Business Procedures to Dispose of Confidential Waste

The word Confidential surrounded by some shredded papersMany businesses have personal and confidential information about their clients. It is important how businesses handle the confidential documents that they no longer require. The customer’s privacy and identity must be preserved. Businesses can be held liable if any information about customers is released or obtained from their location in any way, even by theft. This may include information such as address, phone number, spending habits, or credit card information.

Most businesses have policies in place that all customer information is shredded to protect their privacy and identity. However, in large companies this can be problematic. Not only could shredders be worn out very quickly and trash bins filled to overflowing, but employees could spend entirely too much time shredding documents and not enough time servicing customers.

There are solutions for dealing with confidential waste in these larger companies. One of the common procedures for handling confidential information requires several steps, and may require the hiring of an additional employee and a disposal service such as Shred it. However, the end results are very desirable.

First, employees are given recycling tubs, baskets or large trash cans in which they can put confidential waste. These bins are then picked up by an employee at the end of the day, and the contents are shredded in industrial shredders. Industrial shredders are much more likely to last a long period of time than smaller office shredders. In addition, this way employees’ time is better spent than in shredding documents throughout the day.

Whether the company is large or small, the problem of what to do with the shredded material is also one that must be addressed. It is not wise to simply throw out shredded materials, because they could easily be pieced together, destroying customer confidentiality. Again, there is a simple solution.

There are companies out there whose sole purpose is to help businesses dispose of confidential waste. These companies provide large trash bins for shredded materials to be emptied into. These trash bins are then collected weekly or biweekly by the company. The shredded material is immediately processed by first separating it so that it cannot be pieced together.

Different disposal companies handle the waste in different ways. Some of the companies burn the shredded material so that there is no likelihood that it is ever discovered. Other companies take the shredded material directly to a trash facility, which cuts out the possibility of trash being rummaged through at the curb or by trash company employees.

Regardless of the procedure that you choose, you should ensure the safety of confidential client information. You do not want your business held liable for information stolen from your trash receptacles. Be certain that your methods are solidly in place and cover every circumstance, and that all employees are trained and on board.

This post has been provided by Shred-it; Leaders in on demand and scheduled document destruction and paper shredding services across the globe.

How Much Is Your Identity Worth?

Todays crims may not be after the families silver or the DVR and Telly in the corner, long gone are the days of some guy coming up to you in a pub and saying, ‘Hey mate I got a load of DVR’s you after one’?

It would be more like, “I have some fresh credit cards tested, if your quick you could get a couple of grand with buying some on line kit straight away.

This is big business, and I mean BIG business, so lets get some perspective.

In the USA alone in 2011 over 11 million adults fell victims to Identity theft, A massive increase by over 12% on the previous year and growing and growing.

Don’t think the UK is safe either, because it is on the increase here as well.

The postman drops a letter on your door mat, you see it is the water rates, a couple of days later, yep you guessed it, the telephone bill. OK we all hate bills its a fact of life, but the burglar is starting to love these bills. Nope, there not going to pay them for you, but the information, like account numbers, middle names, date of birth are all things that are personal to you and therefore, in the right/wrong hands which ever way you look at it, used correctly can request credit and can get things from others that probably are not that clued up.

Then guess what? yep thats right, all these bills are kept in a drawer in the kitchen along with the gas bill, electricity bill, spare key for the car, a probably the details of the car as well. So you can now imagine that before it was the TV etc, now a quick look around and a burglar could be out of your house in less that five minutes with the most important piece thing you hold dear and until now did not put a value on it. Your Identity !!!

To compound it if you are as sorted as my good lady is, then all these documents are listed in some sort of easy to sift through order in a filling cabinet. Giving the crim an index to see what is best to take and what he can do without.

Being in the security industry, we listen to peoples pains and anguish every day as they are phoning us up after the horse has bolted so to speak, so this is real and we, to keep our filing cabinet locked, and all our important documents in a safe, Passports, National Insurance numbers, and lots more are kept safely in a fire rated safe in a location that Im not telling :-)

We all need to wise up to ID theft it is very real, and if you have been a victim you may find credit reference agencies, could black list your name and address for years to come, getting a loan from a bank, buying on credit, all may come back saying thanks but no thanks, even Credit cards that you have, now could be calling saying when are we going to get paid for money that you did not spend.

For the Criminal it is easy to do, in and out in a flash, carrying paper is even easier than the TV!

Get decent locks, get a decent alarm and finally a decent safe. These should be considered as the bare minimum. Maintain a healthy security envelope around you, your home and your identity.

Hope this helps.

Written by Darrel Walters, Head of the tech department @Locks_Online
Managing Director and head of The Walters Group and have been for over 23 years
TRUST Security – Trust LocksOnline

5 Common Types of Identity Fraud

5 Types Of Identity FraudThe Annual Consumer Sentinel Network Data Book from the Federal Trade Commission shows that consumers in the U.S. lost over $1.5 billion due to online fraud in 2011. Identity theft and identity fraud accounted for 70 percent of all complaints. There are different types of identity fraud and here are five of the most common ones.

  1. Account Fraud

    There are basically two types of account fraud: New account fraud and account takeover fraud. In the first case, also known as application fraud, a perpetrator uses identifying details of another person to get goods or services using the victim’s good credit standing. In many cases, new account fraud involves the use of Social Security Number and the perpetrators often open new credit card, cell phone or other utility account.

    Account takeover fraud is whereby someone uses another person’s account details to get goods or services using funds in the existing account.

  2. Medical Identity Theft

    This is one of the most serious types of identity theft. It involves the use of a person’s name and insurance details to get medical goods or services. The perpetrators may also make false claims for medical services or goods.

    The medical staff may make erroneous and even life-threatening decisions because medical identity theft leads to wrong entries in the victim’s records.

  3. Commercial or Business Identity Theft

    In this type of identity theft, the perpetrators use the name of an existing business to get services or goods with the bills going to the real business. The perpetrators are usually insiders who directly access operational documentation, which they adjust to suit their schemes. They may be either former or existing employees.

  4. Phishing E-mail and Pharming Fraud

    The perpetrators pose as legitimate institutions to capture financial information or other personal details via e-mail. In pharming fraud, unsuspecting victims are lured to fake Web sites where the personal details they provide are captured.

  5. Synthetic Identity Theft

    This is a relatively new type of identity fraud where the perpetrator uses a victim’s details to form an entirely new identity, which is more difficult to track.

Preventive Measures

  • Do not email or text your Social Security Number or give it over a cell phone.
  • Shred all important documents.
  • Only enter your credit card information on trusted and secured Web sites.
  • Be wary of pre-approved offers and promotional lists.
  • Monitor your account and credit details closely.
  • Avoid clicking on links or opening attachments received via instant messages or e-mail.
  • Keep abreast of the newest scams and the best ways of preventing them.
  • Use a Web browser updated with the latest security features.

These simple measures will help you stay safe in the face of rising identity fraud.

Image by and licensed by Creative Commons.

Rebecca Fischer is a sales representative at, an online shop dedicated to identity security products. Click here to view the official Card website.