Close

i-SIGMA - Blog

Stay up to date and engage in the latest conversation on matters within the secure destruction industry.

What is the Correct Particle Size for Your Destroyed Media?

It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information. And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy. Unfortunately, when searching for such […]

Read more »

Untapped Opportunity & Value-Added Service: Residential Shred Bags

Guest Article By: Joshua D. Hundeby-DeVries, CSDS Editor’s Note: In light of current market dynamics, where many clients now find their employees working from home, it seems appropriate to revisit the topic of Residential Shred Bags. A service provider who was already effectively leveraging them in their business model originally wrote this article in 2018. […]

Read more »

MEMBER News: Gilmore Services Rebrands to Honor the Legacy of Founder

FOR IMMEDIATE RELEASE : June 7, 2021 Gilmore Services, an i-SIGMA Associate member, and a data and document security company based out of Pensacola, Florida, has rebranded itself to honor the legacy of its founder, Jim Gilmore, who started the company in 1955 on the foundations of building relationships with customers, employees, and the community. […]

Read more »

Legal Marijuana Raises Drug Screening Questions and Risks

(This blog is provided for perspective only and not to be taken as legal advice) As I often remind service providers, though i-SIGMA certifications (NAID AAA/PRISM Privacy+) require drug screening prior to hiring, and either ongoing drug screening or training to recognize substance abuse, the certifications themselves do not prescribe how service providers respond to […]

Read more »

Issues and Emerging Trends in Employee Background Screening

Author’s Note: In writing this, I am acutely aware that many i-SIGMA members find themselves at this time having trouble finding good employees. Despite that fact, or maybe because of it, rehashing the basis and issues related to background screening is important. Oh yeah, and I am not a lawyer or CRA and this is […]

Read more »

Regulatory Changes Have the Potential to Enhance Client Engagement and Service Provider Profits

To keep i-SIGMA certifications (NAID AAA and PRISM Privacy+) relevant, they must reflect and validate service providers’ regulatory requirements. As I have often written, that is one of our biggest challenges, and it is the key to NAID AAA Certification and PRISM Privacy+ Certification maintaining their growing preeminence with clients internationally. For more than a […]

Read more »

How Does NAID AAA Certification Intersect With NIST 800-88? (Part 2)

This is the second blog of a two-part series. The first installment provided a perspective on the relative differences in NAID AAA Certification and NIST 800-88 and its overlap with physical media destruction requirements. This installment, addresses the implications of the same on electronic media erasure. Though reading Part 1 of this series is not […]

Read more »

How Does NAID AAA Certification Intersect With NIST 800-88? (Part 1)

This blog will be presented in two-parts. In this first installment, I will provide a perspective on the relative differences in NAID AAA Certification and NIST 800-88 and its overlap with physical media destruction requirements. In the next installment, I will do the same on the implications for electronic media erasure. I assume most readers […]

Read more »

What to do When Clients Misapply Specifications

It’s happened to many data destruction service providers and to those it hasn’t happened yet, it will at some point. It looks like this: You have been destroying media for a client for many years, when they ask whether you comply to a certain specification or standard. (Usually someone else in the firm is bringing […]

Read more »

See Something, Say Something

Most readers will immediately associate the title of this blog with the U.S. Homeland Security campaign to enlist the public in their efforts to expose potential risks. The logic, of course, is obvious; people who are out and about in their local communities and neighborhoods are the most likely to recognize bad actors and bad […]

Read more »