secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding

Similar documents
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

Speed the transition to an electronic environment. Comprehensive, Integrated Management of Physical and Electronic Documents

to EMR transition Contents

The nation s largest privately held records and information management company

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

Software Escrow Service Workflow. Comprehensive and Trusted Software Escrow Services from Iron Mountain.

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Preemptive security solutions for healthcare

Secure Document Storage. Making it simple to securely move, store and retrieve your business records.

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

White Paper FASTFILE / Page 1

Director, Value Engineering

PCI Data Security and Classification Standards Summary

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

Security in Fax: Minimizing Breaches and Compliance Risks

Five Keys to Ironclad Security in Your M&A Transactions

SCANNING STORAGE SHREDDING WORKFLOW IT RECYCLING.

The Phoenix Corporate Legal Suite. Efficient Document, , and Matter Management for Law Departments and In-house Counsel

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

FINAL May Guideline on Security Systems for Safeguarding Customer Information

United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008

RECORDS MANAGEMENT & DIGITISING SPECIALISTS

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

Records Management. Cover subhead 12pt., set in Interstate Light goes here. Second line.

OFFSITE DOCUMENT & MEDIA STORAGE SPECIALISTS OFFSITE DOCUMENT STORAGE VAULT STORAGE OFFSITE MEDIA STORAGE DOCUMENT RESTORATION

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Compliance in the Corporate World

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Discovery Technology Group

Business white paper Top 10 reasons to choose Cloud-based Archiving

7Seven Things You Need to Know About Long-Term Document Storage and Compliance

Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software

Healthcare Security Solutions. Building Technologies

Payment Card Industry Data Security Standard

Music Recording Studio Security Program Security Assessment Version 1.1

Newcastle University Information Security Procedures Version 3

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Streamline HR Tasks with Centralized Document Access

How To Use Formfile

Proven LANDesk Solutions

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Strengthen security with intelligent identity and access management

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

document destruction Our passion.

Streamline Enterprise Records Management. Laserfiche Records Management Edition

INTERNATIONAL SOS. Data Retention, Archiving and Destruction Policy. Version 1.07

VMware vcloud Air HIPAA Matrix

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

HIPAA Security Alert

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity

Accelerating HIPAA Compliance with EMC Healthcare Solutions

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

How To Protect Your Network From Attack From A Network Security Threat

K-Series Guide: Guide to digitising your document and business processing. February 2014 LATEST EDITION

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Using EMC SourceOne Management in IBM Lotus Notes/Domino Environments

Meeting E-Discovery Challenges with Confidence

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

your risks Find out more about our affordable, secure shredding and recycling service.

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

How To Manage Records And Information Management In Alberta

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0

Things You Need to Know About Cloud Backup

Operational and Strategic Benefits in Automating Accounts Payable

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

CASESTUDY. Ontario Tire Stewardship Goes Paperless with Innovative TreadMarks Mobile Application. The Need for Greater Efficiency.

Building an ITAD Program:

SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Transcription:

secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction

Does This Sound Familiar? I want to protect my company s reputation and brand. I don t want to have our company in the news as having had an information privacy breach. That could have a negative impact on revenue, stock price, and even company morale. Internal employee compliance is a challenge. We need to protect sensitive information as part of our daily routine across the organization. It s hard to gauge how often employees are actually following our information disposal policies. Budgets are tight, and we need to keep expenses as low as possible while still remaining compliant. I need to justify my budget and demonstrate ongoing value and results. I need to be able to evaluate my shredding program based on real data and systematic reporting, not just hunches. The costs of the program and the stakes around compliance are too high to leave to chance. I m concerned about defending our information destruction and privacy program, both internally and externally. I need to prove to our auditors that we are compliant and meeting objectives. And if we ever have a breach, I may need to defend our practices externally as well. I want to be a good steward of the environment. Being green is important to us. A Trusted Partner Companies rely on Iron Mountain to help them meet the challenges of information management and security. By maintaining focus on the needs of our customers, we have developed a unique level of experience and expertise in secure, compliant information destruction. To help you through the complete lifecycle of your information destruction program, we offer a comprehensive range of capabilities, including policy and program development, program implementation, reporting, and guidance for ongoing program monitoring and management.

Compliance Today, a single instance of unauthorized access to information could have significant consequences including damage to brand or reputation, fines, as well as the loss of market share and customer trust. Thanks to an increase in privacy and information disposal laws at the provincial level, proper, permanent destruction of sensitive information is a business imperative. Developing and maintaining a legally defensible and consistently implemented secure shredding program can protect your company and your customers by increasing control over your information and mitigating risk and potential liability. To achieve compliance, your program must apply consistent information disposal policies and procedures across locations, as well as provide proof of employee training, ongoing communication, enforcement and program monitoring. Comprehensive Support For your shredding program Committed to making ongoing investments in people, processes and technology to continually improve our offerings, Iron Mountain can help you: Design a cost-effective shredding program that reflects your requirements, using advanced security standards and procedures. Create the additional critical elements you need to be compliant policies and procedures, employee awareness, program monitoring and audit, legal/ regulatory education, and more. Incent employees to comply with your program by providing convenient, easy-to-use, desk-side shredding containers; with desk-side containers, documents can be collected throughout the day, and then periodically transferred into your shred containers. Manage your programs in a cost-effective manner using our unique reporting, tools and expertise; we enable you to document your programs and defend them, when necessary. Support responsible environmental stewardship by recycling materials after shredding. Evolve your program as necessary to meet the rapidly changing realities of your business, as well as the evolving regulatory environment. Secure Shredding Services / 3

Iron Mountain Connect To monitor your secure shredding program in innovative ways, you can use the Shredding Center available through Iron Mountain Connect. This online, selfservice portal offers an exclusive suite of tools and reports that help you manage your information destruction program ensuring that it remains compliant and defensible, cost-effective, operationally optimized, and environmentally sound. Control your shredding program with secure, 24x7 access to a variety of program monitoring and management tools via Iron Mountain Connect. We make it easy and convenient to maximize the business value of your program in the most cost-effective manner. Enable compliance and cost-effectiveness. Our proprietary InControl Shred Usage Report will help you optimize your secure shredding program to ensure compliance and cost-effectiveness. Improve budgeting and planning. Use our trend reporting capabilities to manage unscheduled services and reduce costs. Verify information destruction. Streamline auditing and reporting activities by accessing your Certificates of Destruction online. Demonstrate your environmental contribution. Use our Green Report to view the environmental impact of your secure shredding program. Manage your account. View service schedules for all your locations, submit service-related requests, as well as view and pay your bill online. Improve Cost-EffectiveneSS with the InControl Shred Usage Report The best way to increase the cost-effectiveness of a shredding program is optimizing your operations the frequency of service and the number of shredding containers at each location. Most organizations attempt optimization using anecdotal or sporadic information. But as an Iron Mountain customer, you have much more reliable data. You can use our exclusive InControl Shred Usage Report to systematically assess service and usage metrics based on actual utilization information captured at the time of service. By periodically assessing utilization trends, you can uncover opportunities to save money through program optimization. With the InControl Shred Usage Report, you can be confident that your program is as cost-effective as possible and appropriately scoped to protect your sensitive information and your organization. 4 / Secure Shredding Services

CONTROL and Reliability Companies of all sizes and in all industries rely on Iron Mountain to provide the full range of secure, compliant information destruction solutions. We design programs to meet each customer s unique business requirements. In addition, we operate an extensive shredding plant and logistics network that services customers across North America. We can service you whenever you need us, at one location or thousands. Built into every secure shredding program is a proven, high-quality workflow. A critical part of that workflow is our InControl technology, which captures key information at the time of service at your location including barcode scanning, container volume capture, electronic signature and time/date stamp. These steps provide greater control and ensure the secure chain of custody of your sensitive information. offsite Shredding If you require ongoing, verified destruction of sensitive materials, choose Iron Mountain s secure, offsite shredding services. Strict best practices ensure a consistent chain of custody, resulting in a tightly controlled, documented process that protects against security breaches. From the moment our driver arrives to pick up your materials to final destruction at a secure shredding plant, your information is protected. With InControl, your shredding containers are scanned at your location, where key service information such as barcode ID and container volume are captured. This information becomes part of your verifiable audit trail. Once received at the plant, your materials are processed and permanently destroyed to a non-recoverable form. After we securely destroy materials, we recycle all shredding output. SECURE SHREDDING OFFSITE Secure Shredding OFFSite SHREDDING ORDER AUTOMATICALLY GENERATED VIA SafeKeeper PLUS DRIVER ARRIVES InControl DRIVER SCANS SHREDDING CONTAINERS ONSITE Real-Time Transmission of Custody ELECTRONIC SIGNATURE CAPTURED SERVICE INFORMATION CAPTURED IN HANDHELD DEVICE SECURE VEHICLE TRANSPORT MATERIAL IS SHREDDED AT SHREDDING PLANT AUTOMATED INVOICING & CERTIFICATE OF DESTRUCTION SCAN POINTS & REAL-TIME TRANSMISSION OF CUSTODY Secure Shredding Services / 5

Onsite Shredding We designed this service for organizations requiring the immediate and witnessed destruction of confidential materials on their premises. Onsite shredding is the ideal choice for the destruction of your copyrighted or royaltybased materials. Our InControl solution protects documents in transit by combining patented security, real-time tracking, and an auditable chain of custody to deliver a higher standard of information protection. As shredding collection containers are serviced at your location, InControl captures an audit trail including barcode ID, container volume and electronic signatures. An email receipt feature is also available if you require immediate confirmation for each order. An Iron Mountain driver escorts your locked containers to a specially equipped mobile shredding vehicle. Once the shredding container contents are securely deposited inside the vehicle and shredding begins, you can watch the entire destruction process from the truck s onboard closed-circuit television system. We then process and permanently destroy your materials to a non-recoverable form. After we securely destroy materials, we recycle all shredding output. Secure SECURE Shredding SHREDDING onsite ONSITE SHREDDING ORDER AUTOMATICALLY GENERATED VIA SafeKeeper PLUS DRIVER ARRIVES InControl Real-Time Transmission of Custody DRIVER SCANS SHREDDING CONTAINERS ONSITE ELECTRONIC SIGNATURE CAPTURED SERVICE INFORMATION CAPTURED IN HANDHELD DEVICE MATERIAL IS SHREDDED IN MOBILE SHREDDING UNIT AUTOMATED INVOICING & CERTIFICATE OF DESTRUCTION SCAN POINTS & REAL-TIME TRANSMISSION OF CUSTODY 6 / Secure Shredding Services

Special Projects Destruction Iron Mountain provides Special Projects Destruction with the same level of security, consistency and reliability as our recurring services. You can work with the Iron Mountain team to schedule a destruction project. SECURE MEDIA DEStruction Your privacy compliance challenges extend beyond paper-based information to include electronic storage as well. Data tapes, DVDs and other media are potentially vulnerable if not securely destroyed. Iron Mountain Secure Media Destruction solution renders these materials permanently destroyed, unreadable and non-recoverable, and we handle their final disposition in an environmentally friendly manner. We provide this solution on a project basis with approved partners that meet our high standards and submit to ongoing due diligence and recurring compliance reviews. All workflows are proprietary Iron Mountain methodologies that ensure security from collection through final destruction.

Security Information is your most valuable asset. To keep it safe, we ve built a dedicated security team led by a Chief Security Officer, standardized our security practices, and invested nearly $200 million in our facilities and vehicles over the past 10 years. Our carefully screened and trained employees are supported by proven systems and committed to protecting your documents. Personnel The key to information security is people. To earn your confidence, all Iron Mountain employees must pass comprehensive background checks. Our employees also receive ongoing training to ensure performance and customer focus. Our people know they re doing more than shredding your documents they re protecting your vital business assets. Shredding Plants Not all secure shredding facilities are created equal. In fact, some stand well above the rest by providing optimal levels of safety and security. With Iron Mountain s facilities, you can rest assured that when your documents are with us they remain secure from pickup through final disposition. We consistently provide some of the industry s more advanced systems to safeguard your information both inside and outside our secure shredding facilities, including: Strict visitor policies 24x7, closed-circuit television surveillance cameras Advanced fire suppression controls Intrusion detection and environmental control systems Transportation Our InControl solution protects documents in transit by combining patented security, real-time tracking, and an auditable chain of custody to deliver a higher standard of information protection. Prevention. Most vehicles in our industry have standard theft-control alarms. Iron Mountain takes fleet security to a higher level with built-in technology innovations such as patented locking mechanisms, driver proximity alarms and a dual key ignition to prevent workflow errors. Early Detection and Correction. If an error should occur, early detection is crucial to correction. Our drivers have wireless scanners that transmit data back to our logistics team in real-time. This allows for servicelevel confirmation throughout the day (if needed), as well an automated email receipt. Proof. To be compliant, you must be able to prove you re compliant. As shredding collection containers are serviced at your location, InControl captures an auditable chain of custody including barcode ID, container volume and electronic signatures. An email receipt feature is also available if you require immediate confirmation for each order. 8 / Secure Shredding Services

Environmental Responsibility Environmental responsibility often starts at home. At Iron Mountain, we consider it our responsibility in our working environments as well. Iron Mountain has recycled and reused the output from our shredding facilities to save over 7 million 50-foot trees annually. Acting on the premise that we all share the duty to manage and care for our natural resources, Iron Mountain integrates and applies environmental values into every document disposal process and procedure. And by working with Iron Mountain to safely dispose of your documents, you can too. After your documents are securely shredded, we recycle all shredding output. Our Secure Media Destruction services also utilize a waste-to-energy incineration process to appropriately recycle your electronic media including data tapes, CDs, video tapes and more. To help you quantify the environmental benefits of your secure shredding programs, you can access your Green Report on Iron Mountain Connect to learn how many natural resources you ve saved. The Annual Benefits of Iron Mountain Secure Shredding in North America 7.65 Million 50-foot Trees Saved 270 Million Pounds of Air Pollution 3.15 Billion Gallons of Water Saved 1.3 Million Cubic Yards of Landfill Reduction 900 Million Pounds of Recycled Paper 1.8 Billion KW hours of Electricity Reduced 450 Thousand Tons of Paper Material Weight 207 Million Gallons of Oil Saved Secure Shredding Services / 9

Complementary Services Records Management The business records environment is exploding with billions of paper documents, trillions of electronic messages and exabytes of electronic records all of which must be managed safely and cost-effectively throughout their lifecycle. Iron Mountain offers a broad range of outsourced services addressing the challenges of Records Management and helping you control costs, reduce risks, improve access and protect information at every stage from origination to destruction. Transitioning to Electronic Records Document conversion with Iron Mountain enables you to outsource scanning without moving files, thereby preserving chain of custody and reducing risk. What s more, our Image on Demand service scans only what you need, only when you need it. A document is removed from its carton, scanned, and returned to secure storage. The image can then be accessed from our secure Digital Record Center for Images, uploaded into your electronic content management system, or emailed to you as an encrypted file. Making document conversion with Iron Mountain part of your electronic record transition plan helps ensure that your migration is cost-effective and secure. Image Hosting For many companies, maintaining an in-house image repository is impractical. If you want online access without the infrastructure, consider the Iron Mountain Digital Record Center for Images. This secure, hosted service eliminates capital costs, is easy to deploy and administer, and enhances compliance. Sophisticated search tools allow authorized users to quickly retrieve digital records 24x365 via the Internet. Managing Active Records If you maintain one or more file rooms staffed by company employees, our ActivFile solutions can lower costs, free up space, and ensure consistency. First, we consolidate your active records at one of our facilities or one of yours. We then perform retrieval, filing, interfiling, and other activities based on best practices that mitigate risk, speed discovery, and meet compliance requirements. Highly scalable, ActivFile solutions also enable cost-effective migration to electronic records when coupled with Iron Mountain document conversion services. ediscovery and Litigation Services Iron Mountain provides a range of archiving and ediscovery services, including email and message archiving, image archiving, medical image archiving, content monitoring and electronic data discovery. Our comprehensive suite of solutions includes our Stratify hosted and on-premises solutions and services for early case assessment, document review and production. We partner with customers to create the additional critical elements they need to be compliant policies and procedures, employee awareness, program monitoring and audit, legal/regulatory education, and more. In addition, we help customers manage and document their programs in a cost-effective manner using our unique reporting, tools, and expertise. 10 / Secure Shredding Services

The Iron Mountain Secure Shredding service is Triple A Certified by the National Association for Information Destruction, Inc. (NAID) and is the largest shredding vendor to achieve NAID certification. Iron Mountain is proud to have taken a leadership role in the development of NAID s standards, which focus on operational workflows and security. Iron Mountain Secure Shredding complies with the Payment Card Industry (PCI) Data Security Standard and participates as a member of the PCI Security Standards Council. Page 11

195 Summerlea Road Brampton, Ontario L6T 4P6 1 800 FASTFILE (327 8345) ironmountain.ca CA-SS-BR-052510-002 About Iron Mountain. Iron Mountain Incorporated (NYSE: IRM) provides information management services that help organizations lower the costs, risks and inefficiencies of managing their physical and digital data. Founded in 1951, Iron Mountain manages billions of information assets, including backup and archival data, electronic records, document imaging, business records, secure shredding, and more, for organizations around the world. Visit the Company Web site at www.ironmountain.ca for more information. 2010 Iron Mountain Canada Corporation. All rights reserved. Iron Mountain, the design of the mountain, 1 800 FASTFILE, InControl, Digital Record Center, Stratify, SafeKeeper PLUS, Iron Mountain Connect, Image on Demand and ActivFile are trademarks or registered trademarks of Iron Mountain Incorporated in the U.S. and other countries and are licensed for use by Iron Mountain Canada Corporation.