Destruction Standards & Compliance Presented by: Chris Parker, V.P. Operations Stevens & Stevens Business Records Management, Inc.

Slides:



Advertisements
Similar presentations
Bill Roettger Feature Updates for HCV-ID. Overview For Patients Collect: - Patient Information - Insurance Cards - Acceptance of Data Privacy Policy -
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
HIPAA and Paper Recycling/Destruction Laura Brannen 603/
PROVIDER RESPONSIBILITIES
ATA Safety & HR Conference 2014 Trucking Safety: Best Practices, Compliance & Training Seminar Driver Qualifications/Qualifying Drivers – Background Screening.
New Employee Onboarding Office of Human Resources.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
LANDLORD BEST PRACTICES FOR FAIR HOUSING COMPLIANCE.
Best Practice Standard Review Overcoming Obstacles Inspections Drug Testing OSHA 10-hour Training RCCS Insurance Company.
Transportation/Fleet Safety and Environmental Safety Travel - Hazardous Materials Transportation Security- Sandra J. Perry Consulting Services & Treatment.
Security Controls – What Works
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
OH 5-1 Hiring and Orienting New Employees Human Resources Management and Supervision 5 OH 5-1.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Excerpt from Fleet Policy
Member Timesheets-Required Elements
1st Choice Document Destruction, Inc (a member of the NAID Association) is proud to be an exclusive distributor for “The Guardian” Hard Drive Destroyer.
1 October 28, Presenters Nick Fishman – Chief Marketing Officer, EVP Jonah Green – Account Executive Headquarters: 4853 Galaxy Parkway, Building.
New Data Regulation Law 201 CMR TJX Video.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Federal Motor Carrier Safety Administration and Hazardous Materials Regulations : How they apply to You the Roofing Contractor Todd Olney, CDS, ARM.
1st Choice Document Destruction (a member of the NAID Association) is proud to be an exclusive distributor for The Guardian Hard Drive Destroyer. Anyone.
Conducting Online Driver Records Checks Lesson 1 Using the mt.gov “ePass” System & the Department of Justice Driver History Records Service Presented.
Presenter name. Ryan Brandon Exan Group What’s New with axiUm New Features in axiUm Patient Self-Service Options Future Plans axiUmSupport.com.
1 Commercial/Industrial Substance Abuse Policy ScreenSafe Inc. Program Administrators.
HIPAA COMPLIANCE PROTECT INFORMATION INCREASE RECYCLING SAVE MONEY.
HIGHLIGHTS OF THE NAPHSIS SECURITY GUIDELINES MANUAL
(Customs & Trade Partnership
RESPONSIBLE SHREDDING Bob Johnson CEO, NAID. Compliant and secure disposition.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
End Use and User of Ammunition AT05 Slide 1. Types of End Use Documents  End User Certificate (EUC)  Delivery Verification Certificate (DVC) AT05 Slide.
Ronald J. Lak - Uniroyal Chemical Company, Inc. ISO Uniroyal Chemical.
DOES YOUR EMPLOYEE SCREENING POLICY COVER ALL PEOPLE ACCESSING YOUR BUSINESS? Jenny Reid August 2012.
© Copyright 2010 Hemenway & Barnes LLP H&B
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #16 Orientation for Security Officers Security Supervision and Management.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
Western Asset Protection
2004 Credentialing & CVO Standards National Credentialing Forum February 20, 2004.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Data Destruction Expanding Business Opportunities Dag Adamson LifeSpan Technology Recycling.
How to Hire a Safe (and Compliant) Driver Presented by: Tom Deutsch Director/Consultant Fleet Safety & Compliance Services Integrated Loss Control, Inc.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
LANDLORD BEST PRACTICES FOR FAIR HOUSING COMPLIANCE.
Welcome to the ICT Department Unit 3_5 Security Policies.
Auditing your Transportation & Hazmat Shipping Operations
Law Firm Data Security: What In-house Counsel Need to Know
Explaining strategies to ensure compliance with workplace legislation
Data Destruction Standards & Compliance
Fingerprint-Based Criminal History Check Compliance
Software Application Overview
Protection of CONSUMER information
Administrative Practices Outcome 1
Learn Your Information Security Management System
Capacity Qualifications & Requirements
Chapter 3: IRS and FTC Data Security Rules
Security companies: processors Personnel training Confidentiality
A+ A+ CORPORATION PRESENTS: INFORMATION TECHNOLOGY DEPARTMENT
Records Destruction presented by Records Management
CHAPTER 1 The NJ Driver License System
Clemson University Red Flags Rule Training
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Barriers to job Success
Colorado “Protections For Consumer Data Privacy” Law
IDENTIFYING, TRAINING AND DEVELOPING SAFE DRIVERS
Protecting customer information
Presentation transcript:

Destruction Standards & Compliance Presented by: Chris Parker, V.P. Operations Stevens & Stevens Business Records Management, Inc.

Early Methods of Destruction

Destruction Today

Standards DoD NIST ARMA Guidelines NAID

NAID ® NAID ® is the international trade association for companies providing information destruction services. NAID's mission is to promote the information destruction industry and the standards and ethics of its member companies.

Certifications Mobile or Plant-Based Paper or Printed Media Micro Media (Fiche/Film) Hard Drives Non-Paper Media

NAID Certification Criteria Employee Requirements Operational Security Endorsements & the Destruction Process Company Assurances

Employee Requirements Signed Confidentiality Agreements I-9’s 7 Year Criminal Record Search + Ongoing Every 3 Years Pre-Hire Drug Screening 7 Year Employment History Verification Random Drug Tests Driver License Verification

Operational Security Written Policies & Procedures Annual Training Documented Breach Notification Policy Employee’s Uniformed & have Photo ID’s Destruction Documented for Customers Chain of Custody / Locked Containers & Locked Vehicles Access to Destruction Material Effectively Prevented Visitor Access Restricted & Monitored Alarmed / CCTV

Endorsements & the Destruction Process Paper or Printed Media Continuous Shred - 5/8” Cross Cut or Pierce & Tear - ¾” x 2.5” Pulverizer/Hammermill - 2” diameter holes Micro Media Particle size of 1/8” or less Hard Drives ¾” Max Shred Width Serial # Tracking

Company Asssurances Legally Registered to do business in the state of residence General Liability Insurance of $2,000,000 or more.

Contact Info: Chris Parker – Tim Ready –