Blog

DataSafe News & Information

Hand using laptop computer with virtual screen and document for paperless online approval

Reducing Paper Dependence in the Year Ahead

A Brief History of Paper The story of paper begins about three thousand years ago in ancient Egypt, where early forms of paper were crafted using rushes that grew along the Nile River. By the 2nd century AD, the Chinese improved upon this method by grinding mulberry bark and cotton to create paper for the…

Read More
A hand reaches out of a computer monitor and grabs credit cards and social security card.

Stay Vigilant: It’s Identity Theft Awareness Month

Identity theft is one of the fastest-growing crimes in the world, and its impact can be devastating. L.A. Times editor Jessica Roy shared her harrowing experience of identity theft after her wallet was stolen. Despite using unique passwords and two-factor authentication, thieves exploited her driver’s license to hijack her identity. Unfortunately, cases like hers are…

Read More
Inquisitive woman looking through magnifying glass.

What to Look for in a Shredding Provider

Have you ever played the game Bigger and Better? In this game, each team starts with a paperclip and aims to trade it door-to-door with neighbors for something larger or more valuable. The excitement builds as you exchange items, hoping to end up with the biggest or best item compared to other teams. However, two…

Read More
Business professionals are seated around a board room table during a meeting.

Employee Training: Building a Fraud-Aware Workforce

Your employees can be your first line of defense against fraud. Organizations that implement anti-fraud training programs experience fewer and less-costly losses, quicker resolution of fraud cases, and a stronger reputation for customer protection, according to the Association of Certified Fraud Examiners (ACFE). Training employees to recognize and respond to fraud is an investment in…

Read More
A person sets a wood cube onto other stacked wood cubes, and together, they complete the image of a lock icon with the word "data."

Data Privacy Laws: How Does Oregon Protect Your Information?

In the Pacific Northwest lies the cozy beachside towns, stunning Cascade Mountains, and lush wine country of the beautiful state of Oregon. The Beaver State is also known for being proactive in protecting citizens’ private information. Federal Laws Though the US does not yet have a comprehensive federal consumer data protection law that covers all…

Read More
A person is holding a mobile phone while pressing a key on a keyboard. Virtual images of financial symbols float in the foreground.

Financial Awareness Day: Is Your Information Secure?

First celebrated in 2019, National Financial Awareness Day is observed every year on August 14. It’s a great reminder to count our pennies to make sure we are on track with our financial health, but also a cautionary to protect our pennies from financial thieves. Don’t think it’s important? Here are some staggering statistics to…

Read More
Patients are sitting in a doctor's waiting room.

Myths about HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, establishes crucial privacy rules that prohibit healthcare providers and businesses, known as covered entities, from disclosing protected information without the patient’s consent. This information can only be shared with the patient and their authorized representatives. However, misunderstandings and myths about HIPAA often arise, leading…

Read More
A green street sign with white letters points "Violation" in one direction and "Compliance" in the other.

Is Your Business Compliant with 2024 Data Privacy Laws?

Change can be daunting, especially when it comes to business operations. As a business owner, you’re probably familiar with the need to stay updated on changes that can help your company grow and stay stable. But when changes are mandated by law, it can be even more challenging to adapt. Data privacy laws might seem…

Read More
Woman is looking perplexed and shrugging her shoulders while holding her hands up.

What is a Certificate of Destruction and Why Do I Need One?

In today’s digital age, safeguarding sensitive information is paramount for any organization. From personally identifiable information (PII) to corporate trade secrets, maintaining the confidentiality of data is not just good practice; it’s often required by law. But what happens when it’s time to dispose of this information? Enter the Certificate of Destruction, a crucial document…

Read More
A red binder labelled "Confidential Data" is stacked with other binders and documents on a table surface.

Information Destruction Guidelines for Your Business

Remember when TV and radio were free, and the idea of paying for bottled water seemed absurd? Times have changed! Today, information is the gold of the digital age. Effectively using information can mean big profits for your business, but losing or having your information stolen is like handing over cash to data thieves. Whether…

Read More