The Importance of Managing Your Business E-Waste

In today’s high-tech business environment it is not uncommon for employers to provide their employees smart phones, tablets, laptops and other devices to help them stay connected in and out of the office.   Many companies have processes and requirements in place to ensure these devices are secure as employees are using them to send,. . . [Full Article]

5 Ways to Minimize Information Disposal Mistakes

As a business manager or owner, it is your responsibility to properly store and safely dispose of any records containing personally identifiable information. Personally identifiable information is a specific category of information that is associated with an individual person (employee, donor, patient, customer, student, etc) and can include items like:   Social Security Number Passport. . . [Full Article]

REMINDER: It’s Time to Review Your Retention Policy!

It’s the start of a new year, and for many businesses that includes a lot of house-keeping and planning. As a part of that process, be sure to review and update your records retention policy. If you’re starting from scratch with a new plan, we have some great resources on  Information Management Basics, Developing a Records Management. . . [Full Article]

Information Security Threats Likely Happening in Your Office

Managing information security is an on-going process that requires education and understanding from each member of your organization, from upper management all the way down to your part-time employees, and even interns.   From managing personal records via the computer to maintaining paper files, understanding the risks and working every day to prevent accidental breaches. . . [Full Article]

Don’t Be Haunted by a Lack of Information Security

In today’s business environment it’s easy to forget the importance of information security for your hard-copy records. There are many systems and processes you can put into place to protect digital information; but loss, theft and misuse of paper records still remains one of the top causes of information security breaches. So, in the spirit. . . [Full Article]