Data Security Tips

At Restore Datashred, we're experts in data security and data protection, offering advice and guidance to all types and sizes of business and organisation, to help ensure their compliance with the The Data Protection Act.

Tips to keep your business or organisation protected


The data security tips below should provide you with some help on how best to protect your organisation's data and information. This in turn should help protect your business reputation, and prevent you from being susceptible to a fine from the Information Commissioner's Office.

Create a confidential data policy and process - If you don’t have one in place you are already in the high risk category for being a victim of data theft.

Store data securely - Use lockable containers and bins to store your confidential waste in when it's on your site. A large proportion of data theft is committed by employees and contractors.

Destroy data properly - Shred all confidential data. Arrange for a shredding services contractor to help store, collect and securely destroy information.

Check your provider - Ensure you know where your data is heading by using an accredited contractor, and check their credentials. Even better, have your data destroyed on site, using a Mobile Shredding vehicle and watch the destruction.

Make sure you have an audit trail - We provide a Certificate of Destruction for all work carried out,so that you, the customer, have a record of the destruction taking place.

Check Identities - Use credit reference agencies to verify the identity of your preferred suppliers and contractors.

Secure your accounts - Don’t allow bank details to escape into the public domain. Thieves are adept at falsifying signatures.

Inform Staff - Train staff, and contractors such as cleaners, on how to deal with confidential data properly and monitor their behaviour. Remember, most fraud is committed by people who work within the organisation.

Beware of carrying large amounts of confidential data - Data held on unencrypted laptops, data sticks or mobile devices such as Blackberrys and iPhones needs to be protected. These small portable gadgets are magnets for thieves who can exploit your confidential information.

Records Management Shred Scan Relocations