Document Security through High Tech Chain of Custody

//Document Security through High Tech Chain of Custody

Document Security through High Tech Chain of Custody

Data breaches are real incidents and in America they happen every single day. As a business owner, it is tempting to maintain a mindset of  “data breaches wouldn’t happen to MY business, that only happens to large corporations with billions of dollars,” or “well, those hackers only target hospitals and law offices so they can steal identities.” Those viewpoints are far from true. In fact, data breaches occur across ALL industry types, which include Education, Insurance and Financial, Healthcare, Information, Manufacturing, Public Administration, Government, and Retail. Also, data breaches aren’t solely confined to large companies. In fact, 61% of data breaches in 2017 were businesses with under 1,000 employees.

In order to maintain security, it is important to secure any sensitive and confidential documents. Any business which produces documents with their clients private personal information can attest to this fact. While the documents are in the business’ possession many security precautions are utilized. These include the containment of those documents to specific storage spaces, obviously having an ‘eyes only’ policy, and use of a locked bin or ‘shredbin’ to store documents which are headed to destruction.

However, what happens when those confidential documents leave your business’ possession to be destroyed? Maintaining a relationship with a secure second party business who then destroys those documents correctly is the best choice, but it is also at that point which a secure chain of custody must be established to monitor and account for those documents.

Protecting your business until the moment of document destruction is an effective method to minimize these types of risks. By definition, chain of custody is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. To provide their customers this peace of mind, Shredbin™ has engineered a high tech solution for their chain of custody process: Each bag of confidential material which is collected by Shredbin ™ is affixed with a barcode. Each one of those barcodes is then scanned at specific checkpoints throughout transit to destruction.

Shredbin’s™ patented Alice™ AI software system is able to provide documentation numbers, timestamps, and use real time location information to identify the confidential material’s exact location. Documents marked as shredded are issued an electronic Certificate of Destruction, upholding all HIPAA best practices, regulations, and compliance standards.

This technological fortification of their client’s documentation defenses was developed solely with their customers in mind. Joshua Repensek, CEO of Shredbin™ states, “When developing our chain of custody, our foremost concern was providing accountability for our client’s document security.”  This accountability is one key factor in ensuring your business security from potential data breaches.

Beyond this benefit to your business, Shredbin’s courteous and professional Information Protection Officers are also prepared to help organize and secure your business through multiple avenues. To learn more about how Shredbin can help YOUR BUSINESS, please call 1-800-633–3650 or visit  www.shredbin.com for more information!

By | 2018-01-17T14:12:11+00:00 January 17th, 2018|Security|0 Comments

About the Author:

mm
David Radke graduated from Florida State University in 2008 with a B.S. in English and a minor in Digital Design. He is Media Director for Shredbin and also the owner/operator of Skewer Media, LLC. He currently lives in Tallahassee, FL with his wife and twin sons.

Leave A Comment