{"id":908,"date":"2016-10-14T16:49:12","date_gmt":"2016-10-14T16:49:12","guid":{"rendered":"http:\/\/www.securityinshredding.com\/blog\/?p=908"},"modified":"2018-06-27T13:46:39","modified_gmt":"2018-06-27T13:46:39","slug":"five-tips-for-data-protection-compliance","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/five-tips-for-data-protection-compliance\/","title":{"rendered":"Five tips for Data Protection Compliance"},"content":{"rendered":"<div id=\"attachment_909\" style=\"width: 285px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-909\" loading=\"lazy\" class=\"size-full wp-image-909\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/10\/paper-shredding-company-mobile-paper-shredding-paper-shredding-service.jpeg\" alt=\"Mobile paper shredding, onsite paper shredding service, onsite paper shredding, paper shredding service, confidential paper shredding service, offsite paper shredding service, onsite paper destruction service, document shredding services\" width=\"275\" height=\"183\" \/><p id=\"caption-attachment-909\" class=\"wp-caption-text\">Image source; lbenitez<\/p><\/div>\n<p>With the introduction of <a href=\"https:\/\/ec.europa.eu\/justice\/data-protection\/reform\/files\/regulation_oj_en.pdf\" rel=\"nofollow\">The General Data Protection Regulation<\/a> this year it is essential for Organisations to know that they are complying with the legislation. The first step in compliance is awareness and this article will give a brief overview of some tips to take into account to protect your Organisation. From data consent to third party data processing such as a <a href=\"https:\/\/www.securityinshredding.com\/\">confidential paper shredding service<\/a>, I aim to guide you in the right direction.<\/p>\n<h2>A. Consent<\/h2>\n<p>Always obtain the data subjects consent prior to holding or using their personal data. All forms both physical and web-based which are designed to gather personal information should contain a statement detailing what the information is to be used for.<\/p>\n<h2>B. Sensitive data<\/h2>\n<p>When dealing with sensitive personal (race, political opinion, mental health etc.) data additional measures should be in place to ensure the security of the data. When this data has reached its end of life always securely destroy the data through a paper shredding service.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-128\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2015\/01\/Security-in-Shredding-Logo.-2014.-300x147.png\" alt=\"Paper shredding Dublin, paper shredding Cork, Paper shredding Galway, Paper shredding Limerick, offsite paper shredding service Ireland, off site paper shredding service Ireland, Off site shredding service Ireland, mobile paper shredding Ireland\" width=\"300\" height=\"147\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2015\/01\/Security-in-Shredding-Logo.-2014.-300x147.png 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2015\/01\/Security-in-Shredding-Logo.-2014.-1024x502.png 1024w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2015\/01\/Security-in-Shredding-Logo.-2014.-500x245.png 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2>C. Individual rights<\/h2>\n<p>Be aware of individual\u2019s rights when dealing with information held upon them. If preparing reports always be aware that individuals have the right to see all personal data held about them which also includes emails and informal notes that have not gone through your document shredding service in place.<\/p>\n<h2>D. Review files<\/h2>\n<p>Data should only be retained when and where absolutely necessary. Securely disposal of the data once it is no longer required through an onsite paper shredding service and\/or an offsite shredding service with a data processing firm and under contract. Establish and record regular reviews of the data in your control.<\/p>\n<h2>E. <a href=\"https:\/\/www.securityinshredding.com\/\">Secure disposal of records<\/a><\/h2>\n<p>When discarding waste data in paper format it is imperative to treat them confidentially. Never discard end of life data with conventional recycling streams. Waste paper data is not the same as general sorted office waste (SOW) before it is destroyed due to the fines and penalties attached to them for a breach. Always hire a professional paper shredding company to secure shred all documents and receive a certificate of data processing. The same applies to waste electronic data carriers such as hard-drives, always securely destroy them through a hard drive shredding service.<\/p>\n<p>For any advice upon data protection and making your Organisation compliant please do not hesitate to contact one of our team through our website www.securityinshredding.com.<\/p>\n<p>You can also follow us on<br \/>\n<a href=\"https:\/\/www.linkedin.com\/company\/all-security-mobile-shredding-ltd\">Twitter<\/a>, <a href=\"https:\/\/www.youtube.com\/user\/SecurityInShredding\">YouTube<\/a>, <a href=\"https:\/\/www.linkedin.com\/company\/all-security-mobile-shredding-ltd\">LinkedIn<\/a>, <a href=\"https:\/\/plus.google.com\/+Securityinshredding\">Google+<\/a><\/p>\n<p><span style=\"border-radius: 2px; text-indent: 20px; width: auto; padding: 0px 4px 0px 0px; text-align: center; font: bold 11px\/20px 'Helvetica Neue',Helvetica,sans-serif; color: #ffffff; background: #bd081c no-repeat scroll 3px 50% \/ 14px 14px; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer;\">Save<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the introduction of The General Data Protection Regulation this year it is essential for Organisations to know that they are complying with the legislation. The first step in compliance is awareness and this article will give a brief overview &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/five-tips-for-data-protection-compliance\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,8,71,5],"tags":[111,65,77,112,113,110,45,48],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/908"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=908"}],"version-history":[{"count":6,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/908\/revisions"}],"predecessor-version":[{"id":1222,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/908\/revisions\/1222"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}