<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Business Management Archives - i-SIGMA</title>
	<atom:link href="https://isigmaonline.org/category/blog/business-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://isigmaonline.org/category/blog/business-management/</link>
	<description>i-SIGMA Annual Conference and Expo Sites</description>
	<lastBuildDate>Fri, 28 Jul 2023 12:56:14 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>
	<item>
		<title>Avoiding the Everyday Scam</title>
		<link>https://isigmaonline.org/avoiding-the-everyday-scam/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 22:36:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6042</guid>

					<description><![CDATA[<p>No one is impervious to hacking and phishing, not even the International Secure Information Governance &#38; Management Association. Yesterday hackers were quick enough to send a pretty convincing trademark violation email through one of our email accounts. Luckily we secured the situation, although unfortunately many still received the email (If you did receive this spam [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/avoiding-the-everyday-scam/">Avoiding the Everyday Scam</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>No one is impervious to hacking and phishing, not even the International Secure Information Governance &amp; Management Association. Yesterday hackers were quick enough to send a pretty convincing trademark violation email through one of our email accounts. Luckily we secured the situation, although unfortunately many still received the email (If you did receive this spam email, make sure you do not click on the link, and make sure to delete from your inbox). In light of this, we thought we would revisit a previous article which covers some resources for managing and spotting day-to-day spamming and phishing attempts.</em></p>
<p>In a world where so many facets of our lives and the information we keep is held online, where we see passwords and security, hackers and scammers see opportunity. For a business, one way to avoid hackers is by keeping systems, processes, and passwords up to date. However, when it comes down to it, all of these things can fail with employee oversight, and simply not being able to spot a phishing email. So, what are some steps you can take today to protect your accounts from hacks? Here are some tips from the National Cybersecurity Alliance.</p>
<div>
<ol>
<li><span data-contrast="auto">Use long, complex, and unique </span><span data-contrast="none">passwords</span><span data-contrast="auto">. Every password should be at least 12 characters long and include letters, numbers, and symbols (like % or $). Ideally, your passwords should be random strings of characters, not recognizable words. Very importantly, each account should be protected by its own unique password. To create and store all these passwords, use a </span><span data-contrast="none">password manager</span><span data-contrast="auto">!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Switch on </span><span data-contrast="none">multi-factor authentication</span><span data-contrast="auto">. Multi-factor authentication (MFA), sometimes called 2-factor authentication, adds a whole other level of security beyond your password. MFA will use biometrics, security keys, text messages, or an app to make sure you are you, even if a hacker gets access to your password. Enable MFA for any account that allows it!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Think before you click. Learn how to identify </span><span data-contrast="none">phishing</span><span data-contrast="auto"> messages, which will often try to inspire panic or urgency. Take a few seconds to read through the message and who sent it. With a little knowledge, you can spot most phishing attempts within moments.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Turn on automatic </span><span data-contrast="none">updates</span><span data-contrast="auto">. The best way to get the latest, strongest security is to install software updates as soon as they are available – and the best way to know when they are available is to turn on automatic updates! Set it, forget it, and you won’t regret it!  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p>And for all your other everyday hacking attempts, here are some tips from the Better Business Bureau on how you can take diligence in protecting your business from unnecessary scam risks:</p>
</div>
<ul>
<li>Keep good records. Keep documentation of all orders and purchases. This will help you to detect bogus accounts and invoices.</li>
<li>Most email platforms, including Google and Yahoo now allow you to unsubscribe from emails without clicking on any links within the email itself. If you never subscribed to the email to begin with, don’t click “Unsubscribe” at the bottom, but use your email platform’s Unsubscribe or Junk feature to remove the email.</li>
<li>Be extra careful with payment procedures. Establish payment authorization procedures, including a multi-person approval process for transactions above a certain dollar threshold.</li>
<li>Avoid some payment methods when possible. Wire transfers, pre-paid debit cards and gift cards are scammers’ preferred methods of payment. Always confirm that any requests for payment with untraceable methods such as these are verified by an authorized source. Also, try to pay by a written, company. That way, a paper trail has been created.</li>
<li>Double-check vendors. Make sure that the business billing you is a business you’re familiar with and normally do business with. If not, question it. Get the name of the person you speak with, the company name, address, phone and website.</li>
<li>Be careful what information you share. Do not give out information about your business unless you know what the information will be used for. Never provide personal information or financial details to anyone you don’t know.</li>
<li>Protect your devices. Make sure you have proper computer protection software and a firewall. Don’t click on links inside unsolicited e-mails. They could spread malicious software or viruses.</li>
<li>Spread the word. If your employees know about the scam, they’ll be more likely to spot it. Tell your colleagues too.</li>
</ul>
<p>Should you receive any phishing emails, it is recommended that you forward these to the Anti-Phishing Working Group at <a href="mailto:reportphishing@apwg.org" target="_blank" rel="noopener">reportphishing@apwg.org</a> and the FTC at <a href="http://ReportFraud.ftc.gov">ReportFraud.ftc.gov</a>.</p>
<p>The post <a href="https://isigmaonline.org/avoiding-the-everyday-scam/">Avoiding the Everyday Scam</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can a Shredding Company Recover Lost Profit After a Truck Accident?</title>
		<link>https://isigmaonline.org/can-a-shredding-company-recover-lost-profit-after-a-truck-accident/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 22:32:04 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5995</guid>

					<description><![CDATA[<p>By: Kelsea Eckert, Attorney The answer is often YES! A shredding company may have the right to pursue lost income from an at-fault driver and the at-fault driver’s insurance company after an accident. The amount of the claim will depend on the length of downtime, as well as other circumstances and applicable laws. Here are [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/can-a-shredding-company-recover-lost-profit-after-a-truck-accident/">Can a Shredding Company Recover Lost Profit After a Truck Accident?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-5998 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38.jpg 750w" sizes="(max-width: 300px) 100vw, 300px" />By: Kelsea Eckert, Attorney</p>
<p>The answer is often YES! A shredding company may have the right to pursue lost income from an at-fault driver and the at-fault driver’s insurance company after an accident. The amount of the claim will depend on the length of downtime, as well as other circumstances and applicable laws. Here are a few points to consider:</p>
<p><strong>Liability:</strong> To establish liability, be sure to gather evidence such as accident reports, witness statements, and video footage. Once fault is proven, demand payment for the repairs or totaled equipment, as well as the consequential damages. Consequential damage includes income lost while the shredder equipment was down.</p>
<p><strong>Insurance claims:</strong> The shredding company should consider filing a claim with the at-fault driver&#8217;s insurance company right away. This adverse insurance company may be responsible for covering the direct losses resulting from the accident. These direct losses may include repairs or replacement of equipment, towing, hotel, rental of equipment, downtime, diminished value, etc.</p>
<p><strong>Proof of losses:</strong> To support an insurance claim, the shredding company will need to provide evidence of the actual losses suffered. This evidence may include estimates and final repair invoices, out of pocket expense receipts, expert statements, financial records, business documentation, and other relevant records demonstrating revenue typically generated during the downtime period.</p>
<p><strong>Legal proceedings:</strong> If the adverse insurance company disputes the claim or fails to provide a fair settlement, the shredding company may consider taking legal action to pursue compensation for all losses. Be aware: every claim has a ‘statute of limitation’. This is the time limit in which to bring legal action. Don’t let time run out!</p>
<p>It&#8217;s important to note that the specifics of pursuing insurance claims vary based on state law. Consulting with a lawyer experienced in accidents and insurance claims can provide shredders with the most accurate advice tailored to each specific situation. With your supporting documents and their help, you’ll be well on your way to reclaiming money that is rightfully yours.</p>
<h4>About the Author: <strong><img decoding="async" class="size-medium wp-image-5996 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized.jpg 1448w" sizes="(max-width: 300px) 100vw, 300px" /></strong></h4>
<p>Attorney Kelsea Eckert, the driving force behind <strong><a href="https://www.downtimeclaims.com/">Eckert &amp; Associates, PA</a></strong>, has been a legal advocate for small trucking businesses for most of her 35-year legal career.  As the firm’s lead attorney, she oversees all downtime claims handled by Eckert &amp; Associates, PA. Working mainly with owner operators and small fleets, the firm provides invaluable counsel to countless small trucking businesses battling insurance giants.</p>
<p>Kelsea’s a big believer in the value of small business. She and her firm are adamant that owner operators and small fleets should receive the same treatment as the big guys. Kelsea’s passionate belief that even the smallest trucking companies deserve fair reimbursement for their repairs, downtime, and other out of pocket expenses is the foundation of her firm’s unwavering commitment to their clients. Kelsea’s tenacity, diligence, and belief in justice have made Eckert &amp; Associates, PA a staunch ally of owner operators and small fleets across our nation.</p>
<p><strong><a href="https://www.downtimeclaims.com/" target="_blank" rel="noopener">Learn more about Eckert &amp; Associates &gt;&gt;</a></strong></p>
<p>The post <a href="https://isigmaonline.org/can-a-shredding-company-recover-lost-profit-after-a-truck-accident/">Can a Shredding Company Recover Lost Profit After a Truck Accident?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Efficiently Keeping Your Business in Compliance</title>
		<link>https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:31:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5940</guid>

					<description><![CDATA[<p>Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/">Efficiently Keeping Your Business in Compliance</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong><img decoding="async" class="size-medium wp-image-5941 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30.jpg 750w" sizes="(max-width: 300px) 100vw, 300px" /></strong></h4>
<p>Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ Certification, your company is already leagues ahead in terms of compliance. The list below highlights ten things you can do to help run your business more efficiently, all of which are required of i-SIGMA Certified Providers. <strong><a href="https://directory.isigmaonline.org/suppliers/" target="_blank" rel="noopener">Find an i-SIGMA Certified Service Provider Here &gt;&gt;</a></strong></p>
<h4><strong>Identify and prioritize compliance requirements</strong></h4>
<p>The first step towards efficient compliance is to identify and prioritize the requirements that apply to your business. Depending on your industry and location, you may need to comply with various regulations, such as data privacy laws, labor laws, and tax regulations. Make a list of these requirements and prioritize them based on their importance and impact on your business.</p>
<h4><strong>Create a compliance program</strong></h4>
<p>Once you have identified the compliance requirements, create a compliance program that outlines the policies and procedures for meeting these requirements. This program should be tailored to your business and should cover all relevant compliance areas. Ensure that all employees are trained on the compliance program, and make sure that it is regularly updated to reflect changes in regulations.</p>
<h4><strong>Hire a compliance officer</strong></h4>
<p>If your business is large enough, consider hiring a dedicated compliance officer who will oversee the compliance program and ensure that all employees are following the policies and procedures. The compliance officer should have a thorough understanding of the regulations that apply to your business and should be able to keep up with any changes in these regulations.</p>
<h4><strong>Use technology to automate compliance tasks</strong></h4>
<p>Technology can help you automate many compliance tasks, such as tracking employee hours, filing tax returns, and monitoring data privacy compliance. By automating these tasks, you can reduce the risk of human error and save time and resources. Consider investing in compliance software that can help you manage compliance more efficiently.</p>
<h4><strong>Conduct regular compliance audits</strong></h4>
<p>Regular compliance audits can help you identify areas where your business may not be meeting regulatory requirements. These audits should be conducted by an independent third party who has expertise in the relevant compliance areas. The findings of the audit should be used to improve the compliance program and make any necessary changes to policies and procedures.</p>
<h4><strong>Monitor regulatory changes</strong></h4>
<p>Regulatory requirements are constantly changing, and it&#8217;s important to stay up-to-date on these changes. Subscribe to regulatory newsletters and attend relevant conferences and events to stay informed about any changes that may impact your business. Update your compliance program and policies as needed to ensure that you are meeting the latest regulatory requirements.</p>
<h4><strong>Train employees on compliance</strong></h4>
<p>All employees should be trained on the compliance program and the policies and procedures for meeting regulatory requirements. This training should be provided on a regular basis and should cover all relevant compliance areas. Ensure that employees understand the importance of compliance and the consequences of non-compliance.</p>
<h4><strong>Implement a whistleblower policy</strong></h4>
<p>A whistleblower policy can help you identify and address compliance issues before they become serious problems. This policy should provide employees with a way to report any suspected violations of regulations or company policies without fear of retaliation. Ensure that all employees are aware of the whistleblower policy and understand how to use it.</p>
<h4><strong>Maintain accurate records</strong></h4>
<p>Accurate record-keeping is essential for compliance. Keep all relevant records, such as financial statements, tax returns, and employee records, organized and up-to-date. Use a secure storage system to protect sensitive information and ensure that only authorized personnel have access to these records.</p>
<h4><strong>Seek professional help</strong></h4>
<p>If you&#8217;re unsure about how to meet regulatory requirements or if you&#8217;re facing a compliance issue, seek professional help. Consult with a lawyer or compliance expert who can provide you with guidance and advice on how to meet regulatory requirements and avoid compliance issues.</p>
<p>Compliance is a critical aspect of running a business, and it&#8217;s important to ensure that your business is meeting all regulatory requirements. By following the ten steps outlined in this article, with the help of an <strong><a href="https://directory.isigmaonline.org/" target="_blank" rel="noopener">i-SIGMA Certified Service Provider</a></strong>, you can help run your business more efficiently with compliance and reduce risk.</p>
<p>The post <a href="https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/">Efficiently Keeping Your Business in Compliance</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Community Involvement: Where do You Stand?</title>
		<link>https://isigmaonline.org/community-involvement-where-do-you-stand/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Mon, 28 Nov 2022 22:14:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5715</guid>

					<description><![CDATA[<p>Editors Note: This article was previously run in a 2018 NAIDNews publication. i-SIGMA decided that its information still proves accurate and relevant today, especially in light of Giving Tuesday. By: Gina Lentine of Legal Shred &#8220;How can I help?” From a young age, this phrase was one of the most natural thoughts. Valuing altruism and [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/community-involvement-where-do-you-stand/">Community Involvement: Where do You Stand?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Editors Note: This article was previously run in a 2018 NAIDNews publication. i-SIGMA decided that its information still proves accurate and relevant today, especially in light of <a href="https://www.givingtuesday.org/" rel="noopener" target="_blank">Giving Tuesday</a>.</em></p>
<p>By: Gina Lentine of Legal Shred</p>
<blockquote><p><img loading="lazy" decoding="async" class="size-medium wp-image-5717 alignright" src="https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2022/11/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-35.jpg 1080w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p></blockquote>
<p>&#8220;How can I help?” From a young age, this phrase was one of the most natural thoughts. Valuing altruism and giving back to others was an almost unconscious desire. I would volunteer as much as possible, and dreamed of being a professional volunteer if such a thing existed. Volunteer work as a career may not pay the bills in a traditional sense, but from another perspective, it pays more than any other job.</p>
<p>The benefits of volunteering go beyond what many imagine. Simply from a personal/psychological level, when people volunteer, they gain a new perspective, learning about and understanding experiences they may not otherwise encounter. There is also a sense of appreciation that you receive that is hard to get anywhere else. For example, a lot of the volunteer work I did when I was young was at a local hospital &#8211; I will never forget the gratitude and smiles received simply by delivering flowers or just being a distraction from everything that was going on around those there. That new perspective and knowing that you are needed can’t help but boost your self-esteem by knowing that you did something good, which can make you more productive in all areas of your life. In fact, similar to exercise, volunteering can release endorphins, and for anyone who has seen the movie Legally Blonde, you will appreciate “Exercise gives you endorphins. Endorphins make you happy. Happy people just don’t shoot their husbands…” All of these benefits when experienced by employees help to build the morale of a company and provide a sense of comradery. In addition, while volunteering, you can learn new skills and discover other interests.</p>
<p>When you take the benefits of volunteering and community involvement to the next level in business, the benefits are exponential. As previously mentioned, while you may not make the dollars while doing the volunteering, what you are doing is setting the dollars up to come. As most business people are aware the best way to build a business is to network and build social connections. Community Involvement is one of the best ways to do that. It puts you in the public eye, allows you to interact with others you may not otherwise have an opportunity to connect with and it provides you with a common ground. An afternoon of volunteering can open doors. By human nature, people feel a certain desire to reciprocate. On that very principle, when you give back to your community and they see what you are doing, the community wants to give back to you. Coming full circle, a business is then giving back to the community who supported it. If you are a new business, community involvement is an excellent way to let the community know you are there. Philanthropic activities will create a positive buzz for you and your business, something many are willing to pay for.</p>
<p>So what can you do to be involved in your community? Naturally, as the owner of a RIM or shredding company, when trying to come up with ways to give back to the community, the immediate thought is to host a shred day. In fact, at the time of original publication, we had recently partnered with The American Red Cross and a local business to host a shred day to raise funds for the victims of Hurricane Harvey (remember, this was first published in 2018). Shred days are a great type of event; they create awareness for the business, strengthen relationships with other local businesses, and provide an opportunity to meet new people and companies. However, I often wonder what else we can do as a business for community involvement aside from a shred day.</p>
<p>Before this article was published, the association conducted a survey asking members if and how they get involved with their local community. Most said their primary means followed a similar suit to my own of providing shredding services, a key way the information destruction industry has and will continue to give back.</p>
<p>Some different types of community involvement included walks and runs for charity. Through these, businesses can build a company team to fundraise for an existing cause, or create and sponsor a walk/run for a cause you feel passionate about. One member company has a non-profit they have worked with to provide monthly donations, and their employees volunteer with this organization on a regular basis. </p>
<p>James Elkins, Amarillo Regional Manager, best describes a program Document Shredding and Storage (DSS) recently created:</p>
<blockquote><p>We teamed up with a local elementary school here in<br />
Amarillo, TX, Arden Road Elementary, and worked with<br />
the 4th grade leadership team (RAD Roadrunners) on a<br />
recycling service project for two months. We provided<br />
the shred bins and the students collected paper from all<br />
the classrooms and offices each day. The kids even involved<br />
their parents, by collecting paper at their homes and<br />
bringing it to the school. At the end of the week, DSS would<br />
go exchange the full bins for new empty ones. Each week they<br />
filled at least two 64 gal bins and some weeks three or four.</p>
<p>At the end of the second month, the RAD Roadrunners far exceeded<br />
their goal of collecting 2 tons of paper and finished the project<br />
with 7,000 lbs (3.5 tons) of recycled paper, thus, saving<br />
60 trees! Their reward was a field trip to DSS in which I<br />
took the group (24 kids) on a tour of our facility. During<br />
the tour, I stressed the security of our operation, which<br />
included much of our NAID AAA Certification requirements<br />
(e.g. visitor log in, locked secure shred room, employee<br />
uniforms &amp; name badges, CCTV cameras, secure vehicles,<br />
the width of the shredded paper, and much more). They<br />
got to see our full operation, including our shredding and<br />
storage. My presentation included many stops at different<br />
stations throughout our facility with explanations of each<br />
station and time for question and answers from the kids.<br />
One student asked if we ever got paper cuts! LOL! It was<br />
a great educational experience for the students, and one<br />
they will remember forever. The counselor in charge of<br />
the group, Wendy Peeples, shared with me some of the<br />
comments from the kids after the tour. One student,<br />
Lindsey, said, “That was the best field trip ever!”</p>
<p>It was such an awesome way for the kids to see the “full<br />
circle” process of how the paper they collected was shredded<br />
and baled and then shipped to the recycler. In the end, we<br />
all gathered in our showroom for a big pizza party as a<br />
reward for a job well done. It was a great and<br />
successful educational service project for the students,<br />
and it gave DSS some great exposure in the area and<br />
satisfaction of helping the kids do something meaningful<br />
for the community.</p></blockquote>
<p>In researching, I discovered additional ideas that secure data destruction businesses could incorporate to also get involved in the community.</p>
<p>One fun option was sponsoring a little league team. The children would wear your logo every game for all to see, and if you choose you can go to the games to cheer them on. Plus, if the team is really good, maybe you will even find your business name in the newspapers. “Adopt-a-road” is another excellent way to get involved with the community. As businesses in the information destruction industry strive to recycle and dispose of the destroyed materials in a “green” way, “adopt-a-road” is right in line with that mission. Your business would be on a road sign that people would drive past every day in the geographic area that you service. When they see how clean that section of the road is and volunteers wearing your logo working hard to help our environment, your business’s environmental stewardship will be recognized, making it evident the practices of your business align with its values. </p>
<p>It is apparent to me that the words of Robert Ingersoll, “We rise by lifting others” ring true. I hope you are inspired to give generously to your local community and that you’ll reap the rewards! Perhaps you already are doing something more. We would love to hear about it. If you have a story you want to share, please inspsire your fellow colleagues in the i-SIGMA Facebook Group, <strong><a href="https://www.facebook.com/groups/517088671814480" target="_blank" rel="noopener">i-SIGMA Social</a></strong>.</p>
<p>The post <a href="https://isigmaonline.org/community-involvement-where-do-you-stand/">Community Involvement: Where do You Stand?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</title>
		<link>https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/</link>
		
		<dc:creator><![CDATA[kelly]]></dc:creator>
		<pubDate>Thu, 10 Nov 2022 19:04:13 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5698</guid>

					<description><![CDATA[<p>Earlier this year, i-SIGMA hosted a webinar by guest presenter Daniel Risen, an Employee Benefits Advisor and Business Development Executive for OneDigital. Daniel shared with Members how to maximize the Cares Act Incentives via this webinar and a follow-up article in the iG Journal . You can access these here: Maximizing the Cares Act Incentives [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/">Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Earlier this year, i-SIGMA hosted a webinar by guest presenter Daniel Risen, an Employee Benefits Advisor and Business Development Executive for OneDigital. Daniel shared with Members how to maximize the Cares Act Incentives via this webinar and a follow-up article in the iG Journal . You can access these here:</p>
<ul>
<li><a href="https://isigmaonline.box.com/s/af227n34guqkygzl16vhe9wb87sfxmrq" target="_blank" rel="noopener">Maximizing the Cares Act Incentives &#8211; Webinar</a></li>
<li><a href="https://issuu.com/isigmaonline/docs/ig_journal2022_issue3_issuu/26" target="_blank" rel="noopener">Maximizing the Cares Act Incentives &#8211; Article</a></li>
</ul>
<p>Following the webinar, i-SIGMA received a few member inquiries under our Ask the Professionals program and are sharing the responses. </p>
<p><strong>Please Note: </strong>i-SIGMA is not a Certified Public Account and is not providing specific legal or accounting advice. We recommend that you reach out to your local tax professional to determine what specifically applies to your business in your local jurisdiction.</p>
<p>&nbsp;</p>
<h3>Question</h3>
<p><em>Dear Ask the Professionals,</em></p>
<p><em>We are excited about adding ERC funds to the PPP money we already qualified for but I&#8217;m confused if these funds will be consider taxible income later on. Please advise.</em></p>
<p><em>Sincerely,</em></p>
<p><em>Tax Ignorant</em></p>
<h3>Answer</h3>
<p><em>Dear Tax Ignorant,</em></p>
<p><em>We reached out to CPA Kristina Morgan of Sechler Morgan CPAs PLLC, who advised us of the following:</em></p>
<p><em>Nonprofit entities will NOT have to file an amended tax return (other than the required payroll tax return).</em></p>
<p><em>For-profit entities WILL have to file an amended tax return for the years they claim the credit. Those amounts will increase the companies’ profits (or reduce losses or carryover losses) and will therefore be taxable.</em></p>
<p><em>i-SIGMA also discovered that if a business claims the credit and is not eligible but certifies that they are, this is considered tax fraud. As such, we advise our members to work with a professional to understand the many requirements and calculations that are involved, especially if they also received a PPP Loan(s).</em></p>
<p><em>Sincerely,</em></p>
<p><em>i-SIGMA &amp; Professionals</em></p>
<h3>Question</h3>
<p><em>Dear Ask the Professionals,</em></p>
<p><em>I attended the webinar that i-SIGMA held regarding the Employee Retention Credit (ERC). We have a very small team with only a handful of employees. It seems that most firms want to work with large businesses and are focused only on revenue loss as a basis for applying for the credit. Do you have any information on the other ways of qualifying?</em></p>
<p><em>Sincerely</em></p>
<p><em>Small But Mighty</em></p>
<h3>Answer</h3>
<p><em>Dear Small But Mighty,</em></p>
<p><em>We followed up with Daniel Risen who did the presentation as well as spoke to other members applying for the credit. You are correct that initially, firms assess revenue. However, less than 5% of businesses that have received ERC have qualified under this criteria. (What qualifies? In 2020, if you saw a 50% drop in revenue, compared to the same quarter in 2019, you would be eligible for all of 2020. In 2021, if you saw a 20% reduction in revenue, compared to the same quarter in 2019, you would be eligible for that entire quarter in 2021.</em></p>
<p><em>More businesses qualify for ERC via the &#8220;Governmental Orders&#8221; criteria. If in your state or federally you were affected in your ability to conduct COMMERCE, TRAVEL, or GROUP MEETINGS by the pandemic under certain criteria, you could qualify. A few examples of qualifiers Daniel has seen within our industry in some states include:</em></p>
<ol>
<li><em>Supply Chain Disruption</em></li>
<li><em>Requirement of the company to spend time and money on PPE to clean and sanitize equipment</em></li>
<li><em>Furloughed Employees</em></li>
<li><em>Sales were forced to go virtual (if you were unable to attend tradeshows or sales conferences)</em></li>
<li><em>Employees may not be “active” all day or were forced to perform work outside of their normal job duties</em></li>
</ol>
<p><em>One member did share with us that while his CPA was reluctant to work with him, after approaching another CPA, their business is getting back $250K. His advice was to keep looking for firms who are willing to sit and take the time to work with you!</em></p>
<p><em>Sincerely,</em></p>
<p><em>i-SIGMA &amp; Professionals</em></p>
<p> <br />
<strong>Important:</strong> Some experts contend that since our industry was mostly exempted from the shutdown, <strong><em>due to our industry being deemed essential</em></strong>, some businesses may not qualify. We advise our members to work with a professional to understand the many requirements and calculations that are involved with your specific business and local jurisdiction.</p>
<p>The post <a href="https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/">Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Media Collection Containers, Key Control, &#038; Custody</title>
		<link>https://isigmaonline.org/media-collection-containers-key-control-custody/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 11 May 2022 22:34:25 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5382</guid>

					<description><![CDATA[<p>Secure data destruction service commonly provides clients with containers to accumulate paper or other media prior to destruction. And, while it is true that the containers are designed to protect the media from prying eyes and hands, they are not high security vaults, and clients or service providers losing sight of this put themselves at [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/media-collection-containers-key-control-custody/">Media Collection Containers, Key Control, &#038; Custody</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-5383" src="https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-300x300.jpg" alt="" width="212" height="212" srcset="https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9.jpg 1080w" sizes="auto, (max-width: 212px) 100vw, 212px" />Secure data destruction service commonly provides clients with containers to accumulate paper or other media prior to destruction. And, while it is true that the containers are designed to protect the media from prying eyes and hands, they are not high security vaults, and clients or service providers losing sight of this put themselves at risk.</p>
<p>Conventional media collection containers are provided as a convenience, not a security measure. And while they do serve to prevent access by unauthorized individuals, they were never intended to secure information from a malicious individual who could simply wheel the bin away, bust it open with a hammer, or slice it open with a razor knife.</p>
<p>The actual “security” stems solely from the controlled confines of the client’s building; it has locks on the front door, the watching eyes of employees, and the security alarm and CCTV of the building…and not from the container itself.</p>
<p>Understanding this is important for a number of reasons.</p>
<h4>Key Control</h4>
<p>It sometimes strikes clients as inappropriate (or unsecure) that the keys to their containers open containers placed at other clients. Doesn’t that mean those other clients could open their bins too?</p>
<p>The misconception here is that the “key” is the source of the security. It is not. If an unauthorized person is walking around their office opening bins, the problem is with the security of the building, not the container. As already mentioned, that same malicious unauthorized individual walking around the office could have gotten into the containers without the key.</p>
<p>The idea that a key that is exclusive to one client is more secure is both misguided and dangerous. No client should believe – or be led to believe &#8211; that anything but the security of the overall environment in which the containers are deployed is the actual source of the security.</p>
<p>Furthermore, from the service provider’s perspective, suggesting the key and container are the source of the security suggests that they – the service provider &#8211; are responsible for that security of material in the client’s office. It is extremely reckless, both for the service provider, and the client, to foster that belief.</p>
<h4>Care and Custody</h4>
<p>Clients sometimes believe (or act as if they believe) that custody of the media transfers to the service provider once it goes into the collection container. That is not the case. Regardless of who provided the collection container, the service provider is not responsible for the care and custody of personal information until they take possession of it. Again, the security of the environment is the important thing, and, as a result, it is very important that service providers do nothing that suggests otherwise.</p>
<h6 style="text-align: right;">Written by Bob Johnson, CSDS | 11 May 2022</h6>
<p>The post <a href="https://isigmaonline.org/media-collection-containers-key-control-custody/">Media Collection Containers, Key Control, &#038; Custody</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If Certification is in Your Plans, Now is the Time!</title>
		<link>https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 23:57:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4363</guid>

					<description><![CDATA[<p>First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger. In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4364" src="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg" alt="" width="199" height="199" srcset="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg 1080w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-99x99.jpg 99w" sizes="auto, (max-width: 199px) 100vw, 199px" />First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger.</p>
<p>In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including state-of-the-art contracts and agreements, marketing materials, regulatory intervention, and educational events. Find the full list and details of <a href="https://isigmaonline.org/membership/membership-join/" target="_blank" rel="noopener noreferrer">all i-SIGMA benefits</a> on <a href="https://isigmaonline.org/">the association website</a>, and all members are encouraged to review and make use of them.</p>
<p><strong>Certifications</strong><em>:</em> Included among the benefits of i-SIGMA membership benefits is access to information protection’s two leading service provider certifications, NAID AAA and PRISM Privacy+. With the overwhelming majority of its more than 1,200 member-locations holding one or both of those certifications, they are the most success programs i-SIGMA has offered to date.</p>
<p>By now, it is well known that i-SIGMA membership replaces NAID and PRISM International membership at the end of this month, and that going forward the use of NAID and PRISM will be limited to their respective certifications.</p>
<p><strong>A Personal/Business Decision</strong><em>:</em> Over the years, our surveys have consistently shown that the vast majority of non-certified members fully intend to become certified as soon as they can find the time. And whether now is the right time or not, it is critical for those members to know they are still benefiting from the association’s efforts and their contribution to the association continues to promote client education and adoption of their services.</p>
<p>It is also important, however, for non-certified members to take stock. In a matter of weeks, NAID and PRISM will only be associated with each respective certification program. If past surveys are correct, and certification is a future goal, there is no better time to do it than now; thereby maintaining your link to the two most recognized information protection brands in the world.</p>
<p><strong>How to Become Certified</strong>: Becoming Certified is not as complicated as some may think.</p>
<ol>
<li>Meet all required specifications as outlined in the <a href="https://isigmaonline.box.com/s/xv82llmhun8ad1hjkcc17p0iemohe0ia" target="_blank" rel="noopener noreferrer">i-SIGMA Certification Specifications Reference Manual</a></li>
<li>Submit a completed certification application</li>
<li>Successfully complete an initial scheduled audit verifying all aspects of compliance</li>
</ol>
<p><a href="mailto:certification@isigmaonline.org">Contact the i-SIGMA Certification Department</a> for more information.</p>
<h6 style="text-align: right;">Written by Bob Johnson | 30 November 2021</h6>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Struggle to Hire &#038; Retain Good Employees</title>
		<link>https://isigmaonline.org/the-struggle-to-hire-retain-good-employees/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 17:18:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4278</guid>

					<description><![CDATA[<p>Gone—for now anyway—are the days when finding and retaining good employees could be taken for granted. The recent i-SIGMA member survey, along with many conversations with members on what to do about it, has shown the competition for capable, hard-working, and presentable service personnel in records management and secure data destruction is increasing difficult…and in some cases, [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/the-struggle-to-hire-retain-good-employees/">The Struggle to Hire &#038; Retain Good Employees</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4192" src="https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1.jpg" alt="" width="235" height="235" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1.jpg 2160w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-1536x1536.jpg 1536w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-2048x2048.jpg 2048w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-99x99.jpg 99w" sizes="auto, (max-width: 235px) 100vw, 235px" />Gone—for now anyway—are the days when finding and retaining good employees could be taken for granted. The recent i-SIGMA member survey, along with many conversations with members on what to do about it, has shown the competition for capable, hard-working, and presentable service personnel in records management and secure data destruction is increasing difficult…and in some cases, having an impact on the ability to serve clients and grow.</p>
<p>Those attending the i-SIGMA webinar on How to Overcome the Labor Dilemma in an Evolving COVID Economy w/ Tom Adams hear him say these tasks require the same focus, the same planning, the same intensity of effort as sales and marketing. In short, service providers can no longer afford to take it for granted.</p>
<p>With that in mind, i-SIGMA would like to share what we have learned since first starting this discussion, and, more importantly, hear what others are doing.</p>
<ol>
<li>Hiring and retaining drivers is the most troublesome issue. Drivers are the face of the company. They need to be presentable and capable when dealing with clients and the inevitable issues that can arise in the field. In fact, the drivers our industry needs interact with clients far more than the delivery driver that knocks on your door and leaves a box.</li>
<li>Increasing compensation is a solution, but there are nuances. Of course, increasing pay will attract and keep employees, but bumping them up 20% in one stroke, could cause problems. Additionally, hiring a new driver (or other employee) at the same rate or higher than a long-time employee has a number of risks too, such as losing or de-motivating the long-time employee.</li>
<li>Paying higher wages and showing more appreciation is the least expensive strategy. Keeping a client is a lot less expensive than finding a new one… and the same can be said of good employees. Recruiting and training are expensive, even more so when you know how much effort it takes to find and attract new people. A bad interaction with an under-trained employee can cost you customers.</li>
<li>Poaching (especially drivers) is okay but should be strategic and discrete. Let’s face it, the person sitting at home who’s benefits just ran out might not be the best choice. Better is someone who is working (and working hard). Water delivery services and appliance delivery are two industries providing a good source of drivers who are used to hard work and dealing the public but finding them and luring them requires tactical diligence. Keep in mind, this is a two-way street. While i-SIGMA does not condone poaching among its members, good, hard-working employees—no matter where they are presently—are at a premium. There is a good chance someone is eyeing yours.</li>
</ol>
<p>We know there are more ideas and considerations out there. Some readers might disagree. PLEASE COMMENT! We want to hear from you. In fact, your comment may end up in a more complete examination of this issue printed in an i-SIGMA publication.</p>
<p><strong><a href="https://www.linkedin.com/feed/update/urn:li:activity:6847193083415814144" target="_blank" rel="noopener noreferrer">Share Your Comments in the i-SIGMA LinkedIn Group Post Now &gt;&gt;</a></strong></p>
<p>The post <a href="https://isigmaonline.org/the-struggle-to-hire-retain-good-employees/">The Struggle to Hire &#038; Retain Good Employees</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The i-SIGMA Compliance Monitoring Service Has Arrived</title>
		<link>https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 20:00:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Press Room]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4256</guid>

					<description><![CDATA[<p>The eagerly awaited i-SIGMA Compliance Monitoring Service has arrived. Starting immediately, many service providers will use it, and soon clients around the world will begin seeing promotions encouraging them to use it too. And, if the underlying assumptions behind its creation are correct, they will eventually come to rely on it as a vital demonstration [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/">The i-SIGMA Compliance Monitoring Service Has Arrived</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="none">The eagerly awaited </span><strong><a href="https://directory.isigmaonline.org/compliance/">i-SIGMA Compliance Monitoring Service</a></strong><span data-contrast="none"> has arrived. Starting immediately, many service providers will use it, and soon clients around the world will begin seeing promotions encouraging them to use it too. And, if the underlying assumptions behind its creation are correct, they will eventually come to rely on it as a vital demonstration of their own regulatory compliance.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<h2>Why Did i-SIGMA Create This Service?</h2>
<p><span data-contrast="none">All data protection regulations require clients to demonstrate initial and ongoing due diligence when selecting third-party service providers to process personal information. The key word there is “demonstrate.” In fact, when a large investment firm was recently fined after its discarded electronics exposed personal information about its clients, the judgment was based on the fact that </span><span data-contrast="none">they failed to employ “adequate due diligence in selecting a vendor and monitoring its performance.” </span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276}"> This new, free service from i-SIGMA helps organizations fulfill that regulatory obligation by sending out comprehensive compliance reports detailing the qualifications of vendors offering records storage, imaging, scanning, secure shredding, and electronic media recycling.</span></p>
<p><span data-contrast="none">Of course, the challenge to clients (such as the investment firm) of complying with such regulations is that, 1) they rarely have the bandwidth to perform such due diligence and, 2) even if they did have the bandwidth, they can hardly be expected to know what to look at. Enter i-SIGMA certification programs, which are not only designed to review the relevant regulatory and security overlap, but to do so on an ongoing basis.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p><span data-contrast="none">By obtaining the automatic reports issued by the <strong><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener noreferrer">i-SIGMA Compliance Monitoring Service</a></strong>, the client has evidence by which <strong>they can demonstrate both initial and ongoing compliance</strong> of their service provider. In short, the client themselves gets the tangible benefit of being able to demonstrate their own vendor-selection compliance requirements.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p><span data-contrast="auto">“We began the service when customers requested that we email them alerts when their service provider renewed or lapsed,” says i-SIGMA CEO Bob Johnson. </span></p>
<p><span data-contrast="auto">“Now, we&#8217;ve taken that concept a step further. The service is based on the fact that many data controllers are required to demonstrate initial and ongoing due diligence when they use data-related service providers,” Johnson continues. “And, because NAID AAA and PRISM Privacy+ Certifications address the relevant security vulnerabilities and regulatory overlap, the information verified during audits mirrors what that due diligence should look like.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">“Essentially,” Johnson added, “they’re supposed to do it, but often don’t what to look at or don’t take the time, so we can do it for them even better than they can.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Clearly, any client will see the value of obtaining this free report, and once they are aware it is available will come to insist on it.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p>Users of the service will first be brought to a welcome screen, and next will be able to choose their provider that they wish to monitor (as shown below). If the user does not have a provider in mind, they can also find a local service provider.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-4257 alignleft" src="https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A.png" alt="" width="751" height="504" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A.png 1151w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-300x201.png 300w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-768x515.png 768w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-1024x687.png 1024w" sizes="auto, (max-width: 751px) 100vw, 751px" /></p>
<p>Once the user has selected their service provider, all they have to do is enter their email address (stored anonymously). The report will show up in the user&#8217;s inbox within minutes. Future reports will be sent annually as each company renews its certification and whenever they make changes in their serviceswhich may impact the details of their certification on file.</p>
<p><img loading="lazy" decoding="async" class="wp-image-4258 alignleft" src="https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup.png" alt="" width="703" height="668" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup.png 896w, https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup-300x285.png 300w, https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup-768x730.png 768w" sizes="auto, (max-width: 703px) 100vw, 703px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>i-SIGMA is very excited to announce and roll out this eagerly awaited program. For information on certification programs, contact: <strong><a href="mailto:certification@isigmaonline.org">certification@isigmaonline.org</a>.</strong> For technical assistance regarding this tool, please contact: <strong><a href="mailto:webhelp@isigmaonline.org">webhelp@isigmaonline.org</a>.</strong></p>
<h4><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener noreferrer">Use the Compliance Monitoring Service Now &gt;&gt;</a></h4>
<p>The post <a href="https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/">The i-SIGMA Compliance Monitoring Service Has Arrived</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is the Correct Particle Size for Your Destroyed Media?</title>
		<link>https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/</link>
		
		<dc:creator><![CDATA[kelly]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 00:04:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4118</guid>

					<description><![CDATA[<p>It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information. And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy. Unfortunately, when searching for such [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/">What is the Correct Particle Size for Your Destroyed Media?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-4120 alignright" src="https://isigmaonline.org/wp-content/uploads/2021/07/particle-size.png" alt="" width="232" height="153" />It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information.</p>
<p>And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy.</p>
<p>Unfortunately, when searching for such guidance online, the only information available often pertains to government classified information, resulting in unnecessary expense and often a high degree of unnecessary inconvenience.</p>
<h4>Here are a few things to consider:</h4>
<ul>
<li>No data protection regulation in the world specifies a particle size for destroyed paper or electronic equipment. They simply mandate the information be reasonably inaccessible and not reconstructible.</li>
<li>Most particle size specifications issued by and for government agencies must anticipate that the materials are not controlled after the destruction process.</li>
<li>Unnecessarily meeting a very small (and irrelevant) particle size can cost 5 to 10 times what would be reasonable by regulators.</li>
<li>Because of the factors above, requiring an unnecessarily small particle size may discourage compliance by front line employees, which, ironically, ends up putting the organization at greater risk.</li>
</ul>
<h4>Also consider:</h4>
<ul>
<li>NAID AAA Certified media destruction services are required to demonstrate they prevent access to destroyed particles after the destruction process.</li>
<li>Commercial media destruction firms destroy large amounts of material from multiple sources, all of which is co-mingled prior to being baled and securely recycled or responsibly discarded.</li>
<li>Hundreds of thousands of organizations around the world rely on NAID AAA Certified service providers to meet the security and regulatory media destruction requirements.</li>
</ul>
<p>i-SIGMA is a global, non-profit association dedicated to the proper destruction of discard information for more than 27 years and believes that organization is ultimately responsible for the protection of personal and competitive information in its possession.</p>
<p>The advice above is simply provided to help organizations decide what particle size best meets their needs, while avoiding the expense and risks of acting without a complete perspective.</p>
<h3>NAID AAA Certified Company Marketing Resources</h3>
<p>Companies who are NAID AAA Certified should use the following resources to use as marketing material for clients asking questions pertaining to particle size:</p>
<p><a href="https://nationalassociationforinfor.box.com/s/8ol3oycq8pbqo57bymq866zi1hqocxld" target="_blank" rel="noopener noreferrer"><strong>&#8220;What is the Correct Particle Size for Your Destroyed Media?&#8221;</strong></a></p>
<p><strong><a href="https://nationalassociationforinfor.box.com/s/4gih3ki5a2gxvve0oycsoxkpf4fmlxzj" target="_blank" rel="noopener noreferrer">&#8220;What is the Correct Particle Size for Your Destroyed Media?&#8221; &#8211; ANZ &amp; UK</a></strong></p>
<p><em>Please Note: It is acceptable for Certified members in good standing to also translate this file into other languages </em></p>
<h6 style="text-align: right;">Written by Bob Johnson | 29 July 2021</h6>
<p>The post <a href="https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/">What is the Correct Particle Size for Your Destroyed Media?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
