; CVs <\/h2>\n\n\n\n<p>Countless businesses retain applications and CVs of individuals they did not employ at the time they applied, but would consider down the line should the need arise. When this document is eventually no longer needed, it should not be merely thrown in the bin. It requires shredding as it contains personal information.<\/p>\n\n\n\n<h2>Old Bank Statements &amp; Credit Card Bills <\/h2>\n\n\n\n<p>It is important to treat your company\u2019s financial information as delicately as you would anyone\u2019s personal financial information. When records are no longer required, it is time to shred.<\/p>\n\n\n\n<h2>Sensitive Information for Marketing &amp; Research on the Competition&nbsp; <\/h2>\n\n\n\n<p>This is information that you do not want to fall into the\nwrong hands. It could easily be misused should an employee\u2019s loyalties drift\nfrom the company.<\/p>\n\n\n\n<h2>Old Utility Bills<\/h2>\n\n\n\n<p>These bills have your account information on them therefore\nthey can be misused by those wishing to do your company harm. <\/p>\n\n\n\n<h2>Old Personnel Files<\/h2>\n\n\n\n<p>You are entrusted with very classified personal information about your workers. It makes sense to keep certain accounts of past employees as you may be requested for a reference however only keep the <a rel=\"noreferrer noopener\" aria-label=\"necessities  (opens in a new tab)\" href=\"https:\/\/www.naturalhr.com\/2018\/04\/12\/gdpr-how-long-must-you-keep-hr-records\/\" target=\"_blank\">necessities<\/a><em>.<\/em><\/p>\n\n\n\n<h2>Out of Date Service Contracts<\/h2>\n\n\n\n<p>Those that scam have discovered numerous methods of impersonating legitimate service providers. Allowing your old contracts to be disposed of incorrectly will give them another advantage.Always make use of your document destruction service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>No one questions the necessity of secure paper shredding for documents such as a person\u2019s financial, medical or legal details. However, they are not the only papers that require elimination in order to protect sensitive data. If you are having &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/what-needs-to-be-securely-shredded\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[57,66],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1532"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=1532"}],"version-history":[{"count":2,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions"}],"predecessor-version":[{"id":1534,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions\/1534"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=1532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=1532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=1532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}