Shredding. Security. Recycling

Size: px
Start display at page:

Download "Shredding. Security. Recycling"

Transcription

1 Shredding Security Recycling

2 WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE 100 companies, and many public sector organisations, our service levels are second to none. With 12 destruction centres strategically located nationwide, we provide a national service with local response. The secure and safe management of your confidential waste materials should be at the forefront of your organisation s security. With ID fraud on the rise coupled with increasingly stringent penalties for data security breaches, businesses and the public sector alike need to ensure their information is secure, even when no longer in use. To help ensure the necessary data security measures are in place, PHS Datashred works with customers to provide a safe and secure solution for the shredding of confidential materials, including paper, ID cards, uniforms, hard drives, CDs, USBs and microfiche. SHREDDING RECYCLING Authorised to BS EN 15713:2009 (security shredding standard) PHS Datashred has the capability of shredding confidential materials, either on the client s site for added security, or off site at one of our 12 secure destruction centres. To support our shredding service, we provide a range of secure containers for the storage and collection of confidential materials, including sacks, cabinets, indoor bins, wheelie bins and exterior storage facilities. SECURITY PHS Datashred operates a zero landfill policy, and therefore in addition to the secure paper shredding and recycling services, we also offer a wide range of further recycling solutions for businesses. Materials that can be collected include plastic bottles, cans, glass, IT equipment and WEEE, cardboard and toner cartridges. A variety of suitable storage containers are available for these types of waste, designed to fit in with the office environment and be easy to use. At PHS Datashred, we aim to distribute as much refurbished and wiped IT and computer equipment for reuse as possible, with the option of recycling for equipment that is no longer usable. The Data Protection Act is in place to ensure that businesses and organisations make every endeavour to keep their confidential information safe and secure at all times. This includes customer details, employee records, supplier information as well as plans, budgets and meeting notes - anything that could be used for fraudulent purposes. Failing to comply with the Data Protection Act could incur a fine of up to 500,000 from the Information Commissioner s Office (ICO). Just as important as protecting yourself from prosecution, stringent information security measures are also necessary to protect your organisation s reputation, competitive edge and stakeholder confidence.

3 WHAT WE DO ON-SITE & OFF-SITE SHREDDING Designed to give peace of mind to customers dealing with highly sensitive information, our on-site shredding service provides an immediate solution with an enhanced level of security. Your confidential material will be collected by security checked staff and shredded there and then in one of our mobile shredding vehicles. Our off-site shredding service offers a more cost effective, yet reliable solution, tailored to meet the needs of your organisation. Your confidential material will be collected in security tracked and locked vehicles, and transported to one of our destruction centres for shredding. As an authorised ISO9001 company, incorporating BS EN15713 security shredding standard, you can be confident that our processes and procedures meet the very highest industry standards. PRODUCT DESTRUCTION It s not only paper documents that contain confidential information. Many other materials can be used for fraudulent purposes if they fall into the wrong hands. For example, ID cards and badges, uniforms and PPE could be used to falsely gain access to an organisation s site, or a client s home. If not disposed of correctly, counterfeit or faulty goods could be sold on to the public, potentially damaging a brand and its reputation. Our secure destruction process ensures these potentially damaging materials are removed from the open market and your customers, clients and the general public are protected from fraudulent activity. IT RECYCLING As an organisation, you handle confidential information on a daily basis, yet many businesses fail to recognise that redundant computer equipment may also contain confidential information that you are legally and morally obliged to dispose of appropriately. Our service ensures that 100% of your organisation s redundant IT equipment and WEEE is reused or recycled, without exposing your confidential information to potential misuse. All equipment is securely wiped to HMG Infosec 5 Baseline/Enhanced standard and tested for safety before being reused. All equipment is processed here in the UK, and through our ongoing partnerships with charitable organisations, we provide much needed equipment for community projects. OFFICE RECYCLING Commercial waste disposal can cost UK businesses up to 5% of turnover, and with Landfill Tax on top of transport and disposal charges, this cost escalates every year. Implementing a comprehensive recycling programme could save a significant amount of money. We can create a tailored solution to suit your organisation s needs, providing the most cost effective and environmentally responsible disposal routes for all waste streams, including our award winning closed loop paper recycling scheme. A range of bins and containers are available to help you collect and store your recyclable waste on site, prior to collection.

4 WHY PHS DATASHRED Excellent service levels Nationwide coverage, local response Well trained and helpful staff BS EN15713 shredding standard OUR ENVIRONMENT We are committed to minimising our impact on the environment wherever possible, and as such have implemented robust environmental targets. In the past three years we have reduced our fuel usage by 25%, and are close to being zero to landfill. In addition to recycling all our clients paper once shredded, customers can choose to buy back the recycled paper as part of our award winning closed loop recycling service. We will work with you to provide the most environmentally responsible service. ISO 9001 & ISO BSIA members Uniformed and security checked staff Trusted by Public & Private Sector customers, large & small Investors in People accredited Members of NAID and FACT What our customers say... We ve received an excellent service from the operatives that service our site. They are polite, genuinely care about the service they provide to us and always want to please. University Hospitals of Leicester NHS Trust The telephone response service is prompt, and the operations staff are always helpful, and arrive on the specified date and time. All in all, very efficient customer service. Federation Against Copyright Theft (FACT) We know with Datashred we can be sure all our confidential waste is handled securely, and that the service is reliable, giving us complete peace of mind. A truly first class service. Mishcon de Reya Law Firm

5 OUR PRODUCTS SECURE CABINET Designed to suit any office environment, this stylish and secure cabinet incorporates a lock and slot, as well as floor to prevent access to the contents inside. 900 h x 650 w x 400 d (mm) Max. load = 100 litres SECURITY SACKS & TIES Available in either heavy duty polywoven material, or paper which is completely recyclable without having to open the sack. Max. load = 50 litres SECURE WHEELIE BINS A portable and convenient unit for storing confidential material on site, with optional lock and slot. Available in 120, 240, 360, 660 or 1100 litre capacity LIME BINS Specifically designed for the office, these bins are made from recycled materials and available for confidential waste, general waste and mixed recycling. Max. load = 140 litres ENVIROBINS Range of colour coded bins for confidential paper, plastic bottles and cans, glass, plastic cups and general waste. Available in 55, 82, 100 or 140 litre capacity ECOSORT BINS Suitable for most recycling applications, this range offers a convenient and space saving solution. Available in 60 or 87 litre capacity To see our full range and order online visit

6 Document and data destruction On site shredding Off site shredding Office recycling solutions (paper, glass, cans, plastic bottles) WEEE recycling Recycling and waste containers Branded goods destruction Destruction of ID cards and uniforms Also available from PHS Group: Washroom services Waste management Interior and exterior planting Laundry and work wear Matting and flooring Records storage and management Testing and compliance Water machines Workplace consumables Crate rental and packaging Tel: Fax: Web:

document destruction Our passion.

document destruction Our passion. document destruction Your office. Our passion. safeguard Our secure destruction service meets all the necessary compliances and helps to support ISO 9001, ISO 14001 and CSR objectives as well as improving

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING DATA SCANNING Data is the lifeblood of many businesses and organisations, access to which is imperative to its productivity and its success. Organising

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

COMMERCIAL WASTE SERVICES. sharing responsibility

COMMERCIAL WASTE SERVICES. sharing responsibility COMMERCIAL WASTE SERVICES sharing responsibility commercial waste management Keeping our customers informed Realising the value of waste Veolia Environmental Services is an international, market-leading

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

ENVIRONMENTAL POLICY STATEMENT

ENVIRONMENTAL POLICY STATEMENT ENVIRONMENTAL POLICY STATEMENT COMPANY NAME ADDRESS COMPANY ACTIVITIES TRACKYOU LTD BLACKWOOD BUSINESS PARK, ASH ROAD SOUTH, WREXHAM, LL13 9UG Telematics Provider of Vehicle Tracking Units to Local Authorities

More information

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

T: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple.

T: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple. Records Management Made Simple. Document Storage Cyclone offers customers a complete end -to-end service including box collection, bar code tracking, document retrieval, delivery, and status reporting.

More information

your risks Find out more about our affordable, secure shredding and recycling service.

your risks Find out more about our affordable, secure shredding and recycling service. your risks Find out more about our affordable, secure shredding and recycling service. Veolia Environmental Services understood our needs and recommended an affordable solution for securing and recycling

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Pharmaceutical Waste

Pharmaceutical Waste Pharmaceutical Waste Introduction PHS Wastemanagement provides a highly professional clinical waste disposal service to organisations up and down the UK. As the NHS supplier of choice, we provide an unrivalled

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should

More information

Fujitsu Asset Lifecycle Management Services

Fujitsu Asset Lifecycle Management Services Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools

More information

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0 Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Your Recycling and Refuse Service Standards

Your Recycling and Refuse Service Standards Your Recycling and Refuse Service Standards for Lewisham What are Service Standards? Service Standards set out the standards that residents can expect from the Council regarding both recycling and refuse

More information

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Intelligent Spill Control. & Containment Solutions

Intelligent Spill Control. & Containment Solutions Intelligent Spill Control & Containment Solutions 2 PHS Spillcontrol Intelligent Solutions Our aim is to provide peace of mind for our customers, ensuring that your employees are kept safe and that the

More information

Waste management and disposal:

Waste management and disposal: Waste management and disposal: A best practice business guide An ebook produced by FCC Environment 01 Waste management and disposal: a strategy for success Introduction Your guide to waste management FCC

More information

No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt.

No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. Data disposal can be a tricky path to navigate. You re looking for an answer, but there aren t many that are 100% reliable, can

More information

How To Save Money On Health Care Through A Computer System

How To Save Money On Health Care Through A Computer System Save time, save money, save lives BETTER DOCUMENT AND DATA MANAGEMENT FOR THE NHS At a time when funds are scarce, investment in new and improved data management systems can actually create significant

More information

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder

More information

A guide to our recycling And waste management services

A guide to our recycling And waste management services A guide to our recycling And waste management services SITA UK provides recycling and waste management services for more than 40,000 organisations across the UK These organisations choose SITA UK because

More information

Smarter Resources Smarter Business Recycling

Smarter Resources Smarter Business Recycling Smarter Resources Smarter Business Recycling Best Practice Waste and Recycling Contracts for Business February 2014 Best Practice Waste and Recycling Contracts for Business A three step process There is

More information

Waste Type Classification Colour Coding Disposal Method

Waste Type Classification Colour Coding Disposal Method Sharps Disposal Introduction PHS Waste Management provides a responsive, reliable and flexible sharps disposal services to help eliminate injuries from sharps, needles and syringes. Conscious of our Duty

More information

How To Destroy Data From A Hard Drive

How To Destroy Data From A Hard Drive Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened

More information

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Information governance strategy 2014-16

Information governance strategy 2014-16 Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope

More information

National Approach to Information Assurance 2014-2017

National Approach to Information Assurance 2014-2017 Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version

More information

External Communication to Third Parties

External Communication to Third Parties External Communication to Third Parties Egress Software Technologies Ltd Unit 16 Quadrant Business Center, 135 Salusbury Road, London, NW6 6RJ T: +44 (0)20 7624 8500 / F: +44 (0)20 7624 8200 / E: info@egress.com

More information

Manchester United Old Trafford Stadium

Manchester United Old Trafford Stadium WRAP Resource Management Plan Online Tool for Events Manchester United Old Trafford Stadium The WRAP Resource Management Plan (RMP) for events is a free online tool which can be used by event organisers

More information

Information Governance

Information Governance CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this

More information

Payment Card Industry Data Security Standard PCI DSS

Payment Card Industry Data Security Standard PCI DSS Payment Card Industry Data Security Standard PCI DSS What is PCI DSS? Requirements developed by the five card brands: VISA, Mastercard, AMEX, JCB and Discover. Their aim was to put together a common set

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

Customer Service. At The Heart Of Our Business

Customer Service. At The Heart Of Our Business Customer Service At The Heart Of Our Business Our dedicated team of professionals strive to achieve total customer satisfaction at all times through a combination of outstanding commitment, quality and

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

DATA SECURITY POLICY. Data Security Policy

DATA SECURITY POLICY. Data Security Policy Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.

More information

How To Write A Council Policy On Collection And Recycling

How To Write A Council Policy On Collection And Recycling Durham County Council Refuse and Recycling Collection Policy Neighbourhood Services, September 2011 Contents Introduction 3 Policy 1: Assisted collections 4 Policy 2: No side waste 5 a) No side waste (refuse)

More information

Trust Integrity Guardianship Expertise Reliability

Trust Integrity Guardianship Expertise Reliability Trust Integrity Guardianship Expertise Reliability Introduction History Identity File Centre Document and Data Storage Ltd became a trading subsidiary of Commercial Transfer (Warehousing) Ltd in 2006.

More information

UPDATED WASTE / RECYCLING COLLECTION POLICIES JULY 2014. 1 Households Requiring Additional Residual Containers (grey bins)

UPDATED WASTE / RECYCLING COLLECTION POLICIES JULY 2014. 1 Households Requiring Additional Residual Containers (grey bins) UPDATED WASTE / RECYCLING COLLECTION POLICIES JULY 2014 1 Households Requiring Additional Residual Containers (grey bins) Residents are not automatically entitled to additional containers for non-recyclable

More information

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information) APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance

More information

Environmental Management Systems in Hotels. 15 Steps to the Successful Implementation of an Environmental Management System in a Hotel

Environmental Management Systems in Hotels. 15 Steps to the Successful Implementation of an Environmental Management System in a Hotel Environmental Management Systems in Hotels 15 Steps to the Successful Implementation of an Environmental Management System in a Hotel 2 15 STEPS 1. Assemble the team 2. Initial Review 3. Environmental

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Helping to protect your business and your customers in the event of a data breach

Helping to protect your business and your customers in the event of a data breach Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your

More information

Think global THEY SAY and act local HERE S HOW

Think global THEY SAY and act local HERE S HOW think global act local Think global THEY SAY and act local HERE S HOW Some companies decide to go green to save money. Some do it to reassure clients, or because clients are expanding their corporate responsibility

More information

IT asset disposal for organisations

IT asset disposal for organisations ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

BOC Supply Solutions

BOC Supply Solutions BOC Supply Solutions 02 BOC Supply Solutions The right solutions from BOC 03 The right solutions from BOC It is important to have reliable choices and options designed to suit your every need. Your processes

More information

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Information Governance Training Booklet for Pharmacy Staff January 2010

Information Governance Training Booklet for Pharmacy Staff January 2010 Information Governance Training Booklet for Pharmacy Staff January 2010 dra_schwartz/istock 2 Introduction To ensure compliance with the law and NHS requirements, all staff working in pharmacies that have

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Policy document on the provision of waste & recycling collection and storage facilities. Includes both domestic and commercial premises

Policy document on the provision of waste & recycling collection and storage facilities. Includes both domestic and commercial premises Policy document on the provision of waste & recycling collection and storage facilities Includes both domestic and commercial premises Introduction This document is intended to help relevant parties who

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

The Environment Team. A-Z Guide. to Waste & Recycling. www.le.ac.uk/environment

The Environment Team. A-Z Guide. to Waste & Recycling. www.le.ac.uk/environment The Environment Team A-Z Guide to Waste & Recycling www.le.ac.uk/environment 2 UNIVERSITY OF LEICESTER ENVIRONMENT TEAM Welcome...to the University of Leicester s A-Z Guide to Waste and Recycling. Over

More information

Bloomsbury Colleges Environmental Policy Statement

Bloomsbury Colleges Environmental Policy Statement 15 December 2011 P a g e 1 Bloomsbury Colleges Environmental Policy Statement The Bloomsbury Colleges are committed to the responsible use of energy, water and other resources with the aim of minimising

More information

Credit cards explained

Credit cards explained Credit cards explained What is a credit card? As its name suggests, a credit card lets you buy things on credit meaning that you don t need to have the money upfront to pay for your purchases. If large,

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

UK s convenient refuelling network, plus tools to help you reduce fuel costs by up to 24%

UK s convenient refuelling network, plus tools to help you reduce fuel costs by up to 24% Dear Sir/Madam, You are just TWO signatures away from complete fuel managment. We would like to take this opportunity to confirm, with thanks, the interest you have expressed in opening a completefleet

More information

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and

More information

Sapphire COMPANY PROFILE

Sapphire COMPANY PROFILE INTERIOR DESIGN PROJECT MANAGEMENT MAIN CONTRACTORS COMPANY PROFILE Sapphire House, 18 Gladstone Road, Croydon, Surrey, CR0 2BQ Telephone:- 020 8665 6226 Fax:- 020 8664 8927 Email:- sales@sapphirecontractors.co.uk

More information

Internal audit report Information Security / Data Protection review

Internal audit report Information Security / Data Protection review Audit Committee 29 September 2011 Internal audit report Information Security / Data Protection review Executive summary and recommendations Introduction Mazars have undertaken a review of Information Security

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

Policy. Mobile Phone Use Policy. Contents

Policy. Mobile Phone Use Policy. Contents Policy Mobile Phone Use Policy Contents Introduction 2 Policy Scope 2 Policy Intent 2 Policy provisions / principles 2 Eligibility 2 Business Functions 2 Issuing Mobile Devices 3 Using a University-owned

More information

You are just TWO signatures away from controlling your fuel bills.

You are just TWO signatures away from controlling your fuel bills. Dear Sir/Madam, You are just TWO signatures away from controlling your fuel bills. We would like to take this opportunity to confirm, with thanks, the interest you have expressed in opening a BP Plus Fleet

More information

Want to exceed customer expectations and stand out from the crowd? Third party approval of management systems from BRE Global. www.bre.co.

Want to exceed customer expectations and stand out from the crowd? Third party approval of management systems from BRE Global. www.bre.co. Want to exceed customer expectations and stand out from the crowd? Third party approval of management systems from BRE Global www.bre.co.uk Demonstrate your commitment to quality Quality Management Systems

More information

www.infoshred.com LLC Your key to secure information management.

www.infoshred.com LLC Your key to secure information management. www.infoshred.com LLC Your key to secure information management. History of the Company Infoshred began in 1993 as a division of Recyclers LLC, a South Windsor, CT recycling business. Its creation was

More information

Cadillac Fairview s GREEN AT WORK Overview

Cadillac Fairview s GREEN AT WORK Overview Cadillac Fairview s GREEN AT WORK Overview Cadillac Fairview s Green Vision Statement To establish a legacy of operational excellence founded on the principles of Environmental Protection, Energy Conservation

More information

Waste Management Policy

Waste Management Policy HEALTH AND SAFETY ISSUES Waste Management Policy Policy No: 39 Date of issue: October 1998 Review Dates: August 2001, December 2003, July 2008 Date to be Reviewed: July 2010 Page 1 of 13 Date of Issue:

More information

CORPORATE IDENTITY FRAUD: A PRIMER

CORPORATE IDENTITY FRAUD: A PRIMER CORPORATE IDENTITY FRAUD: A PRIMER Hanim Norza Baba, Head of Graduate Studies Center, Universiti Teknologi MARA, Melaka, Malaysia. drhanimnorzababa@gmail.com ABSTRACT Corporate identity fraud occurs when

More information

GUIDE ON HOW TO DO BUSINESS WITH LIVERPOOL JOHN MOORES UNIVERSITY

GUIDE ON HOW TO DO BUSINESS WITH LIVERPOOL JOHN MOORES UNIVERSITY GUIDE ON HOW TO DO BUSINESS WITH LIVERPOOL JOHN MOORES UNIVERSITY PRODUCED BY LIVERPOOL JOHN MOORES UNIVERSITY PROCUREMENT SERVICE First Issued - ISSUED 11 th February 2011 VERSION 5.0 updated 13/04/15

More information

The nation s largest privately held records and information management company

The nation s largest privately held records and information management company The nation s largest privately held records and information management company Our mission is clear: to lead the records and information management industry by providing our clients the very best service.

More information

You are just TWO signatures away from savings on your fuel bill.

You are just TWO signatures away from savings on your fuel bill. Dear Sir/Madam, You are just TWO signatures away from savings on your fuel bill. We would like to take this opportunity to confirm, with thanks, the interest you have expressed in opening an Esso Fleet

More information

Destruction and Disposal of Sensitive Data

Destruction and Disposal of Sensitive Data Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives

More information

Empowering sustainable and ethical supply chains

Empowering sustainable and ethical supply chains Empowering sustainable and ethical supply chains Sedex is a not for profit global membership organisation dedicated to driving improvements in responsible and ethical business practices in global supply

More information

Document scanning. Document destruction. Office re-location.

Document scanning. Document destruction. Office re-location. Document scanning. Document destruction. Office re-location. Document scanning. Scanning all of your documents is rarely a practical or cost-effective strategy. Best practice is to identify frequently

More information

Your Readymix Prices & Services explained. No hidden extras.

Your Readymix Prices & Services explained. No hidden extras. Your Readymix Prices & Services explained. No hidden extras. Effective January 2016 Contents Welcome 3 Welcome 4 Products and quality 5 Our prices 6 Delivery and returns 7 Payment and support We are delighted

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014 Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that

More information

Records Management Plan. April 2015

Records Management Plan. April 2015 Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised

More information

It s not just about the environment

It s not just about the environment Supply Chain Consultancy It s not just about the environment Sustainable Supply Chains Paul Goose discusses the need to take a wider, more integrated view of operations to ensure long term growth. A great

More information

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED

More information

Vendor Questionnaire. Financial and Commercial Services

Vendor Questionnaire. Financial and Commercial Services Vendor Questionnaire Financial and Commercial Services Contents Contents... 2 INTRODUCTION... 3 GENERAL BACKGROUND INFORMATION... 4 FINANCIAL INFORMATION... 5 HEALTH & SAFETY... 6 QUALITY ASSURANCE...

More information

Code of Business Principles Helping us do the right thing

Code of Business Principles Helping us do the right thing Code of Business Principles Helping us do the right thing Code of Business Principles Helping us do the right thing Contents 01 Foreword 02 Who is the code for? 03 Where to find advice or raise a concern

More information

Code of Conduct 1. The Financial Services Authority

Code of Conduct 1. The Financial Services Authority The Financial Services Authority Code of Conduct 1 1 The FSA's Code of Conduct should be read in conjunction with the guidance, which is designed to help you understand and apply the provisions of the

More information

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY Information Management & Technology Security Policy INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY POLICY NO IM&T 003 DATE RATIFIED October 2010 NEXT REVIEW DATE October 2013 POLICY STATEMENT/KEY

More information

Landlord/Agent Code of Conduct

Landlord/Agent Code of Conduct Landlord/Agent Code of Conduct Commitment to this is a requirement of the Home Stamp accreditation scheme The Home Stamp Code of Conduct aims to provide guidance and advice regarding the management of

More information

UNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS

UNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS WE MAKE IT POSSIBLE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS UNIQUE WHOLESALE HOSTED CENTREX TAKING COMMUNICATION INTO THE CLOUD

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Birmingham Women s NHS Foundation Trust

Birmingham Women s NHS Foundation Trust Birmingham Women s NHS Foundation Trust Data protection audit report Executive summary January 2015 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with

More information