OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES"

Transcription

1 SERVICES OVERVIEW

2 OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning Services Office Relocation Services Onsite Asset Management Services Office PAT Testing Services Data Centre Cleaning Services IT RECYCLING SERVICES PC Disposal Services Computer Remarketing Services Computer Recycling Services Laptop Recycling Services Hard Drive Destruction Services Document Destruction Services Computer Refurbishment Services Data Erasure Services Secure Container Storage Solutions Mobile Phone Recycling Services IT Valuation and Purchasing SUPPLY CHAIN SERVICES Imaging & Hardware Build Services Returns Management Services Secure Collection Services Office Relocation T W 3

3 ACCREDITATIONS... GreensafeIT is one of the most certified IT Recycling ISO Accreditations GreensafeIT are proud to have the following ISO accreditations. ICO Data Protection Registration Number: The Defence Infosec Product Co-operation Group Companies in the UK today. We are proud of our accreditations and it re assures our customers they are dealing with an expert in IT recycling that is focused on security, processes and quality of service. ADISA Accredited Distinction Commercial Insurance Cover Policy Number 080X / N71 Employers Liability 10,000,000 Public and Product Liability 2,500,000 Environmental Liability 1,000,000 Environmental Agency Registered GreensafeIT are an Environmental Agency approved recycling agent. Carrier Broker Dealer - CB/PE5659AF Hazardous Waste Producer - ANH525 Exemptions S2 and T9 - EPR/KE5253AH/A001 Exemption T11 - NCC/059915/2013 T W 5

4 IT RECYCLING... GreensafeIT is a market leading computer recycling business that has over 65 years combined management experience in this sector. We are an ISO14001, ISO9001, ADISA and DIPCOG accredited business. The team have overseen over 3 million devices through the IT recycling lifecycle; this knowledge coupled with first class facilities ensures our customers receive the best possible service and solutions in the market place today. Why Choose GreensafeIT for Computer Recycling Highly secure & certified computer recycling business HMG approved data erasure solutions All staff have been security vetted and approved. Overseen over 3 million devices with 65 years combined management experience Full asset report produced as standard with every computer recycling collection Ability to generate revenue from 80% of equipment returned to us on an average collection Secure dedicated collections with security cleared staff Most certified, secure and comprehensive mobile shredding solutions in the market ISO14001 & ISO9001, ADISA & DIPCOG Certified Approved and certified by the Environment Agency As an experienced IT recycling supplier within the NHS, Education, Central Government and Corporate Space, GreensafeIT is perfectly placed to provide its customer guidance through this complex market. We provide the whole service through five very easy steps that are customers follow: We obtain a list of devices, boxes or pallets we are asked to collect Our security cleared engineers attend site and collect the devices and place them in secure containers The equipment is returned to our operation for data wiping and assessment We sell or dispose of the items depending on the service the customer has requested We send you a detailed report and data erasure certificates for each device we have processed T W 7

5 SECURE HARD DISK SHREDDING SERVICES... GreensafeIT s hard drive destruction and secure shredding service ensures you to keep your information confidential and secure. Our hard drive destruction services are the most secure and cost effective way to permanently destroy your data bearing devices. We have the ability to shred down to 6mm and are standard service is no larger than 11mm shred particles. Our team of security cleared personnel install trust, peace of mind and our solutions complies with the following mandates and standards. HMG Security Policy Framework HMG IA Standard No. 5 Secure Sanitisation ADISA (Asset Disposal Information Security Alliance) JSP 440 Joint Services Publication Data Protection Act 1998 Why Choose GreensafeIT for Secure Hard Drive Shredding Destruction Services Most certified, secure and comprehensive mobile shredding solutions in the market place Ability to process high volumes in one day Highly secure and certified IT recycling business HMG approved shredding solutions All staff have been security vetted and approved Overseen over 3M devices through the IT recycling process Only Mobile ADISA Certified solution in the UK today 65 years combined management experience in the IT recycling industry ISO14001 & ISO9001, ADISA & DIPCOG certified Approved and certified by the Environment Agency Using cutting edge technology, GreensafeIT utilise shredding units that are fit for purpose and can shred up to 3000 devices a day conforming to the most stringent standards and mandates. Secure hard drive shredding destruction services is the most secure ways to ensure your data destruction and data disposal processes are secure whatever your line of business is. The growing threat of identity fraud means it is now more important than ever to ensure your data destruction and data disposal processes for large volumes of electronic information stored in hard drives is secure and handled by a trusted and respected supplier. T W 9

6 DATA ERASURE SOLUTIONS... GreensafeIT can offer various different onsite data erasure services. Our services are aimed at increasing data security whilst reducing any risk of data loss during transit to any location. Our certified engineers will attend site with the relevant equipment to ensure they can handle any issues that may arise whilst undertaking the onsite data erasure activity. Why Choose GreensafeIT Highly secure and certified IT recycling business HMG approved onsite data erasure solutions All staff have been security vetted and approved Overseen over 3M devices with 65 years combined management experience Full asset and data erasure report produced as standard with every activity Ability to generate revenue from 80% of equipment returned to us on average Secure dedicated collections with security cleared staff Most certified, secure and comprehensive IT recycling company in the market GreensafeIT utilise Blancco data erasure software which is a CESG Infosec 5 approved erasure application and the most certified and respected data erasure software in the market place today. All personal or confidential data is wiped from your devices and a certificate is provided per drive for compliance. Typically our customers can request three types of service: Onsite data erasure from within our secure mobile data erasure lab Onsite data erasure from within the customers office or data centre Onsite data erasure and then shredding services from within our secure mobile vehicle which can handle both services Our engineers are able to process high volumes of units with the tools and experience gained over many years delivering onsite services. Each item has a certificate of data erasure produced giving the customer a complete end to end audit process. Essentially the service: Manages data security concerns by erasing sensitive or restricted data at site Provides visual erasure or destruction providing accountability for yourselves Ensures there is no risk of data breach in transit Time and money saved through efficient erasure process ISO14001 & ISO9001, ADISA & DIPCOG certified 0 11 T W

7 DECOMMISSIONING SERVICES... GreensafeIT s philosophy in regards to decommissioning services is one of compliance and failsafe procedures, ensuring a professional solution backup by experienced engineers with years of experience in datacentre decommissioning activities. Why Choose GreensafeIT Most certified, secure and comprehensive solutions in the market place Free site survey for large decommissioning services Provide a clean down services as part of the decommissioning services as standard Ability to process high volumes in one day Highly secure and certified IT recycling business HMG approved data erasure solutions All staff have been security vetted and approved. Overseen over 3M devices with 65 years combined management experience Full asset report produced as standard with every collection Security cleared staff ISO14001 & ISO9001, ADISA & DIPCOG certified Whilst there are many computer recycling companies or ITAD s (Information Technology Asset Disposal Companies) in the market place, our knowledge and expertise separate us from the competition. As a business we have over 65 years of combined senior management experience within the industry and decommissioning services. GreensafeIT has a dedicated team of skilled engineers that are able to assist your teams with the decommission of your data centre and server environment. This is done in a controlled and professional approach by first understanding the environment, the risks associated in removing the hardware and then planning a controlled exit of these devices. Often this incorporates data erasure and HDD shredding solution as part of the overall solution. The teams will complete a detailed risk assessment and site survey to ensure every aspect is documented so both parties can sign off before any work is commenced. These risk assessments will form part of the statement of works that we complete for every onsite activity. The statement of works is signed off by the customer and details the scope of work that is to be completed and any aspects that are to be taken into account. All of our engineers are security cleared, giving our customers peace of mind that the equipment is being handled by skilled security cleared engineers. All of our staff will have photo ID passes and will always wear these when on customer site. Approved and certified by the Environment Agency 2 13 T W

8 DATA CENTRE CLEANING SERVICES... GreensafeIT understands the importance of regular data centre cleaning. It is vital a data centre is decontaminated on a regular basis to reduce the build-up of unwanted and dangerous materials that can put your data centre at risk. Our teams of specialised data centre deep cleaning experts ensure this risk is eradicated. We specialise in data centre decontamination, data centre clinical cleaning, cleaning computer rooms, cleaning server rooms and cleaning communication rooms. All are designed to securely house the core IT systems for any business so it is essential that they are kept clean and well maintained at all times. Any unscheduled downtime causes major disruption to a Company and seriously effects its revenue streams. It is therefore vital to maximise availability, minimise downtime and avoid the risk of invalidating hardware warranties making data centre cleaning a must for any organisation. We can carry out this service on a regular basis either as an isolated activity or as part of a decommissioning project we are undertaking for our customers. Contamination within data centres builds up from internal and external sources. Left unchecked, contamination will, as a minimum, cause equipment to retain heat and at worse, cause equipment to fail. In addition, power requirements will increase as hardware works harder to keeps its environment cool, a key issue within the data centre environment. GreensafeIT s approach to its data centre cleaning services include cleaning of the subfloor void, floor surface buffing and cleaning of the equipment surface to provide a thorough preventive maintenance programme for your computer room. This also ensures you are complying with ISO which is the standard for machine rooms and also helps comply with the manufactures warranty directives If data centre cleaning has never been undertaken in your facility, an initial service site preparation clear down will need to be implemented. This is what we call a deep clean and includes the following: Cleaning of the subfloor void Cleaning all floor and equipment surfaces Cleaning pedestal and stringer substructures Once this has been completed it then allows for follow on preventative clean downs to take place on a structured and scheduled basis. GreensafeIT uses only the most advanced equipment available. In the data centre cleaning process, equipment surfaces are cleaned using tak cloths, with highly interwoven fibres (where applicable, three stage HEPA-filtered vacuums and HEPA Air scrubbers will also be used). All floor panels are cleaned using specialised anti-static equipment and solutions at all times 4 15 T W

9 SECURE OFFICE BOX SOLUTION... WHEELIE BIN LARGE WHEELIE BIN PALLETBOX SECURE PALLETBOX This is designed for secure storage of IT disposal products or confidential documents within the office environment yet can be easily moved around the office or departments within a site. Ideal for storing small IT products such as Hard Disk Drives, USB pens, Optical Media and DLT tapes. This unit is locked with a key and ensures that any data sensitive devices or confidential documents are stored within the office environment securely and safely. the box will hold approximately 100kgs of IT hardware or confidential paper This is designed for secure storage of IT disposal products or confidential documents and is stored in a loading bay or large loading area where access to the unit can be made. This solution can handle large IT products such as PC s, laptops and monitors or large volumes of small IT consumables such as Hard disk drives, DLT tapes, Optical Media and USB pens. It is also designed to store large volumes of confidential documents and files that are generated in an office environment. It has a controlled loading hatch for smaller items so that the box can remain locked whilst users can place products inside the secure bin. the box will hold approximately 400kgs of IT hardware or confidential paper This is designed as a cost effective and flexible IT and confidential documents disposal service. The units can be flat packed easily and when required quickly erected to store large IT products such as PC s, laptops and monitors or large volumes of small IT consumables such as Hard disk drives, DLT tapes, Optical Media and USB pens. It is also designed to store large volumes of confidential documents and files that are generated in an office environment. the box will hold approximately 250kgs of IT hardware or confidential paper This is designed as a very secure, lockable but flexible IT hardware and confidential documents disposal service. The units can be flat packed and when required are quickly erected to store large IT products such as PC s, laptops and monitors or large volumes of small IT consumables such as Hard disk drives, DLT tapes, Optical Media and USB pens. It is also designed to store large volumes of confidential documents and files that are generated in an office environment. the box will hold approximately 250kgs of IT hardware or confidential paper 6 17 T W

10 SECURE COLLECTION SERVICES... GreensafeIT have a fleet of secure collection vehicles that we undertake customer collections with. We also have a dedicated secure collections partner that allows us to securely collect IT from anywhere in the UK at the best possible rates, whilst not compromising the risks associated with collecting redundant IT. Every collection is allocated an MOD security cleared driver to ensure the data and products are treated in accordance with MOD guidelines. This is the most comprehensive security clearance for the collection and logistics industry. This, along with the dedicated collection services ensure the transport for our customers equipment is handled to the highest levels. Every vehicle has satellite tracking to enable us to confirm the vehicles location at any time. To complement this secure collections service we can offer different levels of tracking for our customers. This scope can include: Individually scanning each unit serial and asset number onsite and providing an electronic report once complete Cross checking each device against the customers inventory estate to identify out of scope products Cross referencing each item against a pre- defined list Every secure collections service that we undertake will be collected in a secure plastic pallet box to ensure that the items once scanned and located in the boxes cannot be tampered with until the collection is received at our facility. Each container is locked so the customer has the peace of mind that the items are not only shipped on a dedicated IT collection vehicle but are also locked away in secure pallets. This ensures our secure collection service is the most reliable and resilient in the ITAD industry. 8 T W

11 ABOUT US... GreensafeIT is a company designed to deliver first class IT recycling services to the public & corporate sectors. The board of directors and senior management team have 65 years combined experience in running large scale IT recycling and disposal contracts. During this time they have overseen the disposal and sale of over 3 million devices ranging from complex servers, laptops and telecoms. As an ADISA certified ITAD we our proud of the level of service we provide our customers. Adopting best practice is not something we take lightly and we will continue to invest in systems, people and processes to ensure our operations run to the best of our ability. The World Wide Web is an area where GreensafeIT also excel in today s market place and we are focused on increasing our presence and market reach in these areas. We strongly believe that our customers will benefit from our investment in time and money in this sector We are continuing to invest in our own fleet of collection vehicles, bespoke onsite service trucks, operational facilities and also expanding our partner network across EMEA - GreensafeIT is truly a market leader in services and solutions for the IT recycling industry. To ensure we maintain the highest standards in IT disposals we only use Blancco software for our data erasure services. Blancco is the market leading data erasure product across the world and we ve had senior management relationships with Blancco for over 10 years. Our aim is to remove the risk and hassle for our customers and become a trusted partner in this field and be recognised as a market leading service provider in the IT recycling industry Being a fully certified IT recycling company is something GreensafeIT take very seriously and believe it makes a difference between reputable IT recycling companies. We have a dedicated Quality and Environmental Manager who is focused on continually expanding and maintaining our accreditations such as our ISO and waste management accreditation. As a minimum, we advise our customer should look for a supplier who is ISO9001, ISO14001 certified and hold all of the legal environmental certificates required by law to treat and handle IT waste. GreensafeIT has all of these accreditations and licenses and is a trusted partner for many legal, corporate and public sector organisations. Let GreensafeIT put the jigsaw of IT recycling together ensuring your data is safe and handled in a professional and certified manner T W

12 WHY CHOOSE?... Secure, Cost-Effective it Recycling Solutions World Wide IT Recycling Coverage Highly Secure and Certified Computer Recycling Business HMG Approved Data erasure solutions All staff have been security vetted and approved. Overseen over 3M devices with 65 years combined management experience Full asset report produced as standard with every collection Ability to generate revenue from 80% of equipment returned to us on average Secure dedicated collections with security cleared staff Most Certified, secure and comprehensive mobile Shredding Solutions in the Market ISO14001 & ISO9001, ADISA & DIPCOG Certified Approved and certified by the Environment Agency GreensafeIT is an expert in the field of IT recycling and services. This knowledge has been passed down from the senior management team who have over 65 years combined experience in this market. This not only covers electronic waste recycling but many other complex logistic and engineering services that make GreensafeIT a market leading IT Recycling Company. Our management team has overseen the disposal, resale and refurbishment of over 3 million devices through this complex and ever changing market over the last 15 years. As an ADISA certified member at Distinction level, this experience coupled with industrial approval of our processes and procedures is invaluable when guiding our customers through the legal and environmental compliance issues that occur when delivering and handling these processes. 2 T W

13 GreensafeIT 6 Sherwood Road Aston Fields Industrial Estate Bromsgrove B60 3DR telephone +44 (0)

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

Fujitsu Asset Lifecycle Management Services

Fujitsu Asset Lifecycle Management Services Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools

More information

Shredding. Security. Recycling

Shredding. Security. Recycling Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE

More information

Safe, Secure and Certified Data Destruction Solutions to meet your individual needs

Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened

More information

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET

More information

Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy

Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy Page 1 of 8 Secure Storage, Disposal and Destruction of Electronic Equipment and Media Policy EXECUTIVE SUMMARY Key Messages

More information

document destruction Our passion.

document destruction Our passion. document destruction Your office. Our passion. safeguard Our secure destruction service meets all the necessary compliances and helps to support ISO 9001, ISO 14001 and CSR objectives as well as improving

More information

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

PC asset management policy

PC asset management policy PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

T: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple.

T: 01 88 45 999 www.cyclonearchive.ie. Records Management Made Simple. Records Management Made Simple. Document Storage Cyclone offers customers a complete end -to-end service including box collection, bar code tracking, document retrieval, delivery, and status reporting.

More information

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder

More information

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk

More information

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

MFX RELOCATIONS. Data Centre & Computer Room Relocations

MFX RELOCATIONS. Data Centre & Computer Room Relocations MFX RELOCATIONS MFX Relocations is our specialist relocation division and can undertake any type of commercial move but also undertakes specialist moves which includes:- Specialist IT relocations (Data

More information

Trust Integrity Guardianship Expertise Reliability

Trust Integrity Guardianship Expertise Reliability Trust Integrity Guardianship Expertise Reliability Introduction History Identity File Centre Document and Data Storage Ltd became a trading subsidiary of Commercial Transfer (Warehousing) Ltd in 2006.

More information

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING. www.phsdatasolutions.co.uk. www.phsdatasolutions.co.uk SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING DATA SCANNING Data is the lifeblood of many businesses and organisations, access to which is imperative to its productivity and its success. Organising

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Disposal & Destruction of Sensitive Data

Disposal & Destruction of Sensitive Data Disposal & Destruction of Sensitive Data Contents 1 Overview of Data Media Types 1.1 Non-Volatile Magnetic: Hard Disk Drives 1.2 Write Once Optical: CDROM and DVD- 1.3 Write Many Optical: CD-RW and DVD-RW

More information

NHS Information Governance:

NHS Information Governance: NHS Information Governance: Information Risk Management Guidance: Maintenance and Secure Disposal of Digital Printers, Copiers and Multi Function Devices Department of Health Informatics Directorate July

More information

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing

More information

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0 Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case

More information

Products and Services

Products and Services Products and Services Canvas Systems is the largest global independent reseller of refurbished server hardware, with over 13 years of experience within the industry. With over 50 million worth of new and

More information

IT asset disposal for organisations

IT asset disposal for organisations ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk

More information

Support Services. Engineering solutions for operational excellence SERVING THE WORLD S RAILWAYS. Technical. Manufacturing Services

Support Services. Engineering solutions for operational excellence SERVING THE WORLD S RAILWAYS. Technical. Manufacturing Services hain ces Technical Support Technical Support Overhaul & Repair Manufacturing Product Innovation & Technology Consultancy Products Engineering solutions for operational excellence SERVING THE WORLD S RAILWAYS

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

Building an ITAD Program:

Building an ITAD Program: Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by

More information

Secure IT Relocation & Technical Solutions

Secure IT Relocation & Technical Solutions Secure IT Relocation & Technical Solutions We have yet to meet a more professional and dedicated team. The Sunspeed service is second to none. CGI Insight & knowledge Established in 1987, Sunspeed is one

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt.

No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. No More Disks. No More Data. No More Doubt. Goodbye Disks. Goodbye Doubt. Data disposal can be a tricky path to navigate. You re looking for an answer, but there aren t many that are 100% reliable, can

More information

RECORDS MANAGEMENT & DIGITISING SPECIALISTS

RECORDS MANAGEMENT & DIGITISING SPECIALISTS RECORDS MANAGEMENT & DIGITISING SPECIALISTS DOCUMENT STORAGE VAULT STORAGE MEDIA STORAGE DOCUMENT RESTORATION HIGH SPEED DOCUMENT SCANNING DOCUMENT DESTRUCTION CONSULTANCY www.grm.ie www.grm.ie 1 Our records

More information

IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012

IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012 IT Asset Management Procedure (QM)DT/001 Support Procedure Written by Martin Crane Version 1.3 11/08/2012 Revision Version Summary of Changes Contributor date 22/08/2008 1 Initial Draft Martin Crane 22/07/2010

More information

DATA SECURITY POLICY. Data Security Policy

DATA SECURITY POLICY. Data Security Policy Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

Internal audit report Information Security / Data Protection review

Internal audit report Information Security / Data Protection review Audit Committee 29 September 2011 Internal audit report Information Security / Data Protection review Executive summary and recommendations Introduction Mazars have undertaken a review of Information Security

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Void, Exit Cleaning & Disaster Recovery for Social Housing

Void, Exit Cleaning & Disaster Recovery for Social Housing Void, Exit Cleaning & Disaster Recovery for Social Housing Including Specialist Cleaning Services - Biohazard cleaning - Crime and trauma scene cleaning - Graffiti removal - Pest control Reliability n

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Connecting your business

Connecting your business mobiles Connecting your business fixed voice & data digital & IT autovoice managed services adsi energy About us Founded in 2002, ADSI are dedicated to reducing business costs by offering high-quality

More information

your risks Find out more about our affordable, secure shredding and recycling service.

your risks Find out more about our affordable, secure shredding and recycling service. your risks Find out more about our affordable, secure shredding and recycling service. Veolia Environmental Services understood our needs and recommended an affordable solution for securing and recycling

More information

Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance

Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Partner Capability Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Company overview About us CCE is one of the UK s largest independent IT

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

MPI Aviation Limited the source and supply of aviation personnel worldwide

MPI Aviation Limited the source and supply of aviation personnel worldwide MPI Aviation Limited the source and supply of aviation personnel worldwide CIVIL & MILITARY AIRCRAFT DESIGN & ENGINEERING MANUFACTURE MAINTENANCE, REPAIR & OVERHAUL MODIFICATIONS PROJECT MANAGEMENT SPECIALIST

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

Records Management Plan. April 2015

Records Management Plan. April 2015 Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk

Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

Environmental Policy. JRI Orthopaedics Limited

Environmental Policy. JRI Orthopaedics Limited JRI Orthopaedics Limited October 2014 Contents Clause 1. Policy Statement 1 2. Who is covered by the policy? 2 3. Organisation and Responsibilities 2 4. Training and Communication 3 5. Suppliers and Customers

More information

www.grm.ae OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION

www.grm.ae OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION HIGH SPEED SCANNING SERVICES DOCUMENT DESTRUCTION CONSULTANCY www.grm.ae GRM

More information

Responsibly Retiring IT Assets, Medical or Laboratory Equipment

Responsibly Retiring IT Assets, Medical or Laboratory Equipment Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security

More information

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1.

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1. Data Security Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2011 Owner Secure Research Database Analyst Change History

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Document scanning. Document destruction. Office re-location.

Document scanning. Document destruction. Office re-location. Document scanning. Document destruction. Office re-location. Document scanning. Scanning all of your documents is rarely a practical or cost-effective strategy. Best practice is to identify frequently

More information

Challenges and Solutions for Effective SSD Data Erasure

Challenges and Solutions for Effective SSD Data Erasure Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125

COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 Minnesota State Colleges & Universities and Asset Recovery Corporation COMPUTER & ELECTRONICS DISPOSITION CONTRACT MNSCU CONTRACT #: CST - 125 CONTRACT EFFECTIVE UNTIL: SEPTEMBER 15, 2014 http://www.finance.mnscu.edu/contracts-purchasing/collaborative/index.html

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

Ardington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving.

Ardington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving. Ardington Archives Components of the process Audit of needs Cataloguing Retrieval Collection and deposit Destruction The archiving process 3 Section Contents ARCHIVING PROCESS The archiving process Reference

More information

Commercial Cleaning & Restoration Services

Commercial Cleaning & Restoration Services Commercial Cleaning & Restoration Services Offering you n Reliability n Professionalism n Flexibility n Responsiveness n Value for Money Comprehensive Services For your Commercial Cleaning requirements,

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup

Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup www.cloudsecure.co.uk/cloudsecure 1 Accountants and Solicitors Firms Professional organisations such as accountancy and solicitors firms have an ever increasing

More information

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6

TABLE OF CONTENTS MRK GROUP LTD CAPABILITIES 2 GSA AWARDED TERMS AND CONDITIONS 3 AWARDED GSA PRICE LIST 6 GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE 899-ENVIRONMENTAL SERVICES AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract ordering information, terms and conditions, up-to-date

More information

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files. Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely

More information

Renfrewshire Valuation Joint Board. Records Management Plan

Renfrewshire Valuation Joint Board. Records Management Plan Renfrewshire Valuation Joint Board Records Management Plan The Board s arrangements for the management of records under the Public Records (Scotland) Act 2011 January 2016 Version 8 Title Records Management

More information

Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media

Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g.

More information

IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY

IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY Purpose The purpose of this policy is to provide the IFRS Foundation with a framework to govern management decisions on whether particular documents

More information

MOVING OFFICE CHECKLIST

MOVING OFFICE CHECKLIST MOVING OFFICE CHECKLIST Any office move requires a great deal of planning and careful thought beforehand - and strong commitment all round, both before and during the move. This Checklists assumes that

More information

G Cloud LOT 2 - PLATFORM AS A SERVICE XMA ENTERPRISE SCHOOL SOLUTION XMA VIRTUAL CAMPUS SECURE HYBRID SOLUTION

G Cloud LOT 2 - PLATFORM AS A SERVICE XMA ENTERPRISE SCHOOL SOLUTION XMA VIRTUAL CAMPUS SECURE HYBRID SOLUTION Cloud computing has brought about a step change in the economics and sustainability of Information and Communication Technology (ICT). Government is committed to the adoption of cloud computing and delivering

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

Claims Management & Restoration Services

Claims Management & Restoration Services Claims Management & Restoration Services Offering the Insurance Industry n Reliability n Professionalism n Flexibility n Responsiveness n Value for Money 24 7 365 What Our Clients Customers Say It is with

More information

At its meeting in March 2012, the Committee approved the Internal Audit Plan for 2012-13.

At its meeting in March 2012, the Committee approved the Internal Audit Plan for 2012-13. Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Keep Your Business Moving with Custom Technology Leasing

Keep Your Business Moving with Custom Technology Leasing Keep Your Business Moving with Custom Technology Leasing A custom Technology Lease from Data Sales Co. gives you the technology your business needs to succeed, with innovative financing, flexible terms,

More information

IT Asset disposition services

IT Asset disposition services IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should

More information

Dell Service Description

Dell Service Description Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service

More information

COMMERCIAL WASTE SERVICES. sharing responsibility

COMMERCIAL WASTE SERVICES. sharing responsibility COMMERCIAL WASTE SERVICES sharing responsibility commercial waste management Keeping our customers informed Realising the value of waste Veolia Environmental Services is an international, market-leading

More information

ENVIRONMENTAL POLICY STATEMENT

ENVIRONMENTAL POLICY STATEMENT ENVIRONMENTAL POLICY STATEMENT COMPANY NAME ADDRESS COMPANY ACTIVITIES TRACKYOU LTD BLACKWOOD BUSINESS PARK, ASH ROAD SOUTH, WREXHAM, LL13 9UG Telematics Provider of Vehicle Tracking Units to Local Authorities

More information

Service Description: Notebook Buy-Back Program

Service Description: Notebook Buy-Back Program Dell Services Service Description: Notebook Buy-Back Program Service Overview Dell is pleased to offer the Notebook Buy-Back Program ( Program ) to U.S. commercial customers. By participating in the Program,

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

MDS TECHNOLOGIES MEDIA

MDS TECHNOLOGIES MEDIA MDS TECHNOLOGIES MEDIA MAGNETIC MEDIA STORAGE MDS has been storing magnetic media for our hosting customers for many years, and we have now formally set up MDS Media to manage this service. Security of

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 29/01/2016 HSCIC Audit of Data Sharing

More information

Level 2 Certificate in Warehousing and Storage Skills (QCF)

Level 2 Certificate in Warehousing and Storage Skills (QCF) Level 2 Certificate in Warehousing and Storage Skills (QCF) Qualification Handbook www.cityandguilds.com September 2010 Version 1.1 Level 2 Certificate 1016-02 QAN 501/1082/2 About City & Guilds City &

More information