Shredding. Security. Recycling
|
|
- Ashlie Gregory
- 7 years ago
- Views:
Transcription
1 Shredding Security Recycling
2 WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE 100 companies, and many public sector organisations, our service levels are second to none. With 12 destruction centres strategically located nationwide, we provide a national service with local response. The secure and safe management of your confidential waste materials should be at the forefront of your organisation s security. With ID fraud on the rise coupled with increasingly stringent penalties for data security breaches, businesses and the public sector alike need to ensure their information is secure, even when no longer in use. To help ensure the necessary data security measures are in place, PHS Datashred works with customers to provide a safe and secure solution for the shredding of confidential materials, including paper, ID cards, uniforms, hard drives, CDs, USBs and microfiche. SHREDDING RECYCLING Authorised to BS EN 15713:2009 (security shredding standard) PHS Datashred has the capability of shredding confidential materials, either on the client s site for added security, or off site at one of our 12 secure destruction centres. To support our shredding service, we provide a range of secure containers for the storage and collection of confidential materials, including sacks, cabinets, indoor bins, wheelie bins and exterior storage facilities. SECURITY PHS Datashred operates a zero landfill policy, and therefore in addition to the secure paper shredding and recycling services, we also offer a wide range of further recycling solutions for businesses. Materials that can be collected include plastic bottles, cans, glass, IT equipment and WEEE, cardboard and toner cartridges. A variety of suitable storage containers are available for these types of waste, designed to fit in with the office environment and be easy to use. At PHS Datashred, we aim to distribute as much refurbished and wiped IT and computer equipment for reuse as possible, with the option of recycling for equipment that is no longer usable. The Data Protection Act is in place to ensure that businesses and organisations make every endeavour to keep their confidential information safe and secure at all times. This includes customer details, employee records, supplier information as well as plans, budgets and meeting notes - anything that could be used for fraudulent purposes. Failing to comply with the Data Protection Act could incur a fine of up to 500,000 from the Information Commissioner s Office (ICO). Just as important as protecting yourself from prosecution, stringent information security measures are also necessary to protect your organisation s reputation, competitive edge and stakeholder confidence.
3 WHAT WE DO ON-SITE & OFF-SITE SHREDDING Designed to give peace of mind to customers dealing with highly sensitive information, our on-site shredding service provides an immediate solution with an enhanced level of security. Your confidential material will be collected by security checked staff and shredded there and then in one of our mobile shredding vehicles. Our off-site shredding service offers a more cost effective, yet reliable solution, tailored to meet the needs of your organisation. Your confidential material will be collected in security tracked and locked vehicles, and transported to one of our destruction centres for shredding. As an authorised ISO9001 company, incorporating BS EN15713 security shredding standard, you can be confident that our processes and procedures meet the very highest industry standards. PRODUCT DESTRUCTION It s not only paper documents that contain confidential information. Many other materials can be used for fraudulent purposes if they fall into the wrong hands. For example, ID cards and badges, uniforms and PPE could be used to falsely gain access to an organisation s site, or a client s home. If not disposed of correctly, counterfeit or faulty goods could be sold on to the public, potentially damaging a brand and its reputation. Our secure destruction process ensures these potentially damaging materials are removed from the open market and your customers, clients and the general public are protected from fraudulent activity. IT RECYCLING As an organisation, you handle confidential information on a daily basis, yet many businesses fail to recognise that redundant computer equipment may also contain confidential information that you are legally and morally obliged to dispose of appropriately. Our service ensures that 100% of your organisation s redundant IT equipment and WEEE is reused or recycled, without exposing your confidential information to potential misuse. All equipment is securely wiped to HMG Infosec 5 Baseline/Enhanced standard and tested for safety before being reused. All equipment is processed here in the UK, and through our ongoing partnerships with charitable organisations, we provide much needed equipment for community projects. OFFICE RECYCLING Commercial waste disposal can cost UK businesses up to 5% of turnover, and with Landfill Tax on top of transport and disposal charges, this cost escalates every year. Implementing a comprehensive recycling programme could save a significant amount of money. We can create a tailored solution to suit your organisation s needs, providing the most cost effective and environmentally responsible disposal routes for all waste streams, including our award winning closed loop paper recycling scheme. A range of bins and containers are available to help you collect and store your recyclable waste on site, prior to collection.
4 WHY PHS DATASHRED Excellent service levels Nationwide coverage, local response Well trained and helpful staff BS EN15713 shredding standard OUR ENVIRONMENT We are committed to minimising our impact on the environment wherever possible, and as such have implemented robust environmental targets. In the past three years we have reduced our fuel usage by 25%, and are close to being zero to landfill. In addition to recycling all our clients paper once shredded, customers can choose to buy back the recycled paper as part of our award winning closed loop recycling service. We will work with you to provide the most environmentally responsible service. ISO 9001 & ISO BSIA members Uniformed and security checked staff Trusted by Public & Private Sector customers, large & small Investors in People accredited Members of NAID and FACT What our customers say... We ve received an excellent service from the operatives that service our site. They are polite, genuinely care about the service they provide to us and always want to please. University Hospitals of Leicester NHS Trust The telephone response service is prompt, and the operations staff are always helpful, and arrive on the specified date and time. All in all, very efficient customer service. Federation Against Copyright Theft (FACT) We know with Datashred we can be sure all our confidential waste is handled securely, and that the service is reliable, giving us complete peace of mind. A truly first class service. Mishcon de Reya Law Firm
5 OUR PRODUCTS SECURE CABINET Designed to suit any office environment, this stylish and secure cabinet incorporates a lock and slot, as well as floor to prevent access to the contents inside. 900 h x 650 w x 400 d (mm) Max. load = 100 litres SECURITY SACKS & TIES Available in either heavy duty polywoven material, or paper which is completely recyclable without having to open the sack. Max. load = 50 litres SECURE WHEELIE BINS A portable and convenient unit for storing confidential material on site, with optional lock and slot. Available in 120, 240, 360, 660 or 1100 litre capacity LIME BINS Specifically designed for the office, these bins are made from recycled materials and available for confidential waste, general waste and mixed recycling. Max. load = 140 litres ENVIROBINS Range of colour coded bins for confidential paper, plastic bottles and cans, glass, plastic cups and general waste. Available in 55, 82, 100 or 140 litre capacity ECOSORT BINS Suitable for most recycling applications, this range offers a convenient and space saving solution. Available in 60 or 87 litre capacity To see our full range and order online visit
6 Document and data destruction On site shredding Off site shredding Office recycling solutions (paper, glass, cans, plastic bottles) WEEE recycling Recycling and waste containers Branded goods destruction Destruction of ID cards and uniforms Also available from PHS Group: Washroom services Waste management Interior and exterior planting Laundry and work wear Matting and flooring Records storage and management Testing and compliance Water machines Workplace consumables Crate rental and packaging Tel: Fax: Web:
document destruction Our passion.
document destruction Your office. Our passion. safeguard Our secure destruction service meets all the necessary compliances and helps to support ISO 9001, ISO 14001 and CSR objectives as well as improving
More informationOUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES
SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning
More informationSCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk
SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING DATA SCANNING Data is the lifeblood of many businesses and organisations, access to which is imperative to its productivity and its success. Organising
More informationSecure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
More informationCOMMERCIAL WASTE SERVICES. sharing responsibility
COMMERCIAL WASTE SERVICES sharing responsibility commercial waste management Keeping our customers informed Realising the value of waste Veolia Environmental Services is an international, market-leading
More informationAsset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your
More informationENVIRONMENTAL POLICY STATEMENT
ENVIRONMENTAL POLICY STATEMENT COMPANY NAME ADDRESS COMPANY ACTIVITIES TRACKYOU LTD BLACKWOOD BUSINESS PARK, ASH ROAD SOUTH, WREXHAM, LL13 9UG Telematics Provider of Vehicle Tracking Units to Local Authorities
More informationIT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management
ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
More informationT: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple.
Records Management Made Simple. Document Storage Cyclone offers customers a complete end -to-end service including box collection, bar code tracking, document retrieval, delivery, and status reporting.
More informationyour risks Find out more about our affordable, secure shredding and recycling service.
your risks Find out more about our affordable, secure shredding and recycling service. Veolia Environmental Services understood our needs and recommended an affordable solution for securing and recycling
More informationThat s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.
Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationPharmaceutical Waste
Pharmaceutical Waste Introduction PHS Wastemanagement provides a highly professional clinical waste disposal service to organisations up and down the UK. As the NHS supplier of choice, we provide an unrivalled
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
More informationThis factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
More informationFujitsu Asset Lifecycle Management Services
Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools
More informationInformation retention and disposal guide. Date: 31 October 2014 Version: 2.0
Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case
More informationwww.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
More informationPhysical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
More informationYour Recycling and Refuse Service Standards
Your Recycling and Refuse Service Standards for Lewisham What are Service Standards? Service Standards set out the standards that residents can expect from the Council regarding both recycling and refuse
More informationIT Trading UK Ltd Computer & IT Equipment Disposal Specialists
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk
More informationIslington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
More informationIntelligent Spill Control. & Containment Solutions
Intelligent Spill Control & Containment Solutions 2 PHS Spillcontrol Intelligent Solutions Our aim is to provide peace of mind for our customers, ensuring that your employees are kept safe and that the
More informationWaste management and disposal:
Waste management and disposal: A best practice business guide An ebook produced by FCC Environment 01 Waste management and disposal: a strategy for success Introduction Your guide to waste management FCC
More informationNo More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt.
No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. Data disposal can be a tricky path to navigate. You re looking for an answer, but there aren t many that are 100% reliable, can
More informationHow To Save Money On Health Care Through A Computer System
Save time, save money, save lives BETTER DOCUMENT AND DATA MANAGEMENT FOR THE NHS At a time when funds are scarce, investment in new and improved data management systems can actually create significant
More informationMEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER
MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder
More informationA guide to our recycling And waste management services
A guide to our recycling And waste management services SITA UK provides recycling and waste management services for more than 40,000 organisations across the UK These organisations choose SITA UK because
More informationSmarter Resources Smarter Business Recycling
Smarter Resources Smarter Business Recycling Best Practice Waste and Recycling Contracts for Business February 2014 Best Practice Waste and Recycling Contracts for Business A three step process There is
More informationWaste Type Classification Colour Coding Disposal Method
Sharps Disposal Introduction PHS Waste Management provides a responsive, reliable and flexible sharps disposal services to help eliminate injuries from sharps, needles and syringes. Conscious of our Duty
More informationHow To Destroy Data From A Hard Drive
Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened
More informationINFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:
More informationPAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
More informationInformation governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
More informationNational Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
More informationExternal Communication to Third Parties
External Communication to Third Parties Egress Software Technologies Ltd Unit 16 Quadrant Business Center, 135 Salusbury Road, London, NW6 6RJ T: +44 (0)20 7624 8500 / F: +44 (0)20 7624 8200 / E: info@egress.com
More informationManchester United Old Trafford Stadium
WRAP Resource Management Plan Online Tool for Events Manchester United Old Trafford Stadium The WRAP Resource Management Plan (RMP) for events is a free online tool which can be used by event organisers
More informationInformation Governance
CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this
More informationPayment Card Industry Data Security Standard PCI DSS
Payment Card Industry Data Security Standard PCI DSS What is PCI DSS? Requirements developed by the five card brands: VISA, Mastercard, AMEX, JCB and Discover. Their aim was to put together a common set
More informationProtection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
More informationData Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
More informationCustomer Service. At The Heart Of Our Business
Customer Service At The Heart Of Our Business Our dedicated team of professionals strive to achieve total customer satisfaction at all times through a combination of outstanding commitment, quality and
More informationAppendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management
Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance
More informationDATA SECURITY POLICY. Data Security Policy
Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.
More informationHow To Write A Council Policy On Collection And Recycling
Durham County Council Refuse and Recycling Collection Policy Neighbourhood Services, September 2011 Contents Introduction 3 Policy 1: Assisted collections 4 Policy 2: No side waste 5 a) No side waste (refuse)
More informationTrust Integrity Guardianship Expertise Reliability
Trust Integrity Guardianship Expertise Reliability Introduction History Identity File Centre Document and Data Storage Ltd became a trading subsidiary of Commercial Transfer (Warehousing) Ltd in 2006.
More informationUPDATED WASTE / RECYCLING COLLECTION POLICIES JULY 2014. 1 Households Requiring Additional Residual Containers (grey bins)
UPDATED WASTE / RECYCLING COLLECTION POLICIES JULY 2014 1 Households Requiring Additional Residual Containers (grey bins) Residents are not automatically entitled to additional containers for non-recyclable
More informationService Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)
APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance
More informationEnvironmental Management Systems in Hotels. 15 Steps to the Successful Implementation of an Environmental Management System in a Hotel
Environmental Management Systems in Hotels 15 Steps to the Successful Implementation of an Environmental Management System in a Hotel 2 15 STEPS 1. Assemble the team 2. Initial Review 3. Environmental
More informationSo the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
More informationHelping to protect your business and your customers in the event of a data breach
Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your
More informationThink global THEY SAY and act local HERE S HOW
think global act local Think global THEY SAY and act local HERE S HOW Some companies decide to go green to save money. Some do it to reassure clients, or because clients are expanding their corporate responsibility
More informationIT asset disposal for organisations
ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk
More informationGuide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
More informationBOC Supply Solutions
BOC Supply Solutions 02 BOC Supply Solutions The right solutions from BOC 03 The right solutions from BOC It is important to have reliable choices and options designed to suit your every need. Your processes
More informationTRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales
TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street
More informationInformation Security Policy London Borough of Barnet
Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information
More informationInformation Governance Training Booklet for Pharmacy Staff January 2010
Information Governance Training Booklet for Pharmacy Staff January 2010 dra_schwartz/istock 2 Introduction To ensure compliance with the law and NHS requirements, all staff working in pharmacies that have
More informationA Guide to Minimizing the Risk of IT Asset Disposition
A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its
More informationHighland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
More informationPolicy document on the provision of waste & recycling collection and storage facilities. Includes both domestic and commercial premises
Policy document on the provision of waste & recycling collection and storage facilities Includes both domestic and commercial premises Introduction This document is intended to help relevant parties who
More informationGrasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
More informationThe Environment Team. A-Z Guide. to Waste & Recycling. www.le.ac.uk/environment
The Environment Team A-Z Guide to Waste & Recycling www.le.ac.uk/environment 2 UNIVERSITY OF LEICESTER ENVIRONMENT TEAM Welcome...to the University of Leicester s A-Z Guide to Waste and Recycling. Over
More informationBloomsbury Colleges Environmental Policy Statement
15 December 2011 P a g e 1 Bloomsbury Colleges Environmental Policy Statement The Bloomsbury Colleges are committed to the responsible use of energy, water and other resources with the aim of minimising
More informationCredit cards explained
Credit cards explained What is a credit card? As its name suggests, a credit card lets you buy things on credit meaning that you don t need to have the money upfront to pay for your purchases. If large,
More informationInformation Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationUK s convenient refuelling network, plus tools to help you reduce fuel costs by up to 24%
Dear Sir/Madam, You are just TWO signatures away from complete fuel managment. We would like to take this opportunity to confirm, with thanks, the interest you have expressed in opening a completefleet
More informationsecure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding
secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and
More informationSapphire COMPANY PROFILE
INTERIOR DESIGN PROJECT MANAGEMENT MAIN CONTRACTORS COMPANY PROFILE Sapphire House, 18 Gladstone Road, Croydon, Surrey, CR0 2BQ Telephone:- 020 8665 6226 Fax:- 020 8664 8927 Email:- sales@sapphirecontractors.co.uk
More informationInternal audit report Information Security / Data Protection review
Audit Committee 29 September 2011 Internal audit report Information Security / Data Protection review Executive summary and recommendations Introduction Mazars have undertaken a review of Information Security
More informationCCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate
More informationPolicy. Mobile Phone Use Policy. Contents
Policy Mobile Phone Use Policy Contents Introduction 2 Policy Scope 2 Policy Intent 2 Policy provisions / principles 2 Eligibility 2 Business Functions 2 Issuing Mobile Devices 3 Using a University-owned
More informationYou are just TWO signatures away from controlling your fuel bills.
Dear Sir/Madam, You are just TWO signatures away from controlling your fuel bills. We would like to take this opportunity to confirm, with thanks, the interest you have expressed in opening a BP Plus Fleet
More informationWant to exceed customer expectations and stand out from the crowd? Third party approval of management systems from BRE Global. www.bre.co.
Want to exceed customer expectations and stand out from the crowd? Third party approval of management systems from BRE Global www.bre.co.uk Demonstrate your commitment to quality Quality Management Systems
More informationwww.infoshred.com LLC Your key to secure information management.
www.infoshred.com LLC Your key to secure information management. History of the Company Infoshred began in 1993 as a division of Recyclers LLC, a South Windsor, CT recycling business. Its creation was
More informationCadillac Fairview s GREEN AT WORK Overview
Cadillac Fairview s GREEN AT WORK Overview Cadillac Fairview s Green Vision Statement To establish a legacy of operational excellence founded on the principles of Environmental Protection, Energy Conservation
More informationWaste Management Policy
HEALTH AND SAFETY ISSUES Waste Management Policy Policy No: 39 Date of issue: October 1998 Review Dates: August 2001, December 2003, July 2008 Date to be Reviewed: July 2010 Page 1 of 13 Date of Issue:
More informationCORPORATE IDENTITY FRAUD: A PRIMER
CORPORATE IDENTITY FRAUD: A PRIMER Hanim Norza Baba, Head of Graduate Studies Center, Universiti Teknologi MARA, Melaka, Malaysia. drhanimnorzababa@gmail.com ABSTRACT Corporate identity fraud occurs when
More informationGUIDE ON HOW TO DO BUSINESS WITH LIVERPOOL JOHN MOORES UNIVERSITY
GUIDE ON HOW TO DO BUSINESS WITH LIVERPOOL JOHN MOORES UNIVERSITY PRODUCED BY LIVERPOOL JOHN MOORES UNIVERSITY PROCUREMENT SERVICE First Issued - ISSUED 11 th February 2011 VERSION 5.0 updated 13/04/15
More informationThe nation s largest privately held records and information management company
The nation s largest privately held records and information management company Our mission is clear: to lead the records and information management industry by providing our clients the very best service.
More informationYou are just TWO signatures away from savings on your fuel bill.
Dear Sir/Madam, You are just TWO signatures away from savings on your fuel bill. We would like to take this opportunity to confirm, with thanks, the interest you have expressed in opening an Esso Fleet
More informationDestruction and Disposal of Sensitive Data
Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives
More informationEmpowering sustainable and ethical supply chains
Empowering sustainable and ethical supply chains Sedex is a not for profit global membership organisation dedicated to driving improvements in responsible and ethical business practices in global supply
More informationDocument scanning. Document destruction. Office re-location.
Document scanning. Document destruction. Office re-location. Document scanning. Scanning all of your documents is rarely a practical or cost-effective strategy. Best practice is to identify frequently
More informationYour Readymix Prices & Services explained. No hidden extras.
Your Readymix Prices & Services explained. No hidden extras. Effective January 2016 Contents Welcome 3 Welcome 4 Products and quality 5 Our prices 6 Delivery and returns 7 Payment and support We are delighted
More informationData Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
More informationFindings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014
Findings from ICO audits and reviews of community healthcare providers June 2013 to December 2014 Introduction The Information Commissioner s Office (ICO) is the regulator responsible for ensuring that
More informationRecords Management Plan. April 2015
Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised
More informationIt s not just about the environment
Supply Chain Consultancy It s not just about the environment Sustainable Supply Chains Paul Goose discusses the need to take a wider, more integrated view of operations to ensure long term growth. A great
More informationWest Midlands Police and Crime Commissioner Records Management Policy 1 Contents
West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED
More informationVendor Questionnaire. Financial and Commercial Services
Vendor Questionnaire Financial and Commercial Services Contents Contents... 2 INTRODUCTION... 3 GENERAL BACKGROUND INFORMATION... 4 FINANCIAL INFORMATION... 5 HEALTH & SAFETY... 6 QUALITY ASSURANCE...
More informationCode of Business Principles Helping us do the right thing
Code of Business Principles Helping us do the right thing Code of Business Principles Helping us do the right thing Contents 01 Foreword 02 Who is the code for? 03 Where to find advice or raise a concern
More informationCode of Conduct 1. The Financial Services Authority
The Financial Services Authority Code of Conduct 1 1 The FSA's Code of Conduct should be read in conjunction with the guidance, which is designed to help you understand and apply the provisions of the
More informationINFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY
Information Management & Technology Security Policy INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY POLICY NO IM&T 003 DATE RATIFIED October 2010 NEXT REVIEW DATE October 2013 POLICY STATEMENT/KEY
More informationLandlord/Agent Code of Conduct
Landlord/Agent Code of Conduct Commitment to this is a requirement of the Home Stamp accreditation scheme The Home Stamp Code of Conduct aims to provide guidance and advice regarding the management of
More informationUNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS
WE MAKE IT POSSIBLE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS UNIQUE WHOLESALE HOSTED CENTREX TAKING COMMUNICATION INTO THE CLOUD
More informationDATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
More informationBirmingham Women s NHS Foundation Trust
Birmingham Women s NHS Foundation Trust Data protection audit report Executive summary January 2015 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with
More information