DownStream Data Coverage—What Is It and Why Is It Important?

DownStream Data Coverage—what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet …

How Do You Vet Your Vendors?

When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? What Do You Need to Know Before Choosing a Vendor? You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a …

What is FISMA and What Makes DataShield an Expert in Compliance?

Protecting your company’s information is our top priority. That’s why we believe in preventing problems before they happen. This is illustrated through our stringent compliance and understanding of HIPAA, FISMA, FACTA, and GLBA privacy rules. As the second in a series of four compliance blogs, we’ll explore the importance and meaning of FISMA. The Federal Information Security Management Act, also known …

HIPAA Compliance and the Handling of Personal Health Information

Patient information security is one of the most important elements in the medical industry. Keeping patient records and details confidential is morally respectful, and also maintains an element of trust between a doctor and an individual. Failing to comply by HIPAA regulations can also be extremely costly—we’re talking $13,000-per-day fine amount for HIPPA violations in medical facilities. DataShield thoroughly understands …

Alphabet Soup

The “Alphabet Soup” of Compliance and Certification

Information protection, security, and confidentiality are serious issues when it comes to data management, storage, and destruction. DataShield understands is HIPAA, FISMA, FACTA, and GLBA compliant. Did you know that laws require employees to not only understand, but comply with data protection policies? That’s why at DataShield we offer compliance training for our clients handled by Certified Secure Destruction Specialists. …

What You Don’t Know About Hard Drive Destruction

At first glance, a hard drive looks like a simple piece of computer equipment. But looks can be deceiving. The relatively insignificant looking square contains thousands of gigabits of your information. Information that has accumulated over the years, information that is most at risk when you are in the process of upgrading or discarding your computer or laptop. Unfortunately, along …

Mobile Shredding or Shredding at Our Facility

What’s best for your business? Secure paper shredding is a necessity for companies of all sizes. If left exposed, billing information, patient records, or simply a misprinted form can become a risk for your company. DataShield is dedicated to meeting your needs by delivering custom document destruction solutions. We give you options when it comes to shredding confidential documents. All …

3 Reasons to Purge Sensitive Data

3 Reasons to Purge Sensitive Data: Save Time and Money According to Business Insider, the average cost of a single data breach is over $7 million. This includes the cost to resolve the attack, regulatory fines, legal costs, and notification costs. Purging sensitive data—personal data or business data—once or twice a year with DataShield costs way less than $7 million. …

DataShield Helps the Citizens of Wayne with Unwanted Electronics

Saturday, September 24th marked the annual City of Wayne Green Team electronics recycling event with service provided by DataShield. For the fifth year in a row community members drove through and dropped off unwanted electronics. This event and others like it are aimed at keeping e-waste out of landfills through proper disposal. Using a firm like DataShield not only achieves …