December 27, 2017

Why a Shred-it all Policy Makes Sense

Did you know that 25% of data breaches happen inside of businesses due to simple human error?1

Documents should be protected from the moment they are created until the time they are no longer needed. Your workplace is full of confidential paperwork that could cause real problems if it gets into the wrong hands. One of the most effective ways to prevent security breaches from either inside or outside an organization is by implementing a Shred-it All Policy. A Shred-it All Policy will make sure that all documents are fully and securely destroyed on a regular basis.

Benefits of a Shred-it All Policy:

  • Strengthens information privacy and confidentiality
  • Simplifies document disposal for everyone
  • Employees no longer need to decide what information is or isn’t confidential
  • Reduces the risk of information breaches
  • Improves compliance with privacy rules and regulations
  • Better protects proprietary, customer and other business information
  • All paper in a Shred-it® container is securely shredded and recycled

8 simple steps to get you started. 

  1. Document the flow of confidential information in your company.
  2. Start with a “work in progress” period to help employees adjust and get used to the new procedures.
  3. Be sure the process you put in place is easy to enforce.
  4. Train staff in secure document destruction procedures. Educating your employees about the importance of document disposal helps to protect them as well.
  5. Conduct regular security assessments to help identify vulnerable areas and potential security risks.
  6. Update policies based on assessment findings and updates or changes to privacy legislation.
  7. Appoint someone in your company to monitor the shred-all process (i.e., checking copiers and printers for stray documents).
  8. Partner with a knowledgeable industry leader that specializes in secure document destruction. The service should include strategically placed locked consoles, and regular service with a secure chain of custody.

Sources:
1. Ponemon Institute - 2016 Cost of Data Breach Study: United States

Get the Info Sheet