• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • File a Report
  • Check Report
  • Client Login

Red Flag Reporting

Protecting Organizations & Their People

  • Home
  • About RFR
    • Our Team and Expertise
    • Who Do We Help?
    • Published Articles
  • Services
    • Hotline Service
    • Compliance Services
  • Benefits
    • Protect Employees
    • Protect Your Reputation
    • Protect Your Bottom Line
    • Manage Cases with Ease
  • Blog
  • Get Started
    • FAQ
    • Request a Demo or Quote
  • Contact Us

October 1, 2021

Protect Your Business and Customers with an Effective Data Destruction Policy

Share on LinkedIn Share
Share on Facebook Share
Share on TwitterTweet

The Association of Certified Fraud Examiners (ACFE) recently posted an article titled, “The Importance of Having an Effective Data Destruction Policy,” written by Milica Vojnic. Businesses collect an abundance of customer information, some of which is sensitive and personally identifiable. Vojnic reminds us that while collecting customer data allows businesses to operate more efficiently, doing so comes with the risk of leaking personal information to malicious third parties. Because of this risk, businesses are responsible for handling and destroying customer data in a safe and secure manner.

The article notes that governments worldwide are creating tighter rules and regulations in response to the threat of data leaks. For example, the General Data Protection Regulation (GDPR) was adopted by the European Union to protect the data of all citizens. Many data protection laws, including the GDPR, indicate that businesses are responsible for protecting customer data both during and after its use. Failure to properly handle customer data, including the destruction of data that is no longer in use, can provide fraudsters with an opportunity to steal personal information. This, of course, is detrimental to both customers and businesses.

With this said, how should businesses destroy customer data? Choosing the right destruction method depends on the sensitivity and confidentiality of the data in question. The article lays out a variety of destruction methods and security considerations.

Physical data destruction involves destroying the physical medium used for data storage. Once the storage medium is destroyed, there is no way to recover the data. While this is the most secure form of data destruction, it is also very expensive since the storage medium is rendered useless. Given the benefits and drawbacks of physical data destruction, this method is recommended for highly sensitive and confidential data.

A second method, secure data deletion, is considered suitable for the destruction of most types of data. Instead of destroying the physical storage medium, data destruction experts overwrite existing data with binary code. One benefit of secure data deletion is that the storage medium can be reused. While this method is not as secure as physical data destruction, it is still considered effective in most cases.

In addition to choosing the proper destruction method for specific types of customer data, business must also be aware of additional security considerations. For example, businesses must ensure that all backup copies are destroyed alongside the original. All data should be traceable throughout its lifecycle. To ensure that all data is accounted for, businesses should be aware of the location of all storage media. Finally, businesses must select reputable data destruction specialists. Choose specialists who can provide post-destruction certificates indicating that data was destroyed using international best practices. To conclude, implementing a sound data destruction policy will protect your customer’s rights while also ensuring compliance with data protection laws.

Want to learn other ways to prevent fraud?  See our article here.

Share on LinkedIn Share
Share on Facebook Share
Share on TwitterTweet

Filed Under: Uncategorized

We are Red Flag Reporting

We offer ethics, safety and fraud hotline / case management solutions to our clients via the web, over the phone and through other methods. Trusted by organizations large and small in 50 countries, we can help you!

We are an Ethics Hotline Service Provider
Find Out More  Get a Quote

Primary Sidebar

Hotline and Web Portal

We are an Ethics Hotline Service Provider

Get a Quote

We offer ethics, safety and fraud hotline / case management solutions to our clients via the web, over the phone and through other methods. Trusted by organizations large and small in 50 countries, we can help you!

Red Flag Reporting is Hiring!

About Red Flag Reporting Founded in 2010, …

[Read Article...] about Red Flag Reporting is Hiring!

Best Practices for Preventing a Workplace Retaliation Claim

Retaliation is the most frequent type of claim …

[Read Article...] about Best Practices for Preventing a Workplace Retaliation Claim

Internal Whistleblowers Face Few Protections: Why This Matters

The decision to become a whistleblower is never …

[Read Article...] about Internal Whistleblowers Face Few Protections: Why This Matters

Footer

Follow Along

  • Facebook
  • LinkedIn
  • Twitter

Red Flag Reporting

Red Flag Reporting provides compliance and ethics hotline services and case management software solutions to organizations seeking to promote safe and ethical behavior.

Reach Us

Red Flag Reporting
P.O. Box 4230, Akron, Ohio 44321
Contact Us

(Sales Office only – not a reporting line)
Tel: 877-676-6551
Fax: 330-572-8146

NOTE: Red Flag Reporting services are available for purchase by organizations only. We do not sell or provide our services to individual people.

  

 

Copyright © 2023 Red Flag Reporting all rights reserved. All other trademarks and copyrights are the property of their respective holders.

  • Red Flag Reporting – Ethics, Fraud and Whistleblower Hotline Service
  • Contact Us
  • Privacy Policy