<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sales &amp; Marketing Archives - i-SIGMA</title>
	<atom:link href="https://isigmaonline.org/category/blog/sales-marketing/feed/" rel="self" type="application/rss+xml" />
	<link>https://isigmaonline.org/category/blog/sales-marketing/</link>
	<description>i-SIGMA Annual Conference and Expo Sites</description>
	<lastBuildDate>Thu, 15 May 2025 14:41:12 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>
	<item>
		<title>No Substitute for Certified Security: Why Educating Prospects on i-SIGMA&#8217;s NAID AAA Certification Is a Must</title>
		<link>https://isigmaonline.org/no-substitute-for-certified-security-why-educating-prospects-on-i-sigmas-naid-aaa-certification-is-a-must/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Tue, 13 May 2025 16:15:05 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6726</guid>

					<description><![CDATA[<p>By Heather Fitzanko, CSDS In an age where data breaches make headlines and regulatory scrutiny is increasing across industries, NAID AAA Certified shredding companies offer a critical safeguard that many businesses still don’t fully understand—or value appropriately. Too often, vendors and prospects believe that simply “complying with security standards” is sufficient protection when it comes [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/no-substitute-for-certified-security-why-educating-prospects-on-i-sigmas-naid-aaa-certification-is-a-must/">No Substitute for Certified Security: Why Educating Prospects on i-SIGMA&#8217;s NAID AAA Certification Is a Must</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>By Heather Fitzanko, CSDS</em></p>
<p><img decoding="async" class="wp-image-97 size-full alignright" src="https://isigmaonline.org/wp-content/uploads/2018/11/NaidAAA.jpg" alt="" width="215" height="215" srcset="https://isigmaonline.org/wp-content/uploads/2018/11/NaidAAA.jpg 215w, https://isigmaonline.org/wp-content/uploads/2018/11/NaidAAA-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2018/11/NaidAAA-150x150.jpg 150w" sizes="(max-width: 215px) 100vw, 215px" />In an age where data breaches make headlines and regulatory scrutiny is increasing across industries, NAID AAA Certified shredding companies offer a critical safeguard that many businesses still don’t fully understand—or value appropriately. Too often, vendors and prospects believe that simply “complying with security standards” is sufficient protection when it comes to data destruction. But as we know, there is a world of difference between compliance and certification.</p>
<p>NAID AAA Certified service providers not only understand the importance of third-party oversight—they live it. But if clients and prospects are not actively being educated about why NAID AAA Certification matters, there is a risk of being lumped in with providers who self-attest to standards without any external validation. Now, more than ever, it’s imperative to champion this message: <strong>There is no substitute for NAID AAA Certification.</strong></p>
<p><strong>The Compliance Myth</strong></p>
<p>Many RFPs and procurement departments default to language like “vendor must comply with security standards” or “adhere to best practices.” While this sounds responsible, in practice, it means very little. Compliance without certification is often self-regulated. There’s no third-party audit, no proof of implementation, and no accountability.</p>
<p>This is where education is essential. We must clearly communicate that i-SIGMA&#8217;s NAID AAA Certification isn’t just about doing the right thing—it’s about <strong>proving it</strong>, through scheduled and surprise audits, employee background screening, rigorous protocols, and facility security requirements. It is a gold standard of trust, not a box to check.</p>
<p><strong>Five Key Messages to Share with Prospects</strong></p>
<p>To make our message resonate, we need to speak our clients&#8217; language—risk, liability, brand protection, and cost avoidance. Here are five reasons you should be explaining why i-SIGMA&#8217;s NAID AAA Certification is non-negotiable:</p>
<ol>
<li><strong>Verified Oversight</strong><br />
Only NAID AAA Certified providers are subject to routine, independent audits. This removes guesswork and ensures consistent, secure practices that are actively monitored.</li>
<li><strong>Risk Reduction</strong><br />
Non-certified vendors increase the chance of data mishandling, which can lead to devastating breaches. NAID AAA Certified companies have proven systems in place to minimize that risk.</li>
<li><strong>Regulatory Compliance</strong><br />
From HIPAA to GDPR, compliance isn’t optional. NAID AAA Certified providers are trained and validated to meet the legal standards that govern data destruction.</li>
<li><strong>Cost Protection</strong><br />
While uncertified vendors may offer cheaper services, the cost of a breach—fines, lawsuits, reputation damage—can far outweigh short-term savings. NAID AAA Certification is a wise investment in risk mitigation.</li>
<li><strong>Reputation Management</strong><br />
Your clients trust you to protect their data. A breach linked to a non-certified vendor can permanently tarnish their reputation—and yours. Certification gives them peace of mind.</li>
</ol>
<p><strong>Elevating the Value of NAID AAA Certification</strong></p>
<p>Perhaps one of the most important reasons to educate others about NAID Certification is this: <strong>every conversation helps elevate its value.</strong> By helping companies understand what certification really means, we’re not just selling our services—we’re raising the standard for the entire industry.</p>
<p>When more organizations recognize and prioritize NAID AAA Certification, it strengthens its authority and credibility. It becomes the default expectation, not the exception. That momentum benefits every certified provider, reinforcing the value of the investment made in maintaining certification.</p>
<p>In other words, the more certified companies advocate for the certification, the more valuable it becomes—for i-SIGMA members, their clients, and for the future of secure information governance.</p>
<p><strong>Embedding Certification into RFP Conversations</strong></p>
<p>One of the most impactful steps in education is encouraging clients to <strong>include NAID AAA Certification as a requirement in their RFPs</strong>—not as a suggestion or guideline, but as a non-negotiable qualification. Language such as “Vendor must be NAID AAA Certified under i-SIGMA” provides clear direction and eliminates ambiguity.</p>
<p>We can also help procurement teams rewrite vague requirements and offer education sessions to explain what NAID AAA Certification entails. Whether it’s through webinars, one-on-one meetings, or even RFP response templates, this should be a part of the everyday sales process.</p>
<p><strong>The Bottom Line: Certified or Not at All</strong></p>
<p>Companies work hard to achieve NAID AAA Certification. It’s a badge of accountability, professionalism, and trust. But if the market isn’t educated on what that truly means, it allows uncertified providers to compete on an uneven playing field.</p>
<p>Be proactive. Be vocal. And make sure every vendor and prospect knows: <strong>There is no substitute for NAID AAA Certified shredding services. </strong>And in doing so, strengthen the standard we stand behind—making NAID AAA Certification the most recognized, respected, and required credential in the industry.</p>
<p>&nbsp;</p>
<p>The post <a href="https://isigmaonline.org/no-substitute-for-certified-security-why-educating-prospects-on-i-sigmas-naid-aaa-certification-is-a-must/">No Substitute for Certified Security: Why Educating Prospects on i-SIGMA&#8217;s NAID AAA Certification Is a Must</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Shred Day is Every Day</title>
		<link>https://isigmaonline.org/shred-day-is-every-day/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 06 Jun 2024 18:10:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6388</guid>

					<description><![CDATA[<p>Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA) As our office places are prioritizing sustainability goals, what actions are needed to protect private sensitive data while also diverting from landfill dependence and making positive environmental steps? Reducing paper waste in the office is a positive environmental step. We are less likely [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/shred-day-is-every-day/">Shred Day is Every Day</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA)</em></strong></p>
<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-6389 alignright" src="https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2024/06/Member-Portal-24.jpg 1200w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>As our office places are prioritizing sustainability goals, what actions are needed to protect private sensitive data while also diverting from landfill dependence and making positive environmental steps?</p>
<p>Reducing paper waste in the office is a positive environmental step. We are less likely to press print on documents, emails, calendars and memos that are neatly sorted on our computers for our use. However, most businesses still house paperwork with private data like HR files, employee agreements, customer contracts, tax filings, legal documents, and other documents. These are the documents with sensitive, private data that must be protected. Recycling paper documents is preferred over creating waste that will be landfilled, however there is no data destruction promise made during the process. Paper is collected in collection containers, transferred to trucks and delivered to processing facilities and eventually paper recycling facilities for the process of pulping which creates new, recycled-content paper. This process leaves opportunities for breaches and is not a reliable chain of custody for a business to use. Placing paper in waste containers assumes risk as dumpsters allow access to anyone savvy enough to dumpster dive into documents containing social security numbers, addresses and other critical private information. Trash dumpsters on public property have no laws against removing contents. Shredding all paper documents, before recycling, is the best way to protect data and prevent breaches.</p>
<p>NAID AAA Certified businesses operate to standards that ensure security- all paper shredding services must be done in such a manner that paper cannot be reconstructed. Material must be cross-cut shredded and essentially reduced to paper fragments. These paper fragments are just as recyclable as complete documents, making NAID AAA Certified paper shredding the best choice for compliance and sustainability.</p>
<p>Paper shredding companies must comply with state and federal destruction compliance laws; these regulations are ever evolving and vary from state to state.  Document destruction service providers assume a high amount of risk in receiving sensitive data from their clients and in an effort to offer the most secure services possible, many top providers will take the voluntary step of becoming NAID AAA Certified. NAID stands for the National Association of Information Destruction, a non-profit organization that sets standards for the information destruction industry. NAID AAA Certification is the most widely accepted certification for data destruction companies globally. By adhering to NAID-certified procedures, businesses can protect themselves from legal liabilities associated with improper data handling and disposal. If a breach occurs, being NAID AAA certified can show due diligence in following best practices, potentially mitigating legal consequences. Choosing a paper shredding service provider that offers federal and state compliance as well as industry-leading certifications is the best plan towards preventing data breaches.</p>
<p><strong><a href="https://members.isigmaonline.org/certifications/directorynaidaaa" target="_blank" rel="noopener">Find a NAID AAA Certified Company Today &gt;&gt;</a></strong></p>
<p>The post <a href="https://isigmaonline.org/shred-day-is-every-day/">Shred Day is Every Day</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Choosing NAID AAA Certified Paper Shredding Services</title>
		<link>https://isigmaonline.org/choosing-naid-aaa-certified-paper-shredding-services/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Fri, 24 May 2024 16:04:13 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6363</guid>

					<description><![CDATA[<p>Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA) Every business assumes risk, and a good amount of these risks are foreseeable and therefore relatively preventable.  Other risks are more formidable. When news outlets are reporting data breaches from top global brands regularly; it poses the question: can any business manage the [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/choosing-naid-aaa-certified-paper-shredding-services/">Choosing NAID AAA Certified Paper Shredding Services</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA)</em></strong></p>
<p><img decoding="async" class=" wp-image-6365 alignright" src="https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10-300x300.png" alt="" width="253" height="253" srcset="https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10-300x300.png 300w, https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10-150x150.png 150w, https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10-99x99.png 99w, https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10-425x425.png 425w, https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10-465x465.png 465w, https://isigmaonline.org/wp-content/uploads/2024/05/Member-Portal-10.png 512w" sizes="(max-width: 253px) 100vw, 253px" />Every business assumes risk, and a good amount of these risks are foreseeable and therefore relatively preventable.  Other risks are more formidable. When news outlets are reporting data breaches from top global brands regularly; it poses the question: can any business manage the risk of data security?</p>
<p>The best practice for minimizing data security risks is to choose a NAID AAA Certified service provider who can provide guidance to protecting private data that businesses are obligated to safeguard.</p>
<p>NAID AAA Certification is important for businesses that handle paper documents due to several key reasons:</p>
<ol>
<li><strong>Data Security and Compliance</strong>: NAID AAA certification ensures that businesses follow strict protocols for the secure destruction of sensitive information. This is crucial for compliance with various data protection laws and regulations, such as HIPAA in the US for healthcare, and other industry-specific guidelines. Proper document destruction helps protect against data breaches and identity theft.</li>
<li><strong>Reputation and Trust</strong>: Holding NAID AAA certification signals to clients, partners, and stakeholders that a business takes data security seriously. It builds trust and credibility, demonstrating that the company is committed to protecting sensitive information throughout its lifecycle, including during disposal.</li>
<li><strong>Legal Protection</strong>: By adhering to NAID AAA-certified procedures, businesses can protect themselves from legal liabilities associated with improper data handling and disposal. If a breach occurs, being NAID AAA certified can show due diligence in following best practices, potentially mitigating legal consequences.</li>
<li><strong>Operational Efficiency</strong>: NAID AAA certification often involves the implementation of standardized processes for information destruction. This can lead to more efficient and consistent practices within a business, reducing the risk of human error and ensuring that all sensitive information is destroyed in a secure and timely manner.</li>
<li><strong>Customer Assurance</strong>: For businesses that manage client information, having NAID AAA certification provides an additional layer of assurance to customers that their data will be handled responsibly and destroyed securely. This can be a competitive advantage in industries where data security is a significant concern.</li>
<li><strong>Audit and Verification</strong>: NAID AAA certification involves regular audits and inspections by independent third parties. This ongoing oversight ensures that businesses continuously adhere to high standards of data destruction, providing an objective measure of their security practices.</li>
</ol>
<p>In summary, NAID AAA certification is crucial for businesses dealing with paper documents as it ensures compliance with legal standards, enhances security, builds trust, reduces legal risks, improves operational efficiency, and provides assurance to customers about the secure handling of their information.</p>
<p><strong><a href="https://members.isigmaonline.org/certifications/directorynaidaaa" target="_blank" rel="noopener">Find a NAID AAA Certified Company Today &gt;&gt;</a></strong></p>
<p>The post <a href="https://isigmaonline.org/choosing-naid-aaa-certified-paper-shredding-services/">Choosing NAID AAA Certified Paper Shredding Services</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What to Consider Before Scheduling Shredding Services</title>
		<link>https://isigmaonline.org/what-to-consider-before-scheduling-shredding-services/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 30 Aug 2023 17:50:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6077</guid>

					<description><![CDATA[<p>Shredding services are an essential aspect of information security, as they ensure that confidential information is not compromised. According to our recent poll of almost 200 secure information professionals within our iG Direct E-Newsletter, we asked our members and subscribers, “which is the most important thing for clients to consider before scheduling a shredding service?”. [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/what-to-consider-before-scheduling-shredding-services/">What to Consider Before Scheduling Shredding Services</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-medium wp-image-6078 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/08/Untitled-design-55.jpg 1200w" sizes="auto, (max-width: 300px) 100vw, 300px" />Shredding services are an essential aspect of information security, as they ensure that confidential information is not compromised.</p>
<p>According to our recent poll of almost 200 secure information professionals within our iG Direct E-Newsletter, we asked our members and subscribers, “which is the most important thing for clients to consider before scheduling a shredding service?”. While the most highly ranked answer of things to consider was on-site vs off-site shredding by 22.2% of respondents, all considerations below were closely ranked. Here is a look at ALL things to consider before you schedule your shredding service:</p>
<ul>
<li><strong>Types of Materials</strong>: Clients should be aware of the types of materials that can be shredded. Not all service providers accept all materials (some may not accept CDs, DVDs, or hard drives), but many accept more than you’d think! Consider bundling your assets to create a package deal with your provider.
<ul>
<li><strong>Tip</strong>: Did you know that your fax machine and scanner have a hard drive? Look into your contract and talk with your vendor about your right to wipe <u>your</u> data before returning the machine at the end of your lease.</li>
</ul>
</li>
<li><strong>Confidentiality Agreements</strong>: Clients should consider the level of confidentiality offered by the shredding service, as well as whether or not the service requires clients to sign confidentiality agreements. This can help ensure that sensitive information is not compromised during the destruction process.</li>
<li><strong>Certification</strong>: Clients should look for shredding services that are certified by a third-party industry organization that conducts unannounced audits and ensures the company is adhering to all necessary regulations. For data destruction, you will want to hire an organization that is <strong><a href="https://members.isigmaonline.org/certifications/directorynaidaaa" target="_blank" rel="noopener">NAID AAA Certified by i-SIGMA.</a></strong></li>
<li><strong>On-site vs Off-site Shredding</strong>: Clients should consider whether they want the shredding service to take place on-site, at their own facility via a mobile truck, or off-site, back at the service provider’s facility. On-site shredding can provide added security, as clients can witness the destruction of their sensitive information. Off-site shredding can be more convenient, as the shredding service may provide pick-up and delivery services.</li>
<li><strong>Cost</strong>: While cost is always a consideration factor in the hiring of any business partner and clients should consider the cost of the shredding services being performed along with any storage needs, they should always weigh this against the liability of a data breach.</li>
</ul>
<p style="padding-left: 40px">“If you have a data breach and the issue happened because of the service provider you chose, you’re still responsible – it’s your data,” cautions Kelly Martínez, CSDS, Executive Vice President of Marketing &amp; Operations for i-SIGMA. “And when the investigation happens and you have to demonstrate why that vendor was chosen, there is no regulation in the world that will let you off the hook because you selected based on price over security.”</p>
<ul>
<li>Frequency/Recurrence: Purge vs. ongoing service – Deciding how much materials your company has to destroy is an important factor when choosing which partner you will use for your services. Most companies will offer recurring services if desired, or one-time services if there is a large amount of materials accumulated that need to be destroyed. By continuing to have recurring services, this will be the most helpful to your business long term, as sensitive information won’t be sitting around your company for long periods of time.</li>
</ul>
<p>Before scheduling a shredding service, clients should consider the types of materials that can be shredded, the level of confidentiality offered, the certification of the shredding service, the location of the shredding service, the cost, and the frequency/recurrence. By considering these factors, clients can make an informed decision and ensure that their sensitive information is securely destroyed.</p>
<h4>Find a company that is NAID AAA Certified Today: <a href="https://members.isigmaonline.org/certifications/directorynaidaaa/" target="_blank" rel="noopener">https://members.isigmaonline.org/certifications/directorynaidaaa</p>
<p>The post <a href="https://isigmaonline.org/what-to-consider-before-scheduling-shredding-services/">What to Consider Before Scheduling Shredding Services</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Done with Old Electronics? How to Properly Dispose of Them Without Security Risks.</title>
		<link>https://isigmaonline.org/done-with-old-electronics-how-to-properly-dispose-of-them-without-security-risks/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 09 Feb 2023 17:42:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5825</guid>

					<description><![CDATA[<p>As technology continues to advance, it is important for businesses and individuals to properly dispose of their electronic devices. While going to a computer recycling company or shredding business can seem like a great way to dispose of your old electronics, there are a few things you should keep in mind beforehand to ensure that [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/done-with-old-electronics-how-to-properly-dispose-of-them-without-security-risks/">Done with Old Electronics? How to Properly Dispose of Them Without Security Risks.</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As technology continues to advance, it is important for businesses and individuals to properly dispose of their electronic devices. While going to a computer recycling company or shredding business can seem like a great way to dispose of your old electronics, there are a few things you should keep in mind beforehand to ensure that you are doing so safely and securely.</p>
<ul>
<li><strong>Check Certifications</strong>: Before scheduling a job and giving away electronics that house confidential information (proprietary business data or personally identifiable information), ensure that the company is certified by recognized organizations such as <a href="https://isigmaonline.org/certifications/naid-aaa-certification/">NAID AAA Certified</a> by the International Secure Information Governance &amp; management Association (<a href="https://isigmaonline.org/">i-SIGMA</a>) or <a href="https://e-stewards.org/">e-Stewards Certified</a> by the Basel Action Network which includes NAID AAA Certification. These certifications ensure that the company follows industry standards for the safe and secure disposal of electronics and isn’t just re-selling them. Note, that i-SIGMA did a blind second hand device study and found that over 40% of used devices purchases online still had personal information accessible on them! You don’t want to be a victim.</li>
<li><strong>Confirm Confidentiality Agreement</strong>: If you need to dispose of confidential or sensitive information, make sure to confirm that the company you are hiring has a confidentiality agreement in place. A confidentiality agreement ensures that your data will not be accessed or shared during the recycling or shredding process.</li>
<li><strong>Confirm Types of Devices Accepted</strong>: Not all companies accept the same types of electronics. Before scheduling a job, make sure to confirm that the company can recycle or shred the specific types of devices you need to dispose of, such as computers vs. hard drives, phones vs. tablets, thumb drives, printers, etc.</li>
<li><strong>On-Site or Off-Site Services</strong>: Decide whether you want the shredding or computer recycling to occur on-site at your location or off-site at the company&#8217;s facility. On-site services may be more convenient but may come with additional fees. Off-site services may be less expensive but may require you to transport the devices to the company&#8217;s location.</li>
<li><strong>Research and Compare Companies</strong>: Do your research and compare multiple companies before making a decision. Look at their services, certifications, and customer reviews to determine the best option for you.</li>
</ul>
<p>By taking these steps, you can ensure that your shredding or computer recycling experience is safe, secure, and efficient. Remember to keep in mind the types of devices you need to dispose of, your preferred location for the service, and the importance of confidentiality when making your decision.</p>
<h4><a href="https://directory.isigmaonline.org/" target="_blank" rel="noopener">Find an E-Waste Disposal Firm Today&gt;&gt;</a></h4>
<p>The post <a href="https://isigmaonline.org/done-with-old-electronics-how-to-properly-dispose-of-them-without-security-risks/">Done with Old Electronics? How to Properly Dispose of Them Without Security Risks.</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>It&#8217;s Data Privacy Week, Are You Really Secure?</title>
		<link>https://isigmaonline.org/its-data-privacy-week-how-are-you-helping-your-clients-stay-secure/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Tue, 24 Jan 2023 22:26:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5797</guid>

					<description><![CDATA[<p>The business world may be shifting its focus to the digital realm, but vigilant cybersecurity is only one aspect of data protection. In fact, Varonis reports that while hacking and malware attacks account for many data breaches, other breaches include much simpler methods including loss or theft of physical hard drives or files, human error, [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/its-data-privacy-week-how-are-you-helping-your-clients-stay-secure/">It&#8217;s Data Privacy Week, Are You Really Secure?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The business world may be shifting its focus to the digital realm, but vigilant cybersecurity is only one aspect of data protection.</p>
<p>In fact, <a href="https://www.varonis.com/blog/data-breach-statistics#:~:text=While%20most%20data%20breaches%20are,of%20files%2C%20and%20human%20error.">Varonis</a> reports that while hacking and malware attacks account for many data breaches, other breaches include much simpler methods including loss or theft of physical hard drives or files, human error, insider leaks and payment card fraud.</p>
<h2>Three ways to protect your physical data</h2>
<p>Whether dealing with personal information or company data, there are steps you can take to properly handle, store, share and dispose of important documents and data.</p>
<h3>Shred important or sensitive documents</h3>
<p>Tossing paper in a recycling bin may help the environment, but it doesn&#8217;t protect you from data breaches. In addition to keeping trade and sensitive information private, there are also laws and regulations in most countries requiring business to protect certain information when it is discarded. Safeguards such as shredding help your business stay in compliance.</p>
<p>Sensitive information includes documents containing:</p>
<ul>
<li>Names</li>
<li>Addresses</li>
<li>Passwords</li>
<li>PINs</li>
<li>Health records</li>
<li>Banking or payroll</li>
<li>Travel</li>
<li>Anything with a signature</li>
</ul>
<p>Once information is shredded, there may be added steps required to comply with the necessary steps of information destruction. In these situations, using a NAID information destruction contractor can help by establishing:</p>
<ul>
<li>How it was destroyed</li>
<li>Where it was destroyed</li>
<li>Who destroyed it</li>
<li>When it was destroyed</li>
<li>Legal chain of custody</li>
<li>Fiduciary obligations</li>
</ul>
<p>As part of the only organization dedicated to increasing the security and ethics of the information destruction industry, NAID members are bound to a strict code of conduct and hold themselves to a higher standard.</p>
<h3>Off-site backups</h3>
<p>It is a good practice to keep backups of all data, both physical and digital, at a separate location.</p>
<p>Secure servers and locked storage facilities can store data and other files, which can be retrieved if necessary. In the event of fire or flood, theft, accidental breach or systems crash, having backups will be a crucial part of any disaster recovery plan.</p>
<h3>Secure workstations</h3>
<p>No matter if your company operates in an office or remotely, employees should be equipped with basic data privacy education, including a general understanding of how to handle the data they interact with and why it matters.</p>
<p>Keeping company workstations secure through firewall security, updated antivirus software and setting screens to lock after a set period of inactivity.</p>
<p>Physical workstation setup should also be considered for security. Desks, monitors and whiteboards should be positioned so only the people who need to access the information can easily see it to reduce &#8220;shoulder surfing&#8221; incidents and prevent unauthorized personnel from inadvertently causing a data breach.</p>
<p>Using a privacy filter on screens and monitors can also reduce the risk of a data breach. These easy-to-install filters go over the monitor and block the display from any viewpoint except straight on.</p>
<h2>Weighing privacy versus convenience</h2>
<p>Properly practicing and maintaining good privacy habits takes  effort, but properly handling data privacy will save you time, money and stress in the long run.</p>
<p>While it may seem more convenient to circumvent the destruction process and toss a document into the nearest bin, it is not the safest option for protecting information.</p>
<p>This digital privacy week, consider areas where data privacy could be improved and commit to protecting your confidential company and customer data.</p>
<h4><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener">Connect with a NAID AAA Service Provider Today &gt;&gt;</a></h4>
<h5 style="text-align: right;"><em>This Article Was Written by <a href="http://robynroste.com/" target="_blank" rel="noopener">Robyn Roste, </a>a professional writer living in Canada</em></h5>
<p>The post <a href="https://isigmaonline.org/its-data-privacy-week-how-are-you-helping-your-clients-stay-secure/">It&#8217;s Data Privacy Week, Are You Really Secure?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>I Know You’re in a Hurry but Before You Decide…</title>
		<link>https://isigmaonline.org/i-know-youre-in-a-hurry-but-before-you-decide/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 09 Jun 2022 14:33:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5489</guid>

					<description><![CDATA[<p>When hiring a typical service provider &#8211; a painter or carpet cleaner, for instance &#8211; it’s expected that you’ll have questions. How much will it cost? When can you be here? How long will it take? There are some services, however – like those where you entrust the vendor with regulated, personal information – where [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/i-know-youre-in-a-hurry-but-before-you-decide/">I Know You’re in a Hurry but Before You Decide…</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When hiring a typical service provider &#8211; a painter or carpet cleaner, for instance &#8211; it’s expected that you’ll have questions. How much will it cost? When can you be here? How long will it take?</p>
<p>There are some services, however – like those where you entrust the vendor with regulated, personal information – where regulations require you to investigate more thoroughly before making a decision.</p>
<p>Every organization is legally responsible to protect the personal information of their clients and employees. And, it just so happens, the laws requiring this, also require that the security and compliance of data-related service providers be evaluated before they are hired. As a result, those typical question, such as how much it costs or when they can get there are secondary. In fact, to give a service provider access to other people’s personal information based solely on price or availability is risky and negligent at best… and illegal at worst.</p>
<p>So, while price and availability can certainly be considered when hiring a data-related service provider, it is more important to verify they are certified by a reputable third-party organization and that you obtain their written policies and procedures, and that you review their terms and conditions, and to retain evidence that these items were verified.</p>
<p>(<a href="https://isigmaonline.app.box.com/s/xv82llmhun8ad1hjkcc17p0iemohe0ia">Here</a> are the types of questions NAID AAA Certification or PRISM Privacy+ Certification ask.)</p>
<p>________</p>
<p>Robert Johnson, CSDS, is the CEO of i-SIGMA, and is widely considered one of the leading authorities on information disposition and regulatory compliance.</p>
<p>The post <a href="https://isigmaonline.org/i-know-youre-in-a-hurry-but-before-you-decide/">I Know You’re in a Hurry but Before You Decide…</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If Certification is in Your Plans, Now is the Time!</title>
		<link>https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 23:57:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4363</guid>

					<description><![CDATA[<p>First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger. In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4364" src="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg" alt="" width="199" height="199" srcset="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg 1080w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-99x99.jpg 99w" sizes="auto, (max-width: 199px) 100vw, 199px" />First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger.</p>
<p>In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including state-of-the-art contracts and agreements, marketing materials, regulatory intervention, and educational events. Find the full list and details of <a href="https://isigmaonline.org/membership/membership-join/" target="_blank" rel="noopener noreferrer">all i-SIGMA benefits</a> on <a href="https://isigmaonline.org/">the association website</a>, and all members are encouraged to review and make use of them.</p>
<p><strong>Certifications</strong><em>:</em> Included among the benefits of i-SIGMA membership benefits is access to information protection’s two leading service provider certifications, NAID AAA and PRISM Privacy+. With the overwhelming majority of its more than 1,200 member-locations holding one or both of those certifications, they are the most success programs i-SIGMA has offered to date.</p>
<p>By now, it is well known that i-SIGMA membership replaces NAID and PRISM International membership at the end of this month, and that going forward the use of NAID and PRISM will be limited to their respective certifications.</p>
<p><strong>A Personal/Business Decision</strong><em>:</em> Over the years, our surveys have consistently shown that the vast majority of non-certified members fully intend to become certified as soon as they can find the time. And whether now is the right time or not, it is critical for those members to know they are still benefiting from the association’s efforts and their contribution to the association continues to promote client education and adoption of their services.</p>
<p>It is also important, however, for non-certified members to take stock. In a matter of weeks, NAID and PRISM will only be associated with each respective certification program. If past surveys are correct, and certification is a future goal, there is no better time to do it than now; thereby maintaining your link to the two most recognized information protection brands in the world.</p>
<p><strong>How to Become Certified</strong>: Becoming Certified is not as complicated as some may think.</p>
<ol>
<li>Meet all required specifications as outlined in the <a href="https://isigmaonline.box.com/s/xv82llmhun8ad1hjkcc17p0iemohe0ia" target="_blank" rel="noopener noreferrer">i-SIGMA Certification Specifications Reference Manual</a></li>
<li>Submit a completed certification application</li>
<li>Successfully complete an initial scheduled audit verifying all aspects of compliance</li>
</ol>
<p><a href="mailto:certification@isigmaonline.org">Contact the i-SIGMA Certification Department</a> for more information.</p>
<h6 style="text-align: right;">Written by Bob Johnson | 30 November 2021</h6>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The i-SIGMA Compliance Monitoring Service Has Arrived</title>
		<link>https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 20:00:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Press Room]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4256</guid>

					<description><![CDATA[<p>The eagerly awaited i-SIGMA Compliance Monitoring Service has arrived. Starting immediately, many service providers will use it, and soon clients around the world will begin seeing promotions encouraging them to use it too. And, if the underlying assumptions behind its creation are correct, they will eventually come to rely on it as a vital demonstration [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/">The i-SIGMA Compliance Monitoring Service Has Arrived</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="none">The eagerly awaited </span><strong><a href="https://directory.isigmaonline.org/compliance/">i-SIGMA Compliance Monitoring Service</a></strong><span data-contrast="none"> has arrived. Starting immediately, many service providers will use it, and soon clients around the world will begin seeing promotions encouraging them to use it too. And, if the underlying assumptions behind its creation are correct, they will eventually come to rely on it as a vital demonstration of their own regulatory compliance.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<h2>Why Did i-SIGMA Create This Service?</h2>
<p><span data-contrast="none">All data protection regulations require clients to demonstrate initial and ongoing due diligence when selecting third-party service providers to process personal information. The key word there is “demonstrate.” In fact, when a large investment firm was recently fined after its discarded electronics exposed personal information about its clients, the judgment was based on the fact that </span><span data-contrast="none">they failed to employ “adequate due diligence in selecting a vendor and monitoring its performance.” </span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276}"> This new, free service from i-SIGMA helps organizations fulfill that regulatory obligation by sending out comprehensive compliance reports detailing the qualifications of vendors offering records storage, imaging, scanning, secure shredding, and electronic media recycling.</span></p>
<p><span data-contrast="none">Of course, the challenge to clients (such as the investment firm) of complying with such regulations is that, 1) they rarely have the bandwidth to perform such due diligence and, 2) even if they did have the bandwidth, they can hardly be expected to know what to look at. Enter i-SIGMA certification programs, which are not only designed to review the relevant regulatory and security overlap, but to do so on an ongoing basis.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p><span data-contrast="none">By obtaining the automatic reports issued by the <strong><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener noreferrer">i-SIGMA Compliance Monitoring Service</a></strong>, the client has evidence by which <strong>they can demonstrate both initial and ongoing compliance</strong> of their service provider. In short, the client themselves gets the tangible benefit of being able to demonstrate their own vendor-selection compliance requirements.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p><span data-contrast="auto">“We began the service when customers requested that we email them alerts when their service provider renewed or lapsed,” says i-SIGMA CEO Bob Johnson. </span></p>
<p><span data-contrast="auto">“Now, we&#8217;ve taken that concept a step further. The service is based on the fact that many data controllers are required to demonstrate initial and ongoing due diligence when they use data-related service providers,” Johnson continues. “And, because NAID AAA and PRISM Privacy+ Certifications address the relevant security vulnerabilities and regulatory overlap, the information verified during audits mirrors what that due diligence should look like.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">“Essentially,” Johnson added, “they’re supposed to do it, but often don’t what to look at or don’t take the time, so we can do it for them even better than they can.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Clearly, any client will see the value of obtaining this free report, and once they are aware it is available will come to insist on it.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p>Users of the service will first be brought to a welcome screen, and next will be able to choose their provider that they wish to monitor (as shown below). If the user does not have a provider in mind, they can also find a local service provider.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-4257 alignleft" src="https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A.png" alt="" width="751" height="504" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A.png 1151w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-300x201.png 300w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-768x515.png 768w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-1024x687.png 1024w" sizes="auto, (max-width: 751px) 100vw, 751px" /></p>
<p>Once the user has selected their service provider, all they have to do is enter their email address (stored anonymously). The report will show up in the user&#8217;s inbox within minutes. Future reports will be sent annually as each company renews its certification and whenever they make changes in their serviceswhich may impact the details of their certification on file.</p>
<p><img loading="lazy" decoding="async" class="wp-image-4258 alignleft" src="https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup.png" alt="" width="703" height="668" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup.png 896w, https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup-300x285.png 300w, https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup-768x730.png 768w" sizes="auto, (max-width: 703px) 100vw, 703px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>i-SIGMA is very excited to announce and roll out this eagerly awaited program. For information on certification programs, contact: <strong><a href="mailto:certification@isigmaonline.org">certification@isigmaonline.org</a>.</strong> For technical assistance regarding this tool, please contact: <strong><a href="mailto:webhelp@isigmaonline.org">webhelp@isigmaonline.org</a>.</strong></p>
<h4><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener noreferrer">Use the Compliance Monitoring Service Now &gt;&gt;</a></h4>
<p>The post <a href="https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/">The i-SIGMA Compliance Monitoring Service Has Arrived</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is the Correct Particle Size for Your Destroyed Media?</title>
		<link>https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/</link>
		
		<dc:creator><![CDATA[kelly]]></dc:creator>
		<pubDate>Thu, 29 Jul 2021 00:04:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4118</guid>

					<description><![CDATA[<p>It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information. And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy. Unfortunately, when searching for such [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/">What is the Correct Particle Size for Your Destroyed Media?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-4120 alignright" src="https://isigmaonline.org/wp-content/uploads/2021/07/particle-size.png" alt="" width="232" height="153" />It is understandable that most organizations today want to do the right thing when destroying discarded media on which is recorded personal and competitive information.</p>
<p>And, in this regard, it is also understandable that their initial focus is determining the appropriate particle size for the media they wish to destroy.</p>
<p>Unfortunately, when searching for such guidance online, the only information available often pertains to government classified information, resulting in unnecessary expense and often a high degree of unnecessary inconvenience.</p>
<h4>Here are a few things to consider:</h4>
<ul>
<li>No data protection regulation in the world specifies a particle size for destroyed paper or electronic equipment. They simply mandate the information be reasonably inaccessible and not reconstructible.</li>
<li>Most particle size specifications issued by and for government agencies must anticipate that the materials are not controlled after the destruction process.</li>
<li>Unnecessarily meeting a very small (and irrelevant) particle size can cost 5 to 10 times what would be reasonable by regulators.</li>
<li>Because of the factors above, requiring an unnecessarily small particle size may discourage compliance by front line employees, which, ironically, ends up putting the organization at greater risk.</li>
</ul>
<h4>Also consider:</h4>
<ul>
<li>NAID AAA Certified media destruction services are required to demonstrate they prevent access to destroyed particles after the destruction process.</li>
<li>Commercial media destruction firms destroy large amounts of material from multiple sources, all of which is co-mingled prior to being baled and securely recycled or responsibly discarded.</li>
<li>Hundreds of thousands of organizations around the world rely on NAID AAA Certified service providers to meet the security and regulatory media destruction requirements.</li>
</ul>
<p>i-SIGMA is a global, non-profit association dedicated to the proper destruction of discard information for more than 27 years and believes that organization is ultimately responsible for the protection of personal and competitive information in its possession.</p>
<p>The advice above is simply provided to help organizations decide what particle size best meets their needs, while avoiding the expense and risks of acting without a complete perspective.</p>
<h3>NAID AAA Certified Company Marketing Resources</h3>
<p>Companies who are NAID AAA Certified should use the following resources to use as marketing material for clients asking questions pertaining to particle size:</p>
<p><a href="https://nationalassociationforinfor.box.com/s/8ol3oycq8pbqo57bymq866zi1hqocxld" target="_blank" rel="noopener noreferrer"><strong>&#8220;What is the Correct Particle Size for Your Destroyed Media?&#8221;</strong></a></p>
<p><strong><a href="https://nationalassociationforinfor.box.com/s/4gih3ki5a2gxvve0oycsoxkpf4fmlxzj" target="_blank" rel="noopener noreferrer">&#8220;What is the Correct Particle Size for Your Destroyed Media?&#8221; &#8211; ANZ &amp; UK</a></strong></p>
<p><em>Please Note: It is acceptable for Certified members in good standing to also translate this file into other languages </em></p>
<h6 style="text-align: right;">Written by Bob Johnson | 29 July 2021</h6>
<p>The post <a href="https://isigmaonline.org/what-is-the-correct-particle-size-for-your-destroyed-media-2/">What is the Correct Particle Size for Your Destroyed Media?</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
