<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Operations Archives - i-SIGMA</title>
	<atom:link href="https://isigmaonline.org/category/blog/operations/feed/" rel="self" type="application/rss+xml" />
	<link>https://isigmaonline.org/category/blog/operations/</link>
	<description>i-SIGMA Annual Conference and Expo Sites</description>
	<lastBuildDate>Fri, 28 Jul 2023 12:56:14 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Avoiding the Everyday Scam</title>
		<link>https://isigmaonline.org/avoiding-the-everyday-scam/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 22:36:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6042</guid>

					<description><![CDATA[<p>No one is impervious to hacking and phishing, not even the International Secure Information Governance &#38; Management Association. Yesterday hackers were quick enough to send a pretty convincing trademark violation email through one of our email accounts. Luckily we secured the situation, although unfortunately many still received the email (If you did receive this spam [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/avoiding-the-everyday-scam/">Avoiding the Everyday Scam</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>No one is impervious to hacking and phishing, not even the International Secure Information Governance &amp; Management Association. Yesterday hackers were quick enough to send a pretty convincing trademark violation email through one of our email accounts. Luckily we secured the situation, although unfortunately many still received the email (If you did receive this spam email, make sure you do not click on the link, and make sure to delete from your inbox). In light of this, we thought we would revisit a previous article which covers some resources for managing and spotting day-to-day spamming and phishing attempts.</em></p>
<p>In a world where so many facets of our lives and the information we keep is held online, where we see passwords and security, hackers and scammers see opportunity. For a business, one way to avoid hackers is by keeping systems, processes, and passwords up to date. However, when it comes down to it, all of these things can fail with employee oversight, and simply not being able to spot a phishing email. So, what are some steps you can take today to protect your accounts from hacks? Here are some tips from the National Cybersecurity Alliance.</p>
<div>
<ol>
<li><span data-contrast="auto">Use long, complex, and unique </span><span data-contrast="none">passwords</span><span data-contrast="auto">. Every password should be at least 12 characters long and include letters, numbers, and symbols (like % or $). Ideally, your passwords should be random strings of characters, not recognizable words. Very importantly, each account should be protected by its own unique password. To create and store all these passwords, use a </span><span data-contrast="none">password manager</span><span data-contrast="auto">!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Switch on </span><span data-contrast="none">multi-factor authentication</span><span data-contrast="auto">. Multi-factor authentication (MFA), sometimes called 2-factor authentication, adds a whole other level of security beyond your password. MFA will use biometrics, security keys, text messages, or an app to make sure you are you, even if a hacker gets access to your password. Enable MFA for any account that allows it!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Think before you click. Learn how to identify </span><span data-contrast="none">phishing</span><span data-contrast="auto"> messages, which will often try to inspire panic or urgency. Take a few seconds to read through the message and who sent it. With a little knowledge, you can spot most phishing attempts within moments.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Turn on automatic </span><span data-contrast="none">updates</span><span data-contrast="auto">. The best way to get the latest, strongest security is to install software updates as soon as they are available – and the best way to know when they are available is to turn on automatic updates! Set it, forget it, and you won’t regret it!  </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p>And for all your other everyday hacking attempts, here are some tips from the Better Business Bureau on how you can take diligence in protecting your business from unnecessary scam risks:</p>
</div>
<ul>
<li>Keep good records. Keep documentation of all orders and purchases. This will help you to detect bogus accounts and invoices.</li>
<li>Most email platforms, including Google and Yahoo now allow you to unsubscribe from emails without clicking on any links within the email itself. If you never subscribed to the email to begin with, don’t click “Unsubscribe” at the bottom, but use your email platform’s Unsubscribe or Junk feature to remove the email.</li>
<li>Be extra careful with payment procedures. Establish payment authorization procedures, including a multi-person approval process for transactions above a certain dollar threshold.</li>
<li>Avoid some payment methods when possible. Wire transfers, pre-paid debit cards and gift cards are scammers’ preferred methods of payment. Always confirm that any requests for payment with untraceable methods such as these are verified by an authorized source. Also, try to pay by a written, company. That way, a paper trail has been created.</li>
<li>Double-check vendors. Make sure that the business billing you is a business you’re familiar with and normally do business with. If not, question it. Get the name of the person you speak with, the company name, address, phone and website.</li>
<li>Be careful what information you share. Do not give out information about your business unless you know what the information will be used for. Never provide personal information or financial details to anyone you don’t know.</li>
<li>Protect your devices. Make sure you have proper computer protection software and a firewall. Don’t click on links inside unsolicited e-mails. They could spread malicious software or viruses.</li>
<li>Spread the word. If your employees know about the scam, they’ll be more likely to spot it. Tell your colleagues too.</li>
</ul>
<p>Should you receive any phishing emails, it is recommended that you forward these to the Anti-Phishing Working Group at <a href="mailto:reportphishing@apwg.org" target="_blank" rel="noopener">reportphishing@apwg.org</a> and the FTC at <a href="http://ReportFraud.ftc.gov">ReportFraud.ftc.gov</a>.</p>
<p>The post <a href="https://isigmaonline.org/avoiding-the-everyday-scam/">Avoiding the Everyday Scam</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can a Shredding Company Recover Lost Profit After a Truck Accident?</title>
		<link>https://isigmaonline.org/can-a-shredding-company-recover-lost-profit-after-a-truck-accident/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 22:32:04 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5995</guid>

					<description><![CDATA[<p>By: Kelsea Eckert, Attorney The answer is often YES! A shredding company may have the right to pursue lost income from an at-fault driver and the at-fault driver’s insurance company after an accident. The amount of the claim will depend on the length of downtime, as well as other circumstances and applicable laws. Here are [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/can-a-shredding-company-recover-lost-profit-after-a-truck-accident/">Can a Shredding Company Recover Lost Profit After a Truck Accident?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-5998 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/06/Untitled-design-38.jpg 750w" sizes="(max-width: 300px) 100vw, 300px" />By: Kelsea Eckert, Attorney</p>
<p>The answer is often YES! A shredding company may have the right to pursue lost income from an at-fault driver and the at-fault driver’s insurance company after an accident. The amount of the claim will depend on the length of downtime, as well as other circumstances and applicable laws. Here are a few points to consider:</p>
<p><strong>Liability:</strong> To establish liability, be sure to gather evidence such as accident reports, witness statements, and video footage. Once fault is proven, demand payment for the repairs or totaled equipment, as well as the consequential damages. Consequential damage includes income lost while the shredder equipment was down.</p>
<p><strong>Insurance claims:</strong> The shredding company should consider filing a claim with the at-fault driver&#8217;s insurance company right away. This adverse insurance company may be responsible for covering the direct losses resulting from the accident. These direct losses may include repairs or replacement of equipment, towing, hotel, rental of equipment, downtime, diminished value, etc.</p>
<p><strong>Proof of losses:</strong> To support an insurance claim, the shredding company will need to provide evidence of the actual losses suffered. This evidence may include estimates and final repair invoices, out of pocket expense receipts, expert statements, financial records, business documentation, and other relevant records demonstrating revenue typically generated during the downtime period.</p>
<p><strong>Legal proceedings:</strong> If the adverse insurance company disputes the claim or fails to provide a fair settlement, the shredding company may consider taking legal action to pursue compensation for all losses. Be aware: every claim has a ‘statute of limitation’. This is the time limit in which to bring legal action. Don’t let time run out!</p>
<p>It&#8217;s important to note that the specifics of pursuing insurance claims vary based on state law. Consulting with a lawyer experienced in accidents and insurance claims can provide shredders with the most accurate advice tailored to each specific situation. With your supporting documents and their help, you’ll be well on your way to reclaiming money that is rightfully yours.</p>
<h4>About the Author: <strong><img decoding="async" class="size-medium wp-image-5996 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/06/Kelsea-5-Edit-resized.jpg 1448w" sizes="(max-width: 300px) 100vw, 300px" /></strong></h4>
<p>Attorney Kelsea Eckert, the driving force behind <strong><a href="https://www.downtimeclaims.com/">Eckert &amp; Associates, PA</a></strong>, has been a legal advocate for small trucking businesses for most of her 35-year legal career.  As the firm’s lead attorney, she oversees all downtime claims handled by Eckert &amp; Associates, PA. Working mainly with owner operators and small fleets, the firm provides invaluable counsel to countless small trucking businesses battling insurance giants.</p>
<p>Kelsea’s a big believer in the value of small business. She and her firm are adamant that owner operators and small fleets should receive the same treatment as the big guys. Kelsea’s passionate belief that even the smallest trucking companies deserve fair reimbursement for their repairs, downtime, and other out of pocket expenses is the foundation of her firm’s unwavering commitment to their clients. Kelsea’s tenacity, diligence, and belief in justice have made Eckert &amp; Associates, PA a staunch ally of owner operators and small fleets across our nation.</p>
<p><strong><a href="https://www.downtimeclaims.com/" target="_blank" rel="noopener">Learn more about Eckert &amp; Associates &gt;&gt;</a></strong></p>
<p>The post <a href="https://isigmaonline.org/can-a-shredding-company-recover-lost-profit-after-a-truck-accident/">Can a Shredding Company Recover Lost Profit After a Truck Accident?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Efficiently Keeping Your Business in Compliance</title>
		<link>https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:31:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5940</guid>

					<description><![CDATA[<p>Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/">Efficiently Keeping Your Business in Compliance</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong><img decoding="async" class="size-medium wp-image-5941 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30.jpg 750w" sizes="(max-width: 300px) 100vw, 300px" /></strong></h4>
<p>Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ Certification, your company is already leagues ahead in terms of compliance. The list below highlights ten things you can do to help run your business more efficiently, all of which are required of i-SIGMA Certified Providers. <strong><a href="https://directory.isigmaonline.org/suppliers/" target="_blank" rel="noopener">Find an i-SIGMA Certified Service Provider Here &gt;&gt;</a></strong></p>
<h4><strong>Identify and prioritize compliance requirements</strong></h4>
<p>The first step towards efficient compliance is to identify and prioritize the requirements that apply to your business. Depending on your industry and location, you may need to comply with various regulations, such as data privacy laws, labor laws, and tax regulations. Make a list of these requirements and prioritize them based on their importance and impact on your business.</p>
<h4><strong>Create a compliance program</strong></h4>
<p>Once you have identified the compliance requirements, create a compliance program that outlines the policies and procedures for meeting these requirements. This program should be tailored to your business and should cover all relevant compliance areas. Ensure that all employees are trained on the compliance program, and make sure that it is regularly updated to reflect changes in regulations.</p>
<h4><strong>Hire a compliance officer</strong></h4>
<p>If your business is large enough, consider hiring a dedicated compliance officer who will oversee the compliance program and ensure that all employees are following the policies and procedures. The compliance officer should have a thorough understanding of the regulations that apply to your business and should be able to keep up with any changes in these regulations.</p>
<h4><strong>Use technology to automate compliance tasks</strong></h4>
<p>Technology can help you automate many compliance tasks, such as tracking employee hours, filing tax returns, and monitoring data privacy compliance. By automating these tasks, you can reduce the risk of human error and save time and resources. Consider investing in compliance software that can help you manage compliance more efficiently.</p>
<h4><strong>Conduct regular compliance audits</strong></h4>
<p>Regular compliance audits can help you identify areas where your business may not be meeting regulatory requirements. These audits should be conducted by an independent third party who has expertise in the relevant compliance areas. The findings of the audit should be used to improve the compliance program and make any necessary changes to policies and procedures.</p>
<h4><strong>Monitor regulatory changes</strong></h4>
<p>Regulatory requirements are constantly changing, and it&#8217;s important to stay up-to-date on these changes. Subscribe to regulatory newsletters and attend relevant conferences and events to stay informed about any changes that may impact your business. Update your compliance program and policies as needed to ensure that you are meeting the latest regulatory requirements.</p>
<h4><strong>Train employees on compliance</strong></h4>
<p>All employees should be trained on the compliance program and the policies and procedures for meeting regulatory requirements. This training should be provided on a regular basis and should cover all relevant compliance areas. Ensure that employees understand the importance of compliance and the consequences of non-compliance.</p>
<h4><strong>Implement a whistleblower policy</strong></h4>
<p>A whistleblower policy can help you identify and address compliance issues before they become serious problems. This policy should provide employees with a way to report any suspected violations of regulations or company policies without fear of retaliation. Ensure that all employees are aware of the whistleblower policy and understand how to use it.</p>
<h4><strong>Maintain accurate records</strong></h4>
<p>Accurate record-keeping is essential for compliance. Keep all relevant records, such as financial statements, tax returns, and employee records, organized and up-to-date. Use a secure storage system to protect sensitive information and ensure that only authorized personnel have access to these records.</p>
<h4><strong>Seek professional help</strong></h4>
<p>If you&#8217;re unsure about how to meet regulatory requirements or if you&#8217;re facing a compliance issue, seek professional help. Consult with a lawyer or compliance expert who can provide you with guidance and advice on how to meet regulatory requirements and avoid compliance issues.</p>
<p>Compliance is a critical aspect of running a business, and it&#8217;s important to ensure that your business is meeting all regulatory requirements. By following the ten steps outlined in this article, with the help of an <strong><a href="https://directory.isigmaonline.org/" target="_blank" rel="noopener">i-SIGMA Certified Service Provider</a></strong>, you can help run your business more efficiently with compliance and reduce risk.</p>
<p>The post <a href="https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/">Efficiently Keeping Your Business in Compliance</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</title>
		<link>https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/</link>
		
		<dc:creator><![CDATA[kelly]]></dc:creator>
		<pubDate>Thu, 10 Nov 2022 19:04:13 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5698</guid>

					<description><![CDATA[<p>Earlier this year, i-SIGMA hosted a webinar by guest presenter Daniel Risen, an Employee Benefits Advisor and Business Development Executive for OneDigital. Daniel shared with Members how to maximize the Cares Act Incentives via this webinar and a follow-up article in the iG Journal . You can access these here: Maximizing the Cares Act Incentives [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/">Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Earlier this year, i-SIGMA hosted a webinar by guest presenter Daniel Risen, an Employee Benefits Advisor and Business Development Executive for OneDigital. Daniel shared with Members how to maximize the Cares Act Incentives via this webinar and a follow-up article in the iG Journal . You can access these here:</p>
<ul>
<li><a href="https://isigmaonline.box.com/s/af227n34guqkygzl16vhe9wb87sfxmrq" target="_blank" rel="noopener">Maximizing the Cares Act Incentives &#8211; Webinar</a></li>
<li><a href="https://issuu.com/isigmaonline/docs/ig_journal2022_issue3_issuu/26" target="_blank" rel="noopener">Maximizing the Cares Act Incentives &#8211; Article</a></li>
</ul>
<p>Following the webinar, i-SIGMA received a few member inquiries under our Ask the Professionals program and are sharing the responses. </p>
<p><strong>Please Note: </strong>i-SIGMA is not a Certified Public Account and is not providing specific legal or accounting advice. We recommend that you reach out to your local tax professional to determine what specifically applies to your business in your local jurisdiction.</p>
<p>&nbsp;</p>
<h3>Question</h3>
<p><em>Dear Ask the Professionals,</em></p>
<p><em>We are excited about adding ERC funds to the PPP money we already qualified for but I&#8217;m confused if these funds will be consider taxible income later on. Please advise.</em></p>
<p><em>Sincerely,</em></p>
<p><em>Tax Ignorant</em></p>
<h3>Answer</h3>
<p><em>Dear Tax Ignorant,</em></p>
<p><em>We reached out to CPA Kristina Morgan of Sechler Morgan CPAs PLLC, who advised us of the following:</em></p>
<p><em>Nonprofit entities will NOT have to file an amended tax return (other than the required payroll tax return).</em></p>
<p><em>For-profit entities WILL have to file an amended tax return for the years they claim the credit. Those amounts will increase the companies’ profits (or reduce losses or carryover losses) and will therefore be taxable.</em></p>
<p><em>i-SIGMA also discovered that if a business claims the credit and is not eligible but certifies that they are, this is considered tax fraud. As such, we advise our members to work with a professional to understand the many requirements and calculations that are involved, especially if they also received a PPP Loan(s).</em></p>
<p><em>Sincerely,</em></p>
<p><em>i-SIGMA &amp; Professionals</em></p>
<h3>Question</h3>
<p><em>Dear Ask the Professionals,</em></p>
<p><em>I attended the webinar that i-SIGMA held regarding the Employee Retention Credit (ERC). We have a very small team with only a handful of employees. It seems that most firms want to work with large businesses and are focused only on revenue loss as a basis for applying for the credit. Do you have any information on the other ways of qualifying?</em></p>
<p><em>Sincerely</em></p>
<p><em>Small But Mighty</em></p>
<h3>Answer</h3>
<p><em>Dear Small But Mighty,</em></p>
<p><em>We followed up with Daniel Risen who did the presentation as well as spoke to other members applying for the credit. You are correct that initially, firms assess revenue. However, less than 5% of businesses that have received ERC have qualified under this criteria. (What qualifies? In 2020, if you saw a 50% drop in revenue, compared to the same quarter in 2019, you would be eligible for all of 2020. In 2021, if you saw a 20% reduction in revenue, compared to the same quarter in 2019, you would be eligible for that entire quarter in 2021.</em></p>
<p><em>More businesses qualify for ERC via the &#8220;Governmental Orders&#8221; criteria. If in your state or federally you were affected in your ability to conduct COMMERCE, TRAVEL, or GROUP MEETINGS by the pandemic under certain criteria, you could qualify. A few examples of qualifiers Daniel has seen within our industry in some states include:</em></p>
<ol>
<li><em>Supply Chain Disruption</em></li>
<li><em>Requirement of the company to spend time and money on PPE to clean and sanitize equipment</em></li>
<li><em>Furloughed Employees</em></li>
<li><em>Sales were forced to go virtual (if you were unable to attend tradeshows or sales conferences)</em></li>
<li><em>Employees may not be “active” all day or were forced to perform work outside of their normal job duties</em></li>
</ol>
<p><em>One member did share with us that while his CPA was reluctant to work with him, after approaching another CPA, their business is getting back $250K. His advice was to keep looking for firms who are willing to sit and take the time to work with you!</em></p>
<p><em>Sincerely,</em></p>
<p><em>i-SIGMA &amp; Professionals</em></p>
<p> <br />
<strong>Important:</strong> Some experts contend that since our industry was mostly exempted from the shutdown, <strong><em>due to our industry being deemed essential</em></strong>, some businesses may not qualify. We advise our members to work with a professional to understand the many requirements and calculations that are involved with your specific business and local jurisdiction.</p>
<p>The post <a href="https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/">Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Updates on the Morgan Stanley Data Breach</title>
		<link>https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Fri, 28 Oct 2022 15:20:17 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Electronics]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5675</guid>

					<description><![CDATA[<p>By now, most readers have most likely heard of the Morgan Stanley Data Breach incident. The latest $35M fine from the SEC, on top of the $128.2M Morgan Stanley has already shelled out, is due to the breach of personal data of 15 million customers appearing on hard drives at an auction where the data [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/">Updates on the Morgan Stanley Data Breach</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By now, most readers have most likely heard of the <a href="https://techcrunch.com/2022/09/21/morgan-stanley-hard-drives-data-breach/" target="_blank" rel="noopener">Morgan Stanley Data Breach incident.</a> The latest $35M fine from the SEC, on top of the $128.2M Morgan Stanley has already shelled out, is due to the breach of personal data of 15 million customers appearing on hard drives at an auction where the data was supposed to have been wiped.</p>
<p>What happened that fines are still being assessed and we are still talking about this mayhem? </p>
<p>Morgan Stanley originally hired the moving company, Triple Crown, in 2016 to decommission IT assets from two data centers. It was known that Triple Crown was strictly a moving company and not experienced with electronic data destruction. The contract identified an unnamed e-scrap management company that would sanitise the devices and resell them for a commission, with Morgan Stanley obtaining a cut. It&#8217;s become known that early on, Triple Crown stopped working with the unidentified company and began working with AnythingIT without Morgan Stanley&#8217;s knowledge. AnythingIT was sold the eletronics with data still on them, having been told by Triple Crown that they had already been wiped. They in turn resold these devises downstream to KruseCom, who either destroyed or sold them on an auction site. </p>
<p>Truly a story in passing the buck and a loss in accountability. Where is the certificate of destruction? Where is the vendor due diligence? There was none, which is why Morgan Stanley is paying dearly. </p>
<p>If you look-up AnythingIT today, you&#8217;ll note that they are NAID AAA Certified. There has been some confusion on if this third-party vendor who worked in the Morgan Stanley debactle was certified, how could all of this have happened? As you can see, 1) they were given misinformation and not contracted to do the actual data wiping, AND 2) at the time of them being contracted they were not yet NAID AAA Certified. Since this incident, AnythingIT has become NAID AAA Certified and shown that they in fact DO robust quality best practices, even submitting to unannounced audits. </p>
<p>There are many lessons learned through this incident for everyone, clients and service providers alike. </p>
<p>Morgan Stanley did not take the correct precautions to ensure they hired a reputable service provider, such as a NAID AAA Certified company who would have had rigorous guidelines in place for wiping the hard drives. And it seems that service provider to service provider contracts may have been lacking as well regrading the goods being transferred (do you have language in place when you take acquisition of assets without destroying it?). </p>
<p><a href="https://isigmaonline.org/certifications/naid-aaa-certification/why-become-certified/" target="_blank" rel="noopener">Why You Should Earn Your NAID AAA Certification &gt;&gt;</a></p>
<p><a href="https://isigmaonline.org/certifications/naid-aaa-certification/why-use-a-certified-co/" target="_blank" rel="noopener">Why You Should Use a NAID AAA Certified Company &gt;&gt;</a></p>
<p>The post <a href="https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/">Updates on the Morgan Stanley Data Breach</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beyond Certification</title>
		<link>https://isigmaonline.org/beyond-certification/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 25 May 2022 18:43:10 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5462</guid>

					<description><![CDATA[<p>The title of this blog may seem odd coming from a person who has spent the last 22 years promoting service provider certification. Please bear with me. As readers already know, the premise of Data Processor certifications has changed. Where once they simply provided a general reassurance that a reputable third party had signed off [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/beyond-certification/">Beyond Certification</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-5463" src="https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-300x300.png" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-300x300.png 300w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-1024x1024.png 1024w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-150x150.png 150w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-768x768.png 768w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-99x99.png 99w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-425x425.png 425w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-465x465.png 465w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6.png 1080w" sizes="auto, (max-width: 300px) 100vw, 300px" />The title of this blog may seem odd coming from a person who has spent the last 22 years promoting service provider certification. Please bear with me.</p>
<p>As readers already know, the premise of Data Processor certifications has changed. Where once they simply provided a general reassurance that a reputable third party had signed off on the vendor’s practices, now, if properly constructed and managed, those certifications fulfill a client’s regulatory due diligence requirements. Certification has gone from providing a warm and fuzzy intangible, to a very real, tangible benefit.</p>
<p>Another way to look at it is that clients have two options to meet their vendor selection due diligence requirements. 1.) They can review their prospective Data Processors themselves – both initially and ongoing after hiring – against the relevant regulatory and security requirements, or 2.) They can rely on a reputable, bonafide certification program to do it for them.</p>
<p>So, what is this about looking beyond certification?</p>
<p>The fact is, there are two things a certification cannot do… and should not do… which are equally important to a client compliance and/or risk, namely, the quality of their data processor contracts and insurance.</p>
<p>All data protection regulations necessitate a contract between the Data Controller (the client) and the Data Processor (service provider)</p>
<p>I specifically use the word “necessitates” because some U.S. regulations are silent on such contractual engagements, but, in all practicality, the absence of such a contract would almost certainly be deemed negligent. In court the question would be, “Do you mean to justify to the court that you were entrusting this vendor with personal information your firm was required to protect and you had no contract with to hold them accountable?”</p>
<p>Again, for the most part, regulations, even in U.S. do require a Data Controller-Data Processor contract. Furthermore, with data protection regulations now applying to citizens versus territories, the only prudent course is to default to the most rigorous.</p>
<p>Contracts are by nature not something a certification can have much overlap, besides, that is, the obvious overlap of a contract requiring a vendor maintain a certified status. Beyond that, however, a certification cannot (and should not) be expected to stipulate all the various particular issues and clauses that a Data Controller-Data Processor contract would. There are simply too many variables and subtleties.</p>
<p>The same can be said about insurance, and, more specifically, Professional Liability Insurance (PLI). PLI would be the insurance a service provider would rely on to cover the expense on any accident or negligence in the performance of their professional duties. From the Data Controller’s perspective, the availability and quality of PLI are critical, since the insurance is what allows the Data Processor to be held financially responsible.</p>
<p>As a side note, I cannot tell you how many times I have seen Data Controllers passing on financial liability to a Data Processor with no reciprocal requirement for that Data Processor to have PLI. Of course, this stipulation would be useless unless it was accompanied by the Data Controller’s evaluation of the PLI, since there is the strong possibility that the policy has problematic exclusions.</p>
<p>Back to the topic at hand, though, this is exactly the reason a certification cannot simply mandate Data Processor maintain PLI, since the certification cannot evaluate the insurance anymore than it can mandate necessarily specialized, custom contracts.</p>
<p>So what?</p>
<p>Well, for the client requiring certification it means there is more to do, and that there is no shortcut. Contracts and the professional liability of the service provider are always going to be something requiring they get into the weeds.</p>
<p>For the service provider, it means opportunity. Being able to help clients understand and navigate their contract and insurance requirements and risks will both set them apart from their competition as a true professional and earn them the margins they deserve as such a professional.  Looking at it from another angle, it is only a matter of time before clients become aware of these issues. It will certainly reflect more positively if the service provider that has already made it known that they are aware of these issues, or at least is able to respond intelligently, versus simply looking back at the client, shrugging and clueless.</p>
<p>End note for clarity: Contracts fall under both compliance and risk management. Insurance, on the other hand, is not a compliance issue but definitely falls very high on the risk management continuum.</p>
<div class="col col_two_thirds ">
<article id="Post" class="blogposts">
<h6 style="text-align: right;">Written by Robert Johnson, CSDS | 25 May 2022</h6>
</article>
</div>
<p>The post <a href="https://isigmaonline.org/beyond-certification/">Beyond Certification</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Media Collection Containers, Key Control, &#038; Custody</title>
		<link>https://isigmaonline.org/media-collection-containers-key-control-custody/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 11 May 2022 22:34:25 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5382</guid>

					<description><![CDATA[<p>Secure data destruction service commonly provides clients with containers to accumulate paper or other media prior to destruction. And, while it is true that the containers are designed to protect the media from prying eyes and hands, they are not high security vaults, and clients or service providers losing sight of this put themselves at [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/media-collection-containers-key-control-custody/">Media Collection Containers, Key Control, &#038; Custody</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-5383" src="https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-300x300.jpg" alt="" width="212" height="212" srcset="https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2022/05/Your-Company-Name-Here-is-NAID-AAA-Re-Certified-9.jpg 1080w" sizes="auto, (max-width: 212px) 100vw, 212px" />Secure data destruction service commonly provides clients with containers to accumulate paper or other media prior to destruction. And, while it is true that the containers are designed to protect the media from prying eyes and hands, they are not high security vaults, and clients or service providers losing sight of this put themselves at risk.</p>
<p>Conventional media collection containers are provided as a convenience, not a security measure. And while they do serve to prevent access by unauthorized individuals, they were never intended to secure information from a malicious individual who could simply wheel the bin away, bust it open with a hammer, or slice it open with a razor knife.</p>
<p>The actual “security” stems solely from the controlled confines of the client’s building; it has locks on the front door, the watching eyes of employees, and the security alarm and CCTV of the building…and not from the container itself.</p>
<p>Understanding this is important for a number of reasons.</p>
<h4>Key Control</h4>
<p>It sometimes strikes clients as inappropriate (or unsecure) that the keys to their containers open containers placed at other clients. Doesn’t that mean those other clients could open their bins too?</p>
<p>The misconception here is that the “key” is the source of the security. It is not. If an unauthorized person is walking around their office opening bins, the problem is with the security of the building, not the container. As already mentioned, that same malicious unauthorized individual walking around the office could have gotten into the containers without the key.</p>
<p>The idea that a key that is exclusive to one client is more secure is both misguided and dangerous. No client should believe – or be led to believe &#8211; that anything but the security of the overall environment in which the containers are deployed is the actual source of the security.</p>
<p>Furthermore, from the service provider’s perspective, suggesting the key and container are the source of the security suggests that they – the service provider &#8211; are responsible for that security of material in the client’s office. It is extremely reckless, both for the service provider, and the client, to foster that belief.</p>
<h4>Care and Custody</h4>
<p>Clients sometimes believe (or act as if they believe) that custody of the media transfers to the service provider once it goes into the collection container. That is not the case. Regardless of who provided the collection container, the service provider is not responsible for the care and custody of personal information until they take possession of it. Again, the security of the environment is the important thing, and, as a result, it is very important that service providers do nothing that suggests otherwise.</p>
<h6 style="text-align: right;">Written by Bob Johnson, CSDS | 11 May 2022</h6>
<p>The post <a href="https://isigmaonline.org/media-collection-containers-key-control-custody/">Media Collection Containers, Key Control, &#038; Custody</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If Certification is in Your Plans, Now is the Time!</title>
		<link>https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 23:57:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4363</guid>

					<description><![CDATA[<p>First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger. In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4364" src="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg" alt="" width="199" height="199" srcset="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg 1080w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-99x99.jpg 99w" sizes="auto, (max-width: 199px) 100vw, 199px" />First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger.</p>
<p>In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including state-of-the-art contracts and agreements, marketing materials, regulatory intervention, and educational events. Find the full list and details of <a href="https://isigmaonline.org/membership/membership-join/" target="_blank" rel="noopener noreferrer">all i-SIGMA benefits</a> on <a href="https://isigmaonline.org/">the association website</a>, and all members are encouraged to review and make use of them.</p>
<p><strong>Certifications</strong><em>:</em> Included among the benefits of i-SIGMA membership benefits is access to information protection’s two leading service provider certifications, NAID AAA and PRISM Privacy+. With the overwhelming majority of its more than 1,200 member-locations holding one or both of those certifications, they are the most success programs i-SIGMA has offered to date.</p>
<p>By now, it is well known that i-SIGMA membership replaces NAID and PRISM International membership at the end of this month, and that going forward the use of NAID and PRISM will be limited to their respective certifications.</p>
<p><strong>A Personal/Business Decision</strong><em>:</em> Over the years, our surveys have consistently shown that the vast majority of non-certified members fully intend to become certified as soon as they can find the time. And whether now is the right time or not, it is critical for those members to know they are still benefiting from the association’s efforts and their contribution to the association continues to promote client education and adoption of their services.</p>
<p>It is also important, however, for non-certified members to take stock. In a matter of weeks, NAID and PRISM will only be associated with each respective certification program. If past surveys are correct, and certification is a future goal, there is no better time to do it than now; thereby maintaining your link to the two most recognized information protection brands in the world.</p>
<p><strong>How to Become Certified</strong>: Becoming Certified is not as complicated as some may think.</p>
<ol>
<li>Meet all required specifications as outlined in the <a href="https://isigmaonline.box.com/s/xv82llmhun8ad1hjkcc17p0iemohe0ia" target="_blank" rel="noopener noreferrer">i-SIGMA Certification Specifications Reference Manual</a></li>
<li>Submit a completed certification application</li>
<li>Successfully complete an initial scheduled audit verifying all aspects of compliance</li>
</ol>
<p><a href="mailto:certification@isigmaonline.org">Contact the i-SIGMA Certification Department</a> for more information.</p>
<h6 style="text-align: right;">Written by Bob Johnson | 30 November 2021</h6>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Struggle to Hire &#038; Retain Good Employees</title>
		<link>https://isigmaonline.org/the-struggle-to-hire-retain-good-employees/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 17:18:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4278</guid>

					<description><![CDATA[<p>Gone—for now anyway—are the days when finding and retaining good employees could be taken for granted. The recent i-SIGMA member survey, along with many conversations with members on what to do about it, has shown the competition for capable, hard-working, and presentable service personnel in records management and secure data destruction is increasing difficult…and in some cases, [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/the-struggle-to-hire-retain-good-employees/">The Struggle to Hire &#038; Retain Good Employees</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4192" src="https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1.jpg" alt="" width="235" height="235" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1.jpg 2160w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-1536x1536.jpg 1536w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-2048x2048.jpg 2048w, https://isigmaonline.org/wp-content/uploads/2021/09/We-offer-a-customized-approach-that-suits-you.-1-99x99.jpg 99w" sizes="auto, (max-width: 235px) 100vw, 235px" />Gone—for now anyway—are the days when finding and retaining good employees could be taken for granted. The recent i-SIGMA member survey, along with many conversations with members on what to do about it, has shown the competition for capable, hard-working, and presentable service personnel in records management and secure data destruction is increasing difficult…and in some cases, having an impact on the ability to serve clients and grow.</p>
<p>Those attending the i-SIGMA webinar on How to Overcome the Labor Dilemma in an Evolving COVID Economy w/ Tom Adams hear him say these tasks require the same focus, the same planning, the same intensity of effort as sales and marketing. In short, service providers can no longer afford to take it for granted.</p>
<p>With that in mind, i-SIGMA would like to share what we have learned since first starting this discussion, and, more importantly, hear what others are doing.</p>
<ol>
<li>Hiring and retaining drivers is the most troublesome issue. Drivers are the face of the company. They need to be presentable and capable when dealing with clients and the inevitable issues that can arise in the field. In fact, the drivers our industry needs interact with clients far more than the delivery driver that knocks on your door and leaves a box.</li>
<li>Increasing compensation is a solution, but there are nuances. Of course, increasing pay will attract and keep employees, but bumping them up 20% in one stroke, could cause problems. Additionally, hiring a new driver (or other employee) at the same rate or higher than a long-time employee has a number of risks too, such as losing or de-motivating the long-time employee.</li>
<li>Paying higher wages and showing more appreciation is the least expensive strategy. Keeping a client is a lot less expensive than finding a new one… and the same can be said of good employees. Recruiting and training are expensive, even more so when you know how much effort it takes to find and attract new people. A bad interaction with an under-trained employee can cost you customers.</li>
<li>Poaching (especially drivers) is okay but should be strategic and discrete. Let’s face it, the person sitting at home who’s benefits just ran out might not be the best choice. Better is someone who is working (and working hard). Water delivery services and appliance delivery are two industries providing a good source of drivers who are used to hard work and dealing the public but finding them and luring them requires tactical diligence. Keep in mind, this is a two-way street. While i-SIGMA does not condone poaching among its members, good, hard-working employees—no matter where they are presently—are at a premium. There is a good chance someone is eyeing yours.</li>
</ol>
<p>We know there are more ideas and considerations out there. Some readers might disagree. PLEASE COMMENT! We want to hear from you. In fact, your comment may end up in a more complete examination of this issue printed in an i-SIGMA publication.</p>
<p><strong><a href="https://www.linkedin.com/feed/update/urn:li:activity:6847193083415814144" target="_blank" rel="noopener noreferrer">Share Your Comments in the i-SIGMA LinkedIn Group Post Now &gt;&gt;</a></strong></p>
<p>The post <a href="https://isigmaonline.org/the-struggle-to-hire-retain-good-employees/">The Struggle to Hire &#038; Retain Good Employees</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is the Correct Particle Size for Your Destroyed Media?</title>
		<link>https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/</link>
		
		<dc:creator><![CDATA[kelly]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 00:04:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4118</guid>

					<description><![CDATA[<p>It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information. And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy. Unfortunately, when searching for such [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/">What is the Correct Particle Size for Your Destroyed Media?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-4120 alignright" src="https://isigmaonline.org/wp-content/uploads/2021/07/particle-size.png" alt="" width="232" height="153" />It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information.</p>
<p>And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy.</p>
<p>Unfortunately, when searching for such guidance online, the only information available often pertains to government classified information, resulting in unnecessary expense and often a high degree of unnecessary inconvenience.</p>
<h4>Here are a few things to consider:</h4>
<ul>
<li>No data protection regulation in the world specifies a particle size for destroyed paper or electronic equipment. They simply mandate the information be reasonably inaccessible and not reconstructible.</li>
<li>Most particle size specifications issued by and for government agencies must anticipate that the materials are not controlled after the destruction process.</li>
<li>Unnecessarily meeting a very small (and irrelevant) particle size can cost 5 to 10 times what would be reasonable by regulators.</li>
<li>Because of the factors above, requiring an unnecessarily small particle size may discourage compliance by front line employees, which, ironically, ends up putting the organization at greater risk.</li>
</ul>
<h4>Also consider:</h4>
<ul>
<li>NAID AAA Certified media destruction services are required to demonstrate they prevent access to destroyed particles after the destruction process.</li>
<li>Commercial media destruction firms destroy large amounts of material from multiple sources, all of which is co-mingled prior to being baled and securely recycled or responsibly discarded.</li>
<li>Hundreds of thousands of organizations around the world rely on NAID AAA Certified service providers to meet the security and regulatory media destruction requirements.</li>
</ul>
<p>i-SIGMA is a global, non-profit association dedicated to the proper destruction of discard information for more than 27 years and believes that organization is ultimately responsible for the protection of personal and competitive information in its possession.</p>
<p>The advice above is simply provided to help organizations decide what particle size best meets their needs, while avoiding the expense and risks of acting without a complete perspective.</p>
<h3>NAID AAA Certified Company Marketing Resources</h3>
<p>Companies who are NAID AAA Certified should use the following resources to use as marketing material for clients asking questions pertaining to particle size:</p>
<p><a href="https://nationalassociationforinfor.box.com/s/8ol3oycq8pbqo57bymq866zi1hqocxld" target="_blank" rel="noopener noreferrer"><strong>&#8220;What is the Correct Particle Size for Your Destroyed Media?&#8221;</strong></a></p>
<p><strong><a href="https://nationalassociationforinfor.box.com/s/4gih3ki5a2gxvve0oycsoxkpf4fmlxzj" target="_blank" rel="noopener noreferrer">&#8220;What is the Correct Particle Size for Your Destroyed Media?&#8221; &#8211; ANZ &amp; UK</a></strong></p>
<p><em>Please Note: It is acceptable for Certified members in good standing to also translate this file into other languages </em></p>
<h6 style="text-align: right;">Written by Bob Johnson | 29 July 2021</h6>
<p>The post <a href="https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/">What is the Correct Particle Size for Your Destroyed Media?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
