1 st Choice Document Destruction 7227 125 th Avenue, Milaca, Minnesota 56353 Office: 763.389.9955 Cell: 763.238.3085

Slides:



Advertisements
Similar presentations
Why AAA Digital Document Solutions? Are you still storing documents in file cabinets? Do you have a plan in case of fire or natural disaster? Is your company.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Privacy and Information Security Training ( ) VUMC Privacy Website
Review Questions Business 205
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Privacy Rule Training
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Securing NPI Mary Schuster Mike Murphy.  Gramm-Leach-Bliley Act Enacted to control the ways that financial institutions deal with the private information.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Critical Data Management Indiana University HR Summit April 24, 2014.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Financial Literacy Skills
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Red Flags Compliance How It Has Changed Customer Policies & Procedures Teresa Corlew, Vice President Customer Care Nashville Electric Service September.
Data Classification & Privacy Inventory Workshop
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
NDSU RECORDS MANAGEMENT INITIATIVE December 2007 PowerPoint.
Created by the American Institute of Certified Public Accountants and the California Society of Certified Public Accountants CPA Mobilization Kit: Small.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
Practical Information Management
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Basic Records Management. What we’ll cover Virginia Public Records Act Definitions Understanding and using the LVA General Schedules The schedule cover.
Family Financial Management Annie’s Project January 23, 2007 Coweta Oklahoma.
Health & Social Care Apprenticeships & Diploma
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Privacy Issues in Healthcare Xintao Wu University of North Carolina at Charlotte Nov 1, 2012.
Destruction Standards & Compliance Presented by: Chris Parker, V.P. Operations Stevens & Stevens Business Records Management, Inc.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Florida Information Protection Act of 2014 (FIPA).
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Protecting Your Assets By Preventing Identity Theft 1.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
(A) LIFE INSURANCE : Term Life Insurance Permanent Life Insurance (B) GENERAL INSURANCE Fire Insurance Marine Insurance Accident Insurance (C) HEALTH.
 The laws vary from state to state. The California Medical Association website states:  There is no general law requiring a physician to maintain records.
Protection of CONSUMER information
Recordkeeping and Record Retention
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Financial Literacy Skills
Recordkeeping and Record Retention
Records Management Compliance Training
Protecting Your Identity:
Information management and communication
Financial Literacy Boot Camp
The Health Insurance Portability and Accountability Act
Protecting Your Credit Identity
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell: Website: COMMERCIAL/RESIDENTIAL MOBILE SHREDDING SERVICES 1st Choice Document Destruction, is a family owned business, located in Milaca, Minnesota and serves North and Central Minnesota. Our services include commercial/residential shredding and cardboard/phone book recycling. 1st Choice Document Destruction provides a secure removal and destruction of our customer's confidential records. We provide an onsite certified, confidential shredding service, so our customers can comply completely with all federal and local confidentiality laws. About Us Services We Provide Mobile Unit: 1 st Choice Document Destruction’s uniformed professional will arrive onsite and on time for a prearranged appointment. The documents will be shredded in a secure environment on board the truck. The customer is encouraged to observe the document destruction. A Certificate of Destruction will be issued and upon request, a CD video tape of the shredding process can be obtained. Secure Containers: 1 st Choice Document Destruction offers several different size security containers depending on the customer’s needs. Recycling: 1 st Choice Document Destruction recycles 100% of the paper waste produced. We also offer free phone book and cardboard retrieval. Hard Drive Destruction: COMING SOON! Whether your company is large or small, there will always be a need to destroy your company’s private information. Financial, payroll, tax returns, correspondence and lists containing your customers vital information, just to name a few, should all be destroyed through shredding. Everyone has the right to privacy and the legal right to have this information protected. If you do not protect this information, it is very possible that your company can be brought up on criminal charges. If your customers feel that you are not protecting their best interests, than you could very well lose them. There are laws requiring the retention of documents and how long they need to be kept in order to comply. Setting up a schedule and sticking to it is very important. Documentation of the destruction process is important if your company becomes involved in a legal situation. 1 st Choice Document Destruction can provide secure locked containers to hold your documents. We can set up a schedule that is perfect for your situation. Our mobile unit will make regular pickups, shred your documents in a secure environment and provide documentation that the process has been completed. If you choose to store your documents in a storage facility, make sure it is a very secure environment. If they offer a document destruction service, check into their process. Do not let them choose the contractor! You must stay vigilant. Your company will still be responsible if your company information ends up in the wrong hands. It is wise to have someone in upper management or security personnel witness the destruction of these important documents. Keep your confidential documents private. Follow the guidelines listed above and be assured that 1 st Choice Document Destruction will offer a secure and legal choice for your company to comply with the federal and local laws concerning the destruction of sensitive documents. Guidelines for Protecting Confidential Documents

Legal & Regulatory Laws HIPPA Gramm/Leach/Bliley Privacy Act Economic Espionage Act Trade Secret Protections FACTA Other ID Theft Laws Implied Contract Breach These laws are very strict and if the documents are not handled properly there are legal ramifications for your company. CALL TODAY FOR A FREE QUOTE st Choice Document Destruction, LLC Health Insurance Protability and Accountability ACT (HIPPA) The HIPPA law came into affect in Any organization that has medical information must comply. Doctors, hospitals, health insurance applications and claim records must all be destroyed in order to prevent unauthorized access. Fair Credit Reporting Act (FACTA) FACTA came into law in One of the provisions requires that any information taken from a credit report be destroyed. This law requires organizations and individuals to take reasonable steps to destroy information. Gramm/Leach/Bliley This law is the same as HIPPA only it is for financial institutions. They must have written policies in place to protect the personal financial information of their customers. Some companies that are covered under this law are check cashing businesses, payday lenders, mortgage brokers, professional tax preparers and courier services. Payroll/personnel records Credit Information Business Plans/financials Medical files and information Bank records/statements Legal Contracts Below you will find examples of some of the documents that should be destroyed. Liability Concerns