JUST JUST WON T CUT IT. hen your PERSONAL SHREDDER. ShredStation Express. Thank You WON T CUT IT. when your JUST PERSONAL SHREDDER WON T CUT IT

Size: px
Start display at page:

Download "JUST JUST WON T CUT IT. hen your PERSONAL SHREDDER. ShredStation Express. Thank You WON T CUT IT. when your JUST PERSONAL SHREDDER WON T CUT IT"

Transcription

1 hen your Thank You for your interest in franchising ShredStation Express

2 About Us ShredStation Express is a leader in residential and small business information destruction and recycling. Through its various destruction services, ShredStation Express exists to help customers prevent ID theft, comply with privacy legislation and protect the environment. ShredStation Express isn t just focused on destroying paper or electronics; we are in the business of destroying information. While we feel it is essential to recycle paper or old electronics, our top priority is to destroy the information contained in each product to protect the privacy of our customers. hen your

3 Most people have several boxes of sensitive documents or an old computer that they know they should destroy, but they don t know who to call to get rid of it securely. ShredStation Express is a home and business pickup service that can destroy those documents and electronics. We enable consumers and businesses to establish a formal system for destruction to comply with privacy laws and avoid fines for improper disposal. Identity theft and personal privacy invasion are at all time highs. The careless disposal of sensitive information can lead to a world of trouble. Simply putting documents in the trash can not only cost people their identity and ruin a good credit score, but as a business, companies could be breaking the law and risking thousands of dollars in fines. ShredStation Express is a document destruction company that helps protect customers from invasions of privacy and ID theft. ShredStation Express dispatches service vans to homes and small businesses to pick up and destroy sensitive documents. There is no limit to the number of boxes ShredStation Express will pick up and the company will also destroy old computers and other e-media including cell phones and PDAs. The service is ideal for customers that have several boxes full of information and can t justify spending the amount required to have their home serviced by an industrial shredding company nor do they want to spend hours trying to use a home shredder How ShredStation Express works: A customer places an order and schedules a pickup online at or by calling SHREDXP. A Certified Destruction Agent will confirm the pick-up day and time and arrive at the designated pick-up site when scheduled. The Agent takes the boxes to a ShredStation Secure Destruction Facility and destroys all materials. The customer receives a Certificate of Destruction via mail or .

4 Market Drivers The destruction of documents and e-media containing sensitive and private information is getting a significant push from several angles. These market drivers continue to advance ShredStation s place in the market and have been key factors in the company s rapid growth. Identity Theft Awareness Identity theft and privacy protection awareness are at all-time highs due to hen your constant media attention and an increasing number of data breaches affecting millions of people. Identity theft is the fastest growing crime in America. Nearly 9 million reported adult victims in 2007 (children are increasingly becoming victims as well). Nearly $50 billion annual losses in Legislation The FACTA Disposal Rule requires companies as well as individuals with access to consumer data to destroy any material containing personal information. HIPAA requires Health Care Providers to anticipate and safeguard against breaches in security; violations are punishable with up to 10 years imprisonment and $250,000 in fines (2007 had 7,176 violations the most ever). The Gramm-Leach-Bliley Act Safeguard Rule and Financial Privacy Rule set guidelines for companies on the collection and disclosure of customers financial information. Dramatic increase in Government prosecution - in 2007 more than 470 companies were found guilty of data breaches responsible for exposing the private information of more than 127 million people. 44 states, the District of Columbia and Puerto Rico have adopted breach notification laws, adding pressure for companies and individuals to establish systematic and secure destruction programs. Environmental Awareness & Recycling Increased awareness of environmental issues including global warming and rising greenhouse gasses, energy conservation and the importance of recycling. Consumers are seeking alternatives for disposal of material that would otherwise end up in the e-waste stream overseas or in domestic landfills.

5 Market Potential A host of factors are contributing to the success of ShredStation Express and demand for our services in the residential and small/medium-sized business markets. Personal/Home shredder sales are over $700 million, yet there is a consistent decline in consumer satisfaction with these products. 22 million businesses with less than 10 employees, and 90 million households. 25 million people working from home offices/telecommuting, who must individually protect and properly dispose of proprietary company information. More than 70 million Baby Boomers retaining unnecessary personal records. I was looking into a number of franchise opportunities from restaurants to cleaning services and none of them were able to give me the kind of flexibility ShredStation Express TM could offer. Other franchises require round-the-clock and weekend hours but with Express, you operate during normal business hours and spend very little time at a desk. Joseph Stover, York, PA

6 Electronic Media Destruction A significant opportunity for ShredStation Express franchises is the destruction and recycling of electronic media. More than 1 billion obsolete electronic devices and computers containing sensitive data are in homes and offices throughout the country (500 million expired in 2006 alone). Considering the rate at which we all consume the latest technology and the frequency at which our electronics are updated and improved (made faster, more memory, etc.), there will be even more sensitive data contained in these devices resulting in an even greater need for it to be securely destroyed. As with our commitment to paper recycling, none of the electronic media we destroy hen yourwill PERSONAL ever end up in SHREDDER landfills. As a ShredStation Express Franchise, you benefit from state-of-the-art Secure Erase technology to deliver the most secure and complete hard drive destruction to businesses and consumers alike. Our Digital ShredStation TM system has been approved by Government agencies including the Department of Defense, the FDIC and countless other groups for whom security is a priority. Secure Erase sanitizes hard drives beyond forensic reconstruction without compromising care, custody and control. Compact mobile units enable franchisees to provide on-site hard drive destruction to customers and businesses in an efficient and affordable way. Provides customers with a reusable asset once data s been destroyed. So it s a green solution. As a business in California, we have some of the most aggressive environmentally-conscious legislation and business practices. I am seeing a lot of added benefits to being such an environmentally friendly business. Not only do I own my own business, but I have the satisfaction of really helping my customers take care of something important to them and their family. Sandy Caso, San Diego, California

7 What you get Operations: ShredStation Inc. brand power affords you the ability to operate your ShredStation Express business under our trusted and established name. Centralized Call Center handles all orders and customer inquiries so you can focus on growing your business. State-of-the-art proprietary order placement, disbursement and e-commerce system. Simple operating model focused on service and security. Fully branded vehicle with Global Positioning System. Hand-held barcode scanner and printer. Franchise Starter Package that includes business cards, letterhead, stationery, branded literature and sales collateral. Automated technology enabling you to manage your customer relationships. Access to ShredStation s Intranet, newsletters, sales meetings, conferences and webinars. Digital ShredStation. This is a machine that digitally sanitizes hard drives to remove all data.

8 Training: field training. hen your A comprehensive, in-depth training program combining classroom-style and Includes detailed instruction on the overall industry, how to get your business up and running, how to maximize profits, sales and marketing, vehicle safety, plus on-site field training with current franchisees. Identity theft risk management training certification program available. Refresher courses as needed for you or your staff. Coaching/mentoring by experienced franchisees. Marketing: Access to a robust local marketing program featuring a variety of proven promotional/marketing materials and tactics. Access to a database of sample advertising for a variety of media including print, radio and Internet promotions. Guidance through the development of sales-generating strategic partnerships. Group purchasing power resulting in reduced rates for uniforms, equipment and advertising. EXPRESS INFORMATION Most people have several boxes of sensitive documents or an old computer that they know they should destroy, but they don t know who to call to get rid of it securely. ShredStation Express is a home and business pick-up service that can destroy those documents and electronics. We enable consumers and businesses to establish a formal system for destruction to comply with privacy laws and avoid fines for improper disposal. Identity theft and personal privacy invasion are at all time highs. The careless disposal of sensitive information can lead to a world of trouble. Simply putting documents in the trash can not only cost people their identity and ruin a good credit score, but as a business, companies could be breaking the law and risking thousands of dollars in fines. ShredStation Express is a locally [franchise] owned and operated document destruction service that helps protect customers from invasions of privacy and ID theft. ShredStation Express dispatches service vans to homes and small businesses to pick up and destroy sensitive documents. There is no limit to the number of boxes ShredStation Express will pick up and the company will also destroy old computers and other e-media including cell phones and PDAs. The service is ideal for customers that have several boxes full of information and can t justify spending the amount required to have their home serviced by an industrial shredding company nor do they want to spend hours trying to use a home shredder. Training Marketing Materials Equipment

9 The Investment ShredStation Express Franchises offers one of the lowest investments available and a high potential for growth. The initial investment and ongoing fees required for franchise operations are listed in detail in the company s FDD. Home Office Storefront/Light Industrial Initial Franchise Fee per Exclusive Territory (up to 100K population)* $25,000 (one time fee) $25,000 (one time fee) Marketing Fee $6,000 (one time fee) $6,000 (one time fee) Start-up Investment (down payments, facility-related expenses, equipment, etc) $15,000 - $20,000 $74,000** Working Capital (first year) $45,000 $75,000 Investment Range $91,000 - $96,000 $180,000 NOTE: These amounts are an approximation and may vary, upward or downward, depending upon your existing operation, office location and region of the country. * Additional Exclusive Territory Fees (ea. additional 100K population) = $5000 ** May vary due to cost and terms of equipment purchase I initially wasn t sure I wanted to start a franchise in an industry I knew so little about but ShredStation Express gave me the insight and tools I needed to hit the ground running. They made the entire process of owning my own business very efficient, affordable and enjoyable. Bob Nichols, Fairfield, CT

10 How to Obtain Your Own ShredStation Express Franchise Review information included in this Welcome Kit. Complete confidential application for Franchise. Participate in one of our information Webinars. hen your accepted. Application reviewed and qualifications Receive and review Franchise Disclosure Document (FDD). Conference call with ShredStation Express so we can get to know you better. Schedule a personal meeting with company management. Execute Franchise Agreement and submit franchise fee. With a customized branded vehicle, ShredStation Express training, and experienced marketing support for your opening, your successful ShredStation Express franchise will be ready for business!

11 Notes

12 hen your We re looking for savvy, dependable and enterprising individuals ready to take part in our high-growth franchise opportunity. If you have not already submitted your contact information, please visit and click request more information. We will contact you shortly to answer any questions you may have about starting a ShredStation Express Franchise. We re looking forward to getting you one step closer to owning your own business. SXP00102

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

CSR Breach Reporting Service Frequently Asked Questions

CSR Breach Reporting Service Frequently Asked Questions CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,

More information

Windows. of opportunity. multiple revenue streams! E x p l o r e t h e

Windows. of opportunity. multiple revenue streams! E x p l o r e t h e Windows E x p l o r e t h e of opportunity benefit from 6service categories offering... multiple revenue streams! ? 3 More Would you like out of Life Would you like the freedom and ability to guide your

More information

document destruction Our passion.

document destruction Our passion. document destruction Your office. Our passion. safeguard Our secure destruction service meets all the necessary compliances and helps to support ISO 9001, ISO 14001 and CSR objectives as well as improving

More information

A California Business Privacy Handbook

A California Business Privacy Handbook A California Business Privacy Handbook April 2008 This brochure is for informational purposes and should not be construed as legal advice or as policy of the State of California. If you want advice in

More information

A UNIQUE FRANCHISE. OPPORTUNITY Work with your dog! The #1 NAME in Goose Control. Learn about a business you can operate with. www.geesechasers.

A UNIQUE FRANCHISE. OPPORTUNITY Work with your dog! The #1 NAME in Goose Control. Learn about a business you can operate with. www.geesechasers. The #1 NAME in Goose Control A UNIQUE FRANCHISE TM OPPORTUNITY Work with your dog! Learn about a business you can operate with MINIMUM investment MINIMUM staff MINIMUM time www.geesechasers.com Geese Chasers,

More information

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:

More information

8/28/2015. How to Manage Records. Overview. Learning Objectives. Do you have? Does your office look like this?

8/28/2015. How to Manage Records. Overview. Learning Objectives. Do you have? Does your office look like this? How to Manage Records Records Management Services State of Michigan Overview Common Recordkeeping Problems Risk Management Keeping Records Storing Records Destroying Records Getting Organized Learning

More information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides

More information

Guylyn Cummins, Esq. Elizabeth Balfour, Esq.

Guylyn Cummins, Esq. Elizabeth Balfour, Esq. Privacy Law Perils in California, the Nation and Beyond: Securing Data, Responding to Theft of Data and Other Business Assets, Assessing Your Company s Privacy Policy, Evaluating Risks Presented by Your

More information

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996.

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. HIPAA Training What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. It provides the ability to transfer and continue health insurance coverage for workers

More information

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

your risks Find out more about our affordable, secure shredding and recycling service.

your risks Find out more about our affordable, secure shredding and recycling service. your risks Find out more about our affordable, secure shredding and recycling service. Veolia Environmental Services understood our needs and recommended an affordable solution for securing and recycling

More information

1-800-The-Maids www.themaidsfranchise.com

1-800-The-Maids www.themaidsfranchise.com 1-800-The-Maids www.themaidsfranchise.com The Maids was founded in 1979 as a residential housecleaning service. In 1980 we began franchising our system, and today we have offices across the U.S. and Canada.

More information

HIPAA. August 12, 2008

HIPAA. August 12, 2008 HIPAA August 12, 2008 What does HIPAA mean? Health Insurance Portability and Accountability Act Intended to improve portability of health insurance coverage Intended to reduce waste, fraud and abuse Intended

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA PURPOSE PURPOSE This document provides guidance to offices about protecting sensitive customer and company information. The protection of Non-public Personal

More information

Using Managed Print Services to Improve Document Security

Using Managed Print Services to Improve Document Security Using Managed Print Services to Improve Document Security A Staples, Inc. White Paper September 2012 Using Managed Print Services to Improve Document Security By Staples Technology Solutions Summary Keeping

More information

APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY

APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY GENERAL INFORMATION 1. APPLICANT NAME: 2. PHONE: 3. MAILING ADDRESS: 4. WEB ADDRESS: 5. The following officer of the Applicant is designated

More information

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures

Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 1 What Is HIPAA? HIPAA (pronounced hippa) is a federal law. It s a set of rules and regulations that affect

More information

PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina

PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest

More information

We are the solution. erecycling. We have the solution. made easy.

We are the solution. erecycling. We have the solution. made easy. We have the solution. erecycling made easy. Nowadays, business and technology go hand in hand. But what happens to those old or unwanted electronics? The answer, more often than not, is: nothing. We stack

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Breach Notification Policy

Breach Notification Policy 1. Breach Notification Team. Breach Notification Policy Ferris State University ( Ferris State ), a hybrid entity with health care components, has established a Breach Notification Team, which consists

More information

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

The nation s largest privately held records and information management company

The nation s largest privately held records and information management company The nation s largest privately held records and information management company Our mission is clear: to lead the records and information management industry by providing our clients the very best service.

More information

Media Disposition and Sanitation Procedure

Media Disposition and Sanitation Procedure Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

Building an ITAD Program:

Building an ITAD Program: Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6 GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE 899-ENVIRONMENTAL SERVICES AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms and conditions, up-to-date

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, 5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

Shredding. Security. Recycling

Shredding. Security. Recycling Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

Five Ways to Reduce Fuel Consumption Using GPS Tracking

Five Ways to Reduce Fuel Consumption Using GPS Tracking Fleet management technology is changing the way fleet managers look at vehicle fuel consumption. Every fleet, big or small, must pay for fuel. The challenge is to consume it in the most effective way possible.

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

www.grm.ae OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION

www.grm.ae OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION HIGH SPEED SCANNING SERVICES DOCUMENT DESTRUCTION CONSULTANCY www.grm.ae GRM

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING DATA SCANNING Data is the lifeblood of many businesses and organisations, access to which is imperative to its productivity and its success. Organising

More information

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Who s Afraid Of A Big Bad Breach?: Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Overview Identifying the laws that protect personal information and protected

More information

Texas Medical Records Privacy Act

Texas Medical Records Privacy Act A COALFIRE PERSPECTIVE Texas Medical Records Privacy Act Texas House Bill 300 (HB 300) Rick Dakin, CEO & Co-Founder Rick Link, Director Andrew Hicks, Director Overview The State of Texas has pushed ahead

More information

Accident Claim Form. (Not to be used if you are filing a disability claim)

Accident Claim Form. (Not to be used if you are filing a disability claim) Fax to: Claims 1.800.880.9325 From: No#of pages: Or Mail to: P.O. Box 100195 Columbia SC 29202-3195 Accident Claim Form (Not to be used if you are filing a disability claim) Please be sure to send the

More information

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule

Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule HEALTHCARE October 2009 Barnes & Thornburg LLP HIPAA Update: HITECH Act Breach Notification Rule This HIPAA Update provides a detailed description of the new breach notification requirements for HIPAA

More information

SUSTAINABILITY CHARTER. May 2012. 1 R&CA Sustainability Charter V1

SUSTAINABILITY CHARTER. May 2012. 1 R&CA Sustainability Charter V1 SUSTAINABILITY CHARTER May 2012 1 R&CA Sustainability Charter V1 Introduction By their very nature, restaurant and catering businesses are significant users of energy, water and raw materials. Cooking

More information

Comprehensive repair programs from the nation s leading repair services provider

Comprehensive repair programs from the nation s leading repair services provider National Coverage Comprehensive repair programs from the nation s leading repair services provider Trusted Brand Improved Customer Experience SEARS THIRD PARTY REPAIR As the nation s leading repair service

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Responding to New Identity Theft Laws

Responding to New Identity Theft Laws Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

Growing a successful business that fits into your life

Growing a successful business that fits into your life Growing a successful business that fits into your life little impressions The distinctive Little Impressions look here a single hand on a terracotta mount, box framed in oak. Creating your own work/life

More information

GROUP LIFE CLAIM KIT FOR PROCESSING LIFE INSURANCE AND ACCIDENTAL DEATH BENEFITS BY A THIRD PARTY ADMINISTRATOR

GROUP LIFE CLAIM KIT FOR PROCESSING LIFE INSURANCE AND ACCIDENTAL DEATH BENEFITS BY A THIRD PARTY ADMINISTRATOR GROUP LIFE CLAIM KIT FOR PROCESSING LIFE INSURANCE AND ACCIDENTAL DEATH BENEFITS BY A THIRD PARTY ADMINISTRATOR PLEASE SUBMIT THE FOLLOWING: INSTRUCTIONS FOR FILING A LIFE INSURANCE CLAIM 1. THE CLAIM

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Lessons Learned from HIPAA Audits

Lessons Learned from HIPAA Audits Lessons Learned from HIPAA Audits October 29, 2012 Tony Brooks, CISA, CRISC Partner - IT Assurance and Risk Services HORNE LLP AGENDA HIPAA/HITECH Regulations Breaches and Fines OCR HIPAA/HITECH Compliance

More information

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization

More information

Executive Summary. Introduction

Executive Summary. Introduction Written Testimony of Ravi Pendse, Ph.D. Vice President and Chief Information Officer Brown University Cisco Fellow Professor of Practice, Computer Science and Engineering Before the U.S. Senate Committee

More information

College of DuPage Information Technology. Information Security Plan

College of DuPage Information Technology. Information Security Plan College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data

More information

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information

More information

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014

HIPAA BREACH NOTIFICATION REQUIREMENTS. Heman A. Marshall, III July 25, 2014 1 HIPAA BREACH NOTIFICATION REQUIREMENTS Heman A. Marshall, III July 25, 2014 2 SCENARIO FOR VBA SUMMER MEETING The Medical Marijuana Growers Association (MMGA) Health Plan, which is a self-fund plan,

More information

RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration

RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration RUTGERS POLICY Section: 30.4.5 Section Title: Business Services Policy Name: Records Management Formerly Book: Formerly Policy 50.3.10 Approval Authority: Executive Vice President for Academic Affairs

More information

SERVICE DRIVE CONCIERGE TM. Delivering a 5-Star, Concerted Customer Experience with RFID Technology

SERVICE DRIVE CONCIERGE TM. Delivering a 5-Star, Concerted Customer Experience with RFID Technology SERVICE DRIVE CONCIERGE TM Delivering a 5-Star, Concerted Customer Experience with RFID Technology MINUTES MATTER. When a customer pulls into your service department, the tiny clock inside their head immediately

More information

IHOP is more than a place where breakfast lovers love to have breakfast.

IHOP is more than a place where breakfast lovers love to have breakfast. IHOP: An overview For 54 years, the IHOP family restaurant chain has served our world famous pancakes and a wide variety of breakfast, lunch and dinner items that are loved by people of all ages offering

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next

More information

LIFE CLAIM KIT FOR PROCESSING LIFE INSURANCE AND ACCIDENTAL DEATH BENEFITS

LIFE CLAIM KIT FOR PROCESSING LIFE INSURANCE AND ACCIDENTAL DEATH BENEFITS LIFE CLAIM KIT FOR PROCESSING LIFE INSURANCE AND ACCIDENTAL DEATH BENEFITS INSTRUCTIONS FOR FILING A LIFE CLAIM On behalf of Boston Mutual Life Insurance Company, please accept our sincere condolences

More information

HIPAA And Public Health. March 2006 Delaware s Division of Public Health 1

HIPAA And Public Health. March 2006 Delaware s Division of Public Health 1 HIPAA And Public Health March 2006 Delaware s Division of Public Health 1 HIPAA The purpose for HIPAA (Health Insurance Portability & Accountability Act) is to protect the confidentiality, integrity, and

More information

Leaders Life Insurance Accident Claim Filing Instructions

Leaders Life Insurance Accident Claim Filing Instructions Leaders Life Insurance Accident Claim Filing Instructions Page One Filing Instructions: Complete the appropriate sections of the claim form (page 2) Attach an itemized billing from your provider which

More information

Identity Theft Security and Compliance: Issues for Business

Identity Theft Security and Compliance: Issues for Business Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities Protecting Personal Information A Business Guide Division of Finance and Corporate Securities Oregon Identity Theft Protection Act Collecting, keeping, and sharing personal data is essential to all types

More information

Data Breach 101 How to Avoid a Virtual Catastrophe

Data Breach 101 How to Avoid a Virtual Catastrophe Data Breach 101 How to Avoid a Virtual Catastrophe Presented by Eduard Goodman, J.D., LL.M., CIPP Chief Privacy Officer In partnership with IDentity Theft 911 is solely responsible for the content of this

More information

No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt.

No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. Data disposal can be a tricky path to navigate. You re looking for an answer, but there aren t many that are 100% reliable, can

More information

Hospital Confinement/Outpatient Surgery Claim

Hospital Confinement/Outpatient Surgery Claim FAX this direction If your name has changed, attach a copy of your driver s license or other legal documentation. Hospital Confinement/Outpatient Surgery Claim FAX this form: 1-800-880-9325 Or mail: P.O.

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

COMBINED INSURANCE COMPANY OF AMERICA INSTRUCTIONS FOR FILING CLAIMS

COMBINED INSURANCE COMPANY OF AMERICA INSTRUCTIONS FOR FILING CLAIMS COMBINED INSURANCE COMPANY OF AMERICA INSTRUCTIONS FOR FILING CLAIMS GETTING STARTED Follow the Claimant Instructions below to complete the form. Upon completion of the first page you can: Mail OR fax

More information

Data Integrity & Technical Ethics

Data Integrity & Technical Ethics ACCUTEST LABORATORIES Data Integrity & Technical Ethics January 2012 What is Data Integrity? Data that has been produced to the ethical standards of the industry, which is traceable and defensible. What

More information

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services

CD ROM, Inc. 2014 Commercial Catalog. Destruction and Recycling Services Destruction and Recycling Services An ISO 9002-compliant company Audited 100% data destruction and green recycling 2014 Commercial Catalog Edition 2014 www.cdrominc.com CD Rom, Inc. Table of Contents About

More information

Beazley presentation master

Beazley presentation master The Art of Breach Management Beazley presentation master February 2008 A Brief Review of Data Breaches What is a Data Breach? Actual release or disclosure of information to an unauthorized individual/entity

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008 AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment

More information

HIPAA Update Focus on Breach Prevention

HIPAA Update Focus on Breach Prevention HIPAA Update Focus on Breach Prevention Objectives By the end of this program, participants should be able to: Identify top reasons why breaches occur Review the breach definition and notification process

More information