Major Healthcare Company

Our client, a healthcare provider with branches in multiple locations across the country, wanted consistency in technology services, as the lack of it was affecting their bottomline and service standards. Their dependence on multiple service providers across the US affected cost efficiency and service effectiveness. The big challenge was maintaining the same level of service …

Two Methods of Secure Data Destruction for Tapes

Does your company have volumes of backup tapes in your data center or offsite? If your company is at the end of a data retention period, or is ready to release or purge old archived data, you may come across hundreds or even thousands of tapes that contain important company data. Knowing what procedure is …

What does New Jersey’s New ITAD Law Mean for You?

It’s official – in New Jersey at least – but other jurisdictions will certainly follow. If your company has an office there, this new ITAD law applies to you. On January 11, 2016, New Jersey Governor Chris Christie signed a law removing the state’s restriction on mobile hard drive shredding; thereby giving New Jersey businesses …

What Every Company Can Learn from the Sony Hack

The past few weeks have been devastating to the Sony Corporation. Between leaked e-mails and actual threats, which resulted in a feature film being pulled from theaters and dozens of apologies, Sony has experienced a huge public relations nightmare. And if certain threats are to be believed, that is only the tip of the iceberg. …

Do You Know Where Your Shredded Hard Drives Go?

NAID, the National Association for Information Destruction, announced in November a change in their requirements for disposal of shredded or crushed hard drives. Recognizing that environmental stewardship and compliance are important to their members and to their corporate customers, NAID is now requiring that destroyed hard drive material must go to a facility that is …

Does Your Data Destruction Process Need to Comply with PCI?

In 2006, the five largest credit card companies formed the Payment Card Industry (PCI) Security Standards Council as a self-policing data security initiative designed to quell calls for government intervention prompted by the increasing number of large data breaches and identity theft. To that end, PCI quickly produced its Data Security Standards (PCI-DSS) to protect cardholder information, which is …

IRS Hack Emphasizes the Need for Data Security

Gone are the days of criminals being forced to dig through a person’s or company’s trash in order to steal confidential information. Now they have gone digital and everyone is being affected — even the Internal Revenue Service. Although our government uses technology designed to prevent virtual break-ins, the recent hack into the IRS proves …

ITAD and Education – Building a Brighter Future

Do you ever wonder who is buying your company’s computers, laptops, monitors and other devices after they are collected by your ITAD vendor and refurbished for resale? There are lots of markets for quality refurbished equipment around the world. One that is particularly important, in our opinion, is North American school systems. Most school systems …

Is Your Data Security Policy and Process Reasonable?

There are many data protection regulations, including the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA) of 1999 (Financial Modernization Act of 1999), and the European Data Protection Directive. These all have language regarding how an entity mustprotect personal information. Other regulations specify the destruction discarded personal information, as is the case with the Final Disposal …