Document shredding: the why and the how
by Zeljka Zorz - Managing Editor - Monday, 4 February 2013.
How are the shredded remains of documents disposed of safely? Does some of it get recycled?

After a document’s lifecycle has run its course, it must be properly destroyed. There are countless ways to improperly do away with obsolete physical and digital documents, and the end result can be catastrophic. Knowing who is responsible for handling, transporting and destroying is critical to avoiding the nightmares associated with improperly discarded documents. As mentioned before, I would strongly recommend use of professional third party Secure Destruction providers to ensure a closed loop chain of custody process, secure vehicles & facilities, along with industrial shred equipment. The majority of material, particularly paper, is indeed recycled but it is important to note that the transport of the shredded material must be secure up to the time it is delivered to a mill and de-inked and re-pulped.

There has recently been an incident involving shredded confidential documents belonging to Nassau County Police Department being showered down on spectators of Macy's annual Thanksgiving Day Parade in New York. Since then, there has been no official explanation on how that was allowed to happen. Have you followed the situation and know the answer to that question? If not, how do you think this incident may have happened?

We have absolutely followed this incident and while it has not been made public as to how this occurred, my educated guess would be that the material was shredded but was not sent to a paper mill to be properly and securely recycled. It is critical that any organization has a complete understanding of what will happen with its confidential material after it has been shredded, which doesn’t necessarily mean it has been securely destroyed. Because information comes in so many forms today, keeping documents secure is infinitely more challenging than it once was. However, failure to protect critical information places a business’s financial livelihood and reputation at stake. The phrase “security breach” can be defined in a number of ways in today’s business environment, but knowing what files you have, where they are located and the information those files contain helps to drastically reduce the risk of critical information being altered without detection.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //