OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES
|
|
- Hilary Manning
- 8 years ago
- Views:
Transcription
1 SERVICES OVERVIEW
2 OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning Services Office Relocation Services Onsite Asset Management Services Office PAT Testing Services Data Centre Cleaning Services IT RECYCLING SERVICES PC Disposal Services Computer Remarketing Services Computer Recycling Services Laptop Recycling Services Hard Drive Destruction Services Document Destruction Services Computer Refurbishment Services Data Erasure Services Secure Container Storage Solutions Mobile Phone Recycling Services IT Valuation and Purchasing SUPPLY CHAIN SERVICES Imaging & Hardware Build Services Returns Management Services Secure Collection Services Office Relocation T W 3
3 ACCREDITATIONS... GreensafeIT is one of the most certified IT Recycling ISO Accreditations GreensafeIT are proud to have the following ISO accreditations. ICO Data Protection Registration Number: The Defence Infosec Product Co-operation Group Companies in the UK today. We are proud of our accreditations and it re assures our customers they are dealing with an expert in IT recycling that is focused on security, processes and quality of service. ADISA Accredited Distinction Commercial Insurance Cover Policy Number 080X / N71 Employers Liability 10,000,000 Public and Product Liability 2,500,000 Environmental Liability 1,000,000 Environmental Agency Registered GreensafeIT are an Environmental Agency approved recycling agent. Carrier Broker Dealer - CB/PE5659AF Hazardous Waste Producer - ANH525 Exemptions S2 and T9 - EPR/KE5253AH/A001 Exemption T11 - NCC/059915/2013 T W 5
4 IT RECYCLING... GreensafeIT is a market leading computer recycling business that has over 65 years combined management experience in this sector. We are an ISO14001, ISO9001, ADISA and DIPCOG accredited business. The team have overseen over 3 million devices through the IT recycling lifecycle; this knowledge coupled with first class facilities ensures our customers receive the best possible service and solutions in the market place today. Why Choose GreensafeIT for Computer Recycling Highly secure & certified computer recycling business HMG approved data erasure solutions All staff have been security vetted and approved. Overseen over 3 million devices with 65 years combined management experience Full asset report produced as standard with every computer recycling collection Ability to generate revenue from 80% of equipment returned to us on an average collection Secure dedicated collections with security cleared staff Most certified, secure and comprehensive mobile shredding solutions in the market ISO14001 & ISO9001, ADISA & DIPCOG Certified Approved and certified by the Environment Agency As an experienced IT recycling supplier within the NHS, Education, Central Government and Corporate Space, GreensafeIT is perfectly placed to provide its customer guidance through this complex market. We provide the whole service through five very easy steps that are customers follow: We obtain a list of devices, boxes or pallets we are asked to collect Our security cleared engineers attend site and collect the devices and place them in secure containers The equipment is returned to our operation for data wiping and assessment We sell or dispose of the items depending on the service the customer has requested We send you a detailed report and data erasure certificates for each device we have processed T W 7
5 SECURE HARD DISK SHREDDING SERVICES... GreensafeIT s hard drive destruction and secure shredding service ensures you to keep your information confidential and secure. Our hard drive destruction services are the most secure and cost effective way to permanently destroy your data bearing devices. We have the ability to shred down to 6mm and are standard service is no larger than 11mm shred particles. Our team of security cleared personnel install trust, peace of mind and our solutions complies with the following mandates and standards. HMG Security Policy Framework HMG IA Standard No. 5 Secure Sanitisation ADISA (Asset Disposal Information Security Alliance) JSP 440 Joint Services Publication Data Protection Act 1998 Why Choose GreensafeIT for Secure Hard Drive Shredding Destruction Services Most certified, secure and comprehensive mobile shredding solutions in the market place Ability to process high volumes in one day Highly secure and certified IT recycling business HMG approved shredding solutions All staff have been security vetted and approved Overseen over 3M devices through the IT recycling process Only Mobile ADISA Certified solution in the UK today 65 years combined management experience in the IT recycling industry ISO14001 & ISO9001, ADISA & DIPCOG certified Approved and certified by the Environment Agency Using cutting edge technology, GreensafeIT utilise shredding units that are fit for purpose and can shred up to 3000 devices a day conforming to the most stringent standards and mandates. Secure hard drive shredding destruction services is the most secure ways to ensure your data destruction and data disposal processes are secure whatever your line of business is. The growing threat of identity fraud means it is now more important than ever to ensure your data destruction and data disposal processes for large volumes of electronic information stored in hard drives is secure and handled by a trusted and respected supplier. T W 9
6 DATA ERASURE SOLUTIONS... GreensafeIT can offer various different onsite data erasure services. Our services are aimed at increasing data security whilst reducing any risk of data loss during transit to any location. Our certified engineers will attend site with the relevant equipment to ensure they can handle any issues that may arise whilst undertaking the onsite data erasure activity. Why Choose GreensafeIT Highly secure and certified IT recycling business HMG approved onsite data erasure solutions All staff have been security vetted and approved Overseen over 3M devices with 65 years combined management experience Full asset and data erasure report produced as standard with every activity Ability to generate revenue from 80% of equipment returned to us on average Secure dedicated collections with security cleared staff Most certified, secure and comprehensive IT recycling company in the market GreensafeIT utilise Blancco data erasure software which is a CESG Infosec 5 approved erasure application and the most certified and respected data erasure software in the market place today. All personal or confidential data is wiped from your devices and a certificate is provided per drive for compliance. Typically our customers can request three types of service: Onsite data erasure from within our secure mobile data erasure lab Onsite data erasure from within the customers office or data centre Onsite data erasure and then shredding services from within our secure mobile vehicle which can handle both services Our engineers are able to process high volumes of units with the tools and experience gained over many years delivering onsite services. Each item has a certificate of data erasure produced giving the customer a complete end to end audit process. Essentially the service: Manages data security concerns by erasing sensitive or restricted data at site Provides visual erasure or destruction providing accountability for yourselves Ensures there is no risk of data breach in transit Time and money saved through efficient erasure process ISO14001 & ISO9001, ADISA & DIPCOG certified 0 11 T W
7 DECOMMISSIONING SERVICES... GreensafeIT s philosophy in regards to decommissioning services is one of compliance and failsafe procedures, ensuring a professional solution backup by experienced engineers with years of experience in datacentre decommissioning activities. Why Choose GreensafeIT Most certified, secure and comprehensive solutions in the market place Free site survey for large decommissioning services Provide a clean down services as part of the decommissioning services as standard Ability to process high volumes in one day Highly secure and certified IT recycling business HMG approved data erasure solutions All staff have been security vetted and approved. Overseen over 3M devices with 65 years combined management experience Full asset report produced as standard with every collection Security cleared staff ISO14001 & ISO9001, ADISA & DIPCOG certified Whilst there are many computer recycling companies or ITAD s (Information Technology Asset Disposal Companies) in the market place, our knowledge and expertise separate us from the competition. As a business we have over 65 years of combined senior management experience within the industry and decommissioning services. GreensafeIT has a dedicated team of skilled engineers that are able to assist your teams with the decommission of your data centre and server environment. This is done in a controlled and professional approach by first understanding the environment, the risks associated in removing the hardware and then planning a controlled exit of these devices. Often this incorporates data erasure and HDD shredding solution as part of the overall solution. The teams will complete a detailed risk assessment and site survey to ensure every aspect is documented so both parties can sign off before any work is commenced. These risk assessments will form part of the statement of works that we complete for every onsite activity. The statement of works is signed off by the customer and details the scope of work that is to be completed and any aspects that are to be taken into account. All of our engineers are security cleared, giving our customers peace of mind that the equipment is being handled by skilled security cleared engineers. All of our staff will have photo ID passes and will always wear these when on customer site. Approved and certified by the Environment Agency 2 13 T W
8 DATA CENTRE CLEANING SERVICES... GreensafeIT understands the importance of regular data centre cleaning. It is vital a data centre is decontaminated on a regular basis to reduce the build-up of unwanted and dangerous materials that can put your data centre at risk. Our teams of specialised data centre deep cleaning experts ensure this risk is eradicated. We specialise in data centre decontamination, data centre clinical cleaning, cleaning computer rooms, cleaning server rooms and cleaning communication rooms. All are designed to securely house the core IT systems for any business so it is essential that they are kept clean and well maintained at all times. Any unscheduled downtime causes major disruption to a Company and seriously effects its revenue streams. It is therefore vital to maximise availability, minimise downtime and avoid the risk of invalidating hardware warranties making data centre cleaning a must for any organisation. We can carry out this service on a regular basis either as an isolated activity or as part of a decommissioning project we are undertaking for our customers. Contamination within data centres builds up from internal and external sources. Left unchecked, contamination will, as a minimum, cause equipment to retain heat and at worse, cause equipment to fail. In addition, power requirements will increase as hardware works harder to keeps its environment cool, a key issue within the data centre environment. GreensafeIT s approach to its data centre cleaning services include cleaning of the subfloor void, floor surface buffing and cleaning of the equipment surface to provide a thorough preventive maintenance programme for your computer room. This also ensures you are complying with ISO which is the standard for machine rooms and also helps comply with the manufactures warranty directives If data centre cleaning has never been undertaken in your facility, an initial service site preparation clear down will need to be implemented. This is what we call a deep clean and includes the following: Cleaning of the subfloor void Cleaning all floor and equipment surfaces Cleaning pedestal and stringer substructures Once this has been completed it then allows for follow on preventative clean downs to take place on a structured and scheduled basis. GreensafeIT uses only the most advanced equipment available. In the data centre cleaning process, equipment surfaces are cleaned using tak cloths, with highly interwoven fibres (where applicable, three stage HEPA-filtered vacuums and HEPA Air scrubbers will also be used). All floor panels are cleaned using specialised anti-static equipment and solutions at all times 4 15 T W
9 SECURE OFFICE BOX SOLUTION... WHEELIE BIN LARGE WHEELIE BIN PALLETBOX SECURE PALLETBOX This is designed for secure storage of IT disposal products or confidential documents within the office environment yet can be easily moved around the office or departments within a site. Ideal for storing small IT products such as Hard Disk Drives, USB pens, Optical Media and DLT tapes. This unit is locked with a key and ensures that any data sensitive devices or confidential documents are stored within the office environment securely and safely. the box will hold approximately 100kgs of IT hardware or confidential paper This is designed for secure storage of IT disposal products or confidential documents and is stored in a loading bay or large loading area where access to the unit can be made. This solution can handle large IT products such as PC s, laptops and monitors or large volumes of small IT consumables such as Hard disk drives, DLT tapes, Optical Media and USB pens. It is also designed to store large volumes of confidential documents and files that are generated in an office environment. It has a controlled loading hatch for smaller items so that the box can remain locked whilst users can place products inside the secure bin. the box will hold approximately 400kgs of IT hardware or confidential paper This is designed as a cost effective and flexible IT and confidential documents disposal service. The units can be flat packed easily and when required quickly erected to store large IT products such as PC s, laptops and monitors or large volumes of small IT consumables such as Hard disk drives, DLT tapes, Optical Media and USB pens. It is also designed to store large volumes of confidential documents and files that are generated in an office environment. the box will hold approximately 250kgs of IT hardware or confidential paper This is designed as a very secure, lockable but flexible IT hardware and confidential documents disposal service. The units can be flat packed and when required are quickly erected to store large IT products such as PC s, laptops and monitors or large volumes of small IT consumables such as Hard disk drives, DLT tapes, Optical Media and USB pens. It is also designed to store large volumes of confidential documents and files that are generated in an office environment. the box will hold approximately 250kgs of IT hardware or confidential paper 6 17 T W
10 SECURE COLLECTION SERVICES... GreensafeIT have a fleet of secure collection vehicles that we undertake customer collections with. We also have a dedicated secure collections partner that allows us to securely collect IT from anywhere in the UK at the best possible rates, whilst not compromising the risks associated with collecting redundant IT. Every collection is allocated an MOD security cleared driver to ensure the data and products are treated in accordance with MOD guidelines. This is the most comprehensive security clearance for the collection and logistics industry. This, along with the dedicated collection services ensure the transport for our customers equipment is handled to the highest levels. Every vehicle has satellite tracking to enable us to confirm the vehicles location at any time. To complement this secure collections service we can offer different levels of tracking for our customers. This scope can include: Individually scanning each unit serial and asset number onsite and providing an electronic report once complete Cross checking each device against the customers inventory estate to identify out of scope products Cross referencing each item against a pre- defined list Every secure collections service that we undertake will be collected in a secure plastic pallet box to ensure that the items once scanned and located in the boxes cannot be tampered with until the collection is received at our facility. Each container is locked so the customer has the peace of mind that the items are not only shipped on a dedicated IT collection vehicle but are also locked away in secure pallets. This ensures our secure collection service is the most reliable and resilient in the ITAD industry. 8 T W
11 ABOUT US... GreensafeIT is a company designed to deliver first class IT recycling services to the public & corporate sectors. The board of directors and senior management team have 65 years combined experience in running large scale IT recycling and disposal contracts. During this time they have overseen the disposal and sale of over 3 million devices ranging from complex servers, laptops and telecoms. As an ADISA certified ITAD we our proud of the level of service we provide our customers. Adopting best practice is not something we take lightly and we will continue to invest in systems, people and processes to ensure our operations run to the best of our ability. The World Wide Web is an area where GreensafeIT also excel in today s market place and we are focused on increasing our presence and market reach in these areas. We strongly believe that our customers will benefit from our investment in time and money in this sector We are continuing to invest in our own fleet of collection vehicles, bespoke onsite service trucks, operational facilities and also expanding our partner network across EMEA - GreensafeIT is truly a market leader in services and solutions for the IT recycling industry. To ensure we maintain the highest standards in IT disposals we only use Blancco software for our data erasure services. Blancco is the market leading data erasure product across the world and we ve had senior management relationships with Blancco for over 10 years. Our aim is to remove the risk and hassle for our customers and become a trusted partner in this field and be recognised as a market leading service provider in the IT recycling industry Being a fully certified IT recycling company is something GreensafeIT take very seriously and believe it makes a difference between reputable IT recycling companies. We have a dedicated Quality and Environmental Manager who is focused on continually expanding and maintaining our accreditations such as our ISO and waste management accreditation. As a minimum, we advise our customer should look for a supplier who is ISO9001, ISO14001 certified and hold all of the legal environmental certificates required by law to treat and handle IT waste. GreensafeIT has all of these accreditations and licenses and is a trusted partner for many legal, corporate and public sector organisations. Let GreensafeIT put the jigsaw of IT recycling together ensuring your data is safe and handled in a professional and certified manner T W
12 WHY CHOOSE?... Secure, Cost-Effective it Recycling Solutions World Wide IT Recycling Coverage Highly Secure and Certified Computer Recycling Business HMG Approved Data erasure solutions All staff have been security vetted and approved. Overseen over 3M devices with 65 years combined management experience Full asset report produced as standard with every collection Ability to generate revenue from 80% of equipment returned to us on average Secure dedicated collections with security cleared staff Most Certified, secure and comprehensive mobile Shredding Solutions in the Market ISO14001 & ISO9001, ADISA & DIPCOG Certified Approved and certified by the Environment Agency GreensafeIT is an expert in the field of IT recycling and services. This knowledge has been passed down from the senior management team who have over 65 years combined experience in this market. This not only covers electronic waste recycling but many other complex logistic and engineering services that make GreensafeIT a market leading IT Recycling Company. Our management team has overseen the disposal, resale and refurbishment of over 3 million devices through this complex and ever changing market over the last 15 years. As an ADISA certified member at Distinction level, this experience coupled with industrial approval of our processes and procedures is invaluable when guiding our customers through the legal and environmental compliance issues that occur when delivering and handling these processes. 2 T W
13 GreensafeIT 6 Sherwood Road Aston Fields Industrial Estate Bromsgrove B60 3DR telephone +44 (0) sales@greensafeit.co.uk
Secure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
More informationAsset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your
More informationShredding. Security. Recycling
Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE
More informationFujitsu Asset Lifecycle Management Services
Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools
More informationIT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management
ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET
More informationHow To Destroy Data From A Hard Drive
Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened
More informationdocument destruction Our passion.
document destruction Your office. Our passion. safeguard Our secure destruction service meets all the necessary compliances and helps to support ISO 9001, ISO 14001 and CSR objectives as well as improving
More informationINFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:
More informationCCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate
More informationHow To Manage A University Computer System
PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management
More informationMEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER
MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder
More informationT: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple.
Records Management Made Simple. Document Storage Cyclone offers customers a complete end -to-end service including box collection, bar code tracking, document retrieval, delivery, and status reporting.
More informationIT Trading UK Ltd Computer & IT Equipment Disposal Specialists
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk
More informationForm #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services
Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.
More informationTrust Integrity Guardianship Expertise Reliability
Trust Integrity Guardianship Expertise Reliability Introduction History Identity File Centre Document and Data Storage Ltd became a trading subsidiary of Commercial Transfer (Warehousing) Ltd in 2006.
More informationManaging and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS
Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like
More informationThat s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.
Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20
More informationData Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
More informationSCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk
SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING DATA SCANNING Data is the lifeblood of many businesses and organisations, access to which is imperative to its productivity and its success. Organising
More informationNHS Information Governance:
NHS Information Governance: Information Risk Management Guidance: Maintenance and Secure Disposal of Digital Printers, Copiers and Multi Function Devices Department of Health Informatics Directorate July
More informationUniversity of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
More informationMFX RELOCATIONS. Data Centre & Computer Room Relocations
MFX RELOCATIONS MFX Relocations is our specialist relocation division and can undertake any type of commercial move but also undertakes specialist moves which includes:- Specialist IT relocations (Data
More informationInformation retention and disposal guide. Date: 31 October 2014 Version: 2.0
Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case
More informationTable of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery
IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those
More informationIT asset disposal for organisations
ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk
More informationProducts and Services
Products and Services Canvas Systems is the largest global independent reseller of refurbished server hardware, with over 13 years of experience within the industry. With over 50 million worth of new and
More informationBuilding an ITAD Program:
Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing
More informationSecure IT Relocation & Technical Solutions
Secure IT Relocation & Technical Solutions We have yet to meet a more professional and dedicated team. The Sunspeed service is second to none. CGI Insight & knowledge Established in 1987, Sunspeed is one
More informationDATA SECURITY POLICY. Data Security Policy
Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.
More informationWalton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.
Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationSupport Services. Engineering solutions for operational excellence SERVING THE WORLD S RAILWAYS. Technical. Manufacturing Services
hain ces Technical Support Technical Support Overhaul & Repair Manufacturing Product Innovation & Technology Consultancy Products Engineering solutions for operational excellence SERVING THE WORLD S RAILWAYS
More informationDatacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk
Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse
More informationCENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE
IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals
More informationRecords Management Plan. April 2015
Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised
More informationRECORDS MANAGEMENT & DIGITISING SPECIALISTS
RECORDS MANAGEMENT & DIGITISING SPECIALISTS DOCUMENT STORAGE VAULT STORAGE MEDIA STORAGE DOCUMENT RESTORATION HIGH SPEED DOCUMENT SCANNING DOCUMENT DESTRUCTION CONSULTANCY www.grm.ie www.grm.ie 1 Our records
More informationContents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance
Partner Capability Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Company overview About us CCE is one of the UK s largest independent IT
More informationyour risks Find out more about our affordable, secure shredding and recycling service.
your risks Find out more about our affordable, secure shredding and recycling service. Veolia Environmental Services understood our needs and recommended an affordable solution for securing and recycling
More informationA Guide to Minimizing the Risk of IT Asset Disposition
A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its
More informationNo More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt.
No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. Data disposal can be a tricky path to navigate. You re looking for an answer, but there aren t many that are 100% reliable, can
More informationInternal audit report Information Security / Data Protection review
Audit Committee 29 September 2011 Internal audit report Information Security / Data Protection review Executive summary and recommendations Introduction Mazars have undertaken a review of Information Security
More informationData Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1.
Data Security Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2011 Owner Secure Research Database Analyst Change History
More informationConnecting your business
mobiles Connecting your business fixed voice & data digital & IT autovoice managed services adsi energy About us Founded in 2002, ADSI are dedicated to reducing business costs by offering high-quality
More informationICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
More informationNetwork Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
More informationwww.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
More informationChallenges and Solutions for Effective SSD Data Erasure
Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional
More informationEnvironmental Policy. JRI Orthopaedics Limited
JRI Orthopaedics Limited October 2014 Contents Clause 1. Policy Statement 1 2. Who is covered by the policy? 2 3. Organisation and Responsibilities 2 4. Training and Communication 3 5. Suppliers and Customers
More informationwww.grm.ae OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION
OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION HIGH SPEED SCANNING SERVICES DOCUMENT DESTRUCTION CONSULTANCY www.grm.ae GRM
More informationVersion 1.0. Ratified By
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience
More informationVoid, Exit Cleaning & Disaster Recovery for Social Housing
Void, Exit Cleaning & Disaster Recovery for Social Housing Including Specialist Cleaning Services - Biohazard cleaning - Crime and trauma scene cleaning - Graffiti removal - Pest control Reliability n
More informationProtection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
More informationIT Asset disposition services
IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by
More informationResponsibly Retiring IT Assets, Medical or Laboratory Equipment
Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security
More informationIT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing
More informationPolicy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media
Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g.
More informationDocument scanning. Document destruction. Office re-location.
Document scanning. Document destruction. Office re-location. Document scanning. Scanning all of your documents is rarely a practical or cost-effective strategy. Best practice is to identify frequently
More informationIslington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
More informationService Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationG Cloud LOT 2 - PLATFORM AS A SERVICE XMA ENTERPRISE SCHOOL SOLUTION XMA VIRTUAL CAMPUS SECURE HYBRID SOLUTION
Cloud computing has brought about a step change in the economics and sustainability of Information and Communication Technology (ICT). Government is committed to the adoption of cloud computing and delivering
More informationTABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6
GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE 899-ENVIRONMENTAL SERVICES AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms and conditions, up-to-date
More informationSecure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
More informationArdington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving.
Ardington Archives Components of the process Audit of needs Cataloguing Retrieval Collection and deposit Destruction The archiving process 3 Section Contents ARCHIVING PROCESS The archiving process Reference
More informationDell Service Description
Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service
More informationKeep Your Business Moving with Custom Technology Leasing
Keep Your Business Moving with Custom Technology Leasing A custom Technology Lease from Data Sales Co. gives you the technology your business needs to succeed, with innovative financing, flexible terms,
More informationRECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our
More informationThe guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.
Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely
More informationdeveloping your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
More informationRotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
More informationMAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
More informationMoving Information: Privacy & Security Guidelines
Information and Privacy Commissioner/ Ontario Moving Information: Privacy & Security Guidelines Ann Cavoukian, Ph.D. Commissioner July 1997 Information and Privacy Commissioner/Ontario 2 Bloor Street East
More informationMOVING OFFICE CHECKLIST
MOVING OFFICE CHECKLIST Any office move requires a great deal of planning and careful thought beforehand - and strong commitment all round, both before and during the move. This Checklists assumes that
More informationInformation Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
More informationCommercial Cleaning & Restoration Services
Commercial Cleaning & Restoration Services Offering you n Reliability n Professionalism n Flexibility n Responsiveness n Value for Money Comprehensive Services For your Commercial Cleaning requirements,
More informationCOMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125
Minnesota State Colleges & Universities and Asset Recovery Corporation COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 CONTRACT EFFECTIVE UNTIL: SEPTEMBER 15, 2014 http://www.finance.mnscu.edu/contracts-purchasing/collaborative/index.html
More informationIT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
More informationInformation Security Policy London Borough of Barnet
Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationThe Software Experts. Training Courses and Events
The Software Experts Training Courses and Events one HELPING UK ORGANISATIONS Ensure IT Compliance Education, Training & Development Many companies in the UK are finding that without accurate information
More informationSecure Data Destruction
Secure Data Destruction Secure Data Elimination (Degauss) Onsite Magnetic Degaussing service eliminates data from Tape and Magnetic Hard Disk media Portable machines allow for degaussing to be competed
More informationDrainage and Grease Management for the Commercial Kitchen
Drainage and Grease Management for the Commercial Kitchen ACO. The future of drainage. The ACO system chain provides drainage solutions to meet the needs of tomorrow s food service facilities. Hostile
More informationImproving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup
Improving Business for SMEs with Online Backup www.cloudsecure.co.uk/cloudsecure 1 Accountants and Solicitors Firms Professional organisations such as accountancy and solicitors firms have an ever increasing
More informationInformation Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
More informationCLOUD ATTACHED STORAGE. Protect your data, protect your business
CLOUD ATTACHED STORAGE Protect your data, protect your business CONTENTS Introduction 3 Data The Life Blood of a Business 3 Sharing, Synchronising and Securing Data 4 Cloud-Based Solutions 5 The Role of
More informationCOMMERCIAL WASTE SERVICES. sharing responsibility
COMMERCIAL WASTE SERVICES sharing responsibility commercial waste management Keeping our customers informed Realising the value of waste Veolia Environmental Services is an international, market-leading
More informationGrasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More informationWebnet2000 DataCentre
Webnet2000 DataCentre WEBNET2000 have been enabling organisations develop their Internet presence for over 10 Years. The Webnet2000 Datacentre features the very latest world class resilient infrastructure,
More informationColocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment
Colocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment 3 Company Overview Confisio DataCenter was formed to help organisations tackle the ever increasing challenges
More informationENVIRONMENTAL POLICY STATEMENT
ENVIRONMENTAL POLICY STATEMENT COMPANY NAME ADDRESS COMPANY ACTIVITIES TRACKYOU LTD BLACKWOOD BUSINESS PARK, ASH ROAD SOUTH, WREXHAM, LL13 9UG Telematics Provider of Vehicle Tracking Units to Local Authorities
More informationMobile Phone & Laptop Recycling Programme with Your Company Mobiles
Mobile Phone & Laptop Recycling Programme with Your Company Mobiles Tel: 01283 516259 Email: info@emceurope.eu.com Website: www.emceurope.eu.com 1 Contents About emc europe Page 3 Sustainability and CSR
More informationGUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING
GUIDELINES FOR IMPLEMTING GMP IN FOOD PROCESSING 2.Storage Facilities 2.1 Use of off site facilities - are they controlled 2.1.1 Where the manufacturer commissions the services of (or contracts to) off
More informationCD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services
Destruction and Recycling Services An ISO 9002-compliant company Audited 100% data destruction and green recycling 2014 Commercial Catalog Edition 2014 www.cdrominc.com CD Rom, Inc. Table of Contents About
More informationSamsung WEEE Management Policy (US and Canada)
Samsung WEEE Management Policy (US and Canada) 1. Purpose These requirements aim to minimize environmental impacts caused by all Electronic Waste generated by Samsung's US and Canadian operations and programs,
More informationSOAS Controlled Procedure CP-PP06 IT Asset Management Procedure
SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the
More informationHighland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
More informationRecords management. Don t just store your information, manage it. Save space Improve efficiency Safeguard your information Digitise your records
Records management Don t just store your information, manage it 444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 Save space Improve efficiency Safeguard your information
More information