Deleted Does Not Mean Destroyed

Today, a majority of business is conducted online or electronically. Bank transactions, payments, applications, emails, etc., are all a part of our normal day to day activities online. This information is stored and recorded on the hard drives of the machines we are using, a treasure trove of information for an identity thief. No problem, just delete the information before …

Small Office Shredder: Friend or Foe

Junk mail, receipts, business paperwork, credit card statements and healthcare information, the list is endless. Bottom line: it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the garbage, but is tackling it with your small office shredder much better? When will you actually get …

DownStream Data Coverage – What Is It and Why Is It Important?

DownStream Data Coverage – what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your destruction vendor have that same level of vigilance?  What certifications do they carry?  How do they …

Vet your Vendors

When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? What to Know Before Choosing a Vendor You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a few things to …

What is FISMA and What Makes DataShield an Expert in Compliance?

Protecting your company’s information is our priority. That’s why we believe in preventing problems before they happen. This is illustrated through our stringent compliance and understanding of HIPAA, FISMA, FACTA, and GLBA privacy rules. As the second in a series of four compliance blogs, we’ll explore the importance and meaning of FISMA. The Federal Information Security Management Act, also known as …

HIPAA Compliance and the Handling of Personal Health Information

Patient information security is one of the most important elements in medicine. Keeping patient records and details confidential is morally respectful, and also maintains an element of trust between a doctor and an individual. Failing to comply by HIPAA regulations can also be extremely costly. We’re talking $13,000-per-day fine amount for HIPPA violations in medical facilities. DataShield thoroughly understands and …

Alphabet Soup

The “Alphabet Soup” of Compliance and Certification

Protection, security, and confidentiality are serious issues when it comes to data management, storage, and destruction. DataShield understands this and we are HIPAA, FISMA, FACTA, and GLBA compliant. Did you know that laws require employees to not only understand, but comply with data protection policies? That’s why at DataShield we offer compliance training for our clients handled by Certified Secure …

What You Don’t Know About Hard Drive Destruction

At first glance, a hard drive looks like a simple piece of computer equipment. But looks can be deceiving. The relatively insignificant looking square contains thousands of gigabits of your information. Information that has accumulated over the years, information that is most at risk when you are in the process of upgrading or discarding your computer. Unfortunately, along with the …

Mobile Shredding or Shredding at Our Facility

What’s best for your business? Secure paper shredding is a necessity for companies large and small. If left exposed, billing information, patient records, or simply a misprinted form can become a risk for your company. DataShield is dedicated to meeting your needs. That’s why we give you options when it comes to shredding confidential documents. All you have to do …