Document, Hard Drive & Media Destruction for IT Professionals

Information Security is More Than Firewalls.

As an IT professional, you are often seen as the nerve-center of your organization. From network architecture and management to application development and deployment, you are responsible for keeping intruders out and confidential information in.

While the bulk of your security responsibilities may deal with firewalls and security infrastructure, you have a unique opportunity to further your organizations’ information safety in off-site environments as well.

Take your organization’s information security to the next level with our hard drive and media destruction services, paper shredding and recycling, and our helpful privacy policies and protocols – all designed to keep your organization’s confidential information confidential.

Protecting your confidential information isn’t just good business, it’s the law!

Like most industries that work with private and confidential information, yours is heavily regulated and governed. And laws designed to protect identities, financial data, and personal privacy come with strict rules and strong fines. We can help you stay compliant.

In addition to industry regulations governing information privacy, here are a few of the key information security laws that also apply.

Fair and Accurate Credit Transactions Act (FACTA)

Fair and Accurate Credit Transactions Act (FACTA) 

Ensures accuracy and privacy of consumers’ financial information and requires effective policies in the workplace to secure destruction of consumer information to prevent identity thefts and unauthorized access to the information.

A statue of a person holding a scale and a gavel Description automatically generated

Sarbanes-Oxley Act

Sarbanes-Oxley Act

Is an act set up for publicly traded companies to protect investors by improving the accuracy and reliability of corporate financial disclosures. The act also requires secure document retention and destruction – to better protect against corporate and accounting fraud.

A statue of a person holding a scale and a gavel Description automatically generated

Gramm-Leach Bliley Act

Gramm-Leach Bliley Act 

Protects the privacy of consumer information held by any business that provides financial products or services. It also ensures privacy protections against the sale of any private financial information. Violators can be fined up to $1,000,000.

A statue of a person holding a scale and a gavel Description automatically generated

Red Flag Rules

Red Flag Rules 

Requires dealerships and financial institutions to create a written identity theft prevention program to detect, prevent, and mitigate identity theft. The Federal Trade Commission aims for a program that can help businesses spot suspicious patterns and prevent the costly consequences of identity theft.

A statue of a person holding a scale and a gavel Description automatically generated

Learn To Recognize The Risks.

If you create, collect, or dispose of these types of documents, you and your organization could be at risk for an information breach.