WHAT HAPPENS TO YOUR DOCUMENTS WHEN YOU USE A SHREDDING SERVICE?

Securely destroying confidential data is an important activity that many businesses fail to do correctly. When you use a document destruction service, you can be rest assured that you are taking the right steps to protect your business and your clients, with no chance of sensitive data exposed.

Here’s how our document destruction services works.

First of all, we will provide you with a secure location to store sensitive documents that need to be destroyed. For most businesses, this will be a 240 litre securely locked bin, with each bin holding up to 100 kilograms of documentation. We can also provide pre-paid secura bags, which hold up to 40 kilograms each – ideal for small offices or the home.

Once your bin is full – or on a regular schedule for repeat clients – your bin will be collected and securely transported to our destruction facility. All of our destruction facilities are “approved sites” – this means they have strict guidelines on product handing and how document disposal is done. We have comprehensive policies and procedures for the storage, transportation and destruction of all documents. All of our staff handling document destruction have been cleared to a minimum of a National Police Records Check.

We then completely destroy the data through comprehensive cross-cut shredding. Document fragments are reduced to tiny fragments, and we provide a security guarantee along with a certificate of destruction. Clients are also able to witness document destruction (but conditions do apply, please contact us to discuss this option).

Finally, the destroyed documents are transferred to a paper recycling facility, where they will be recycled into new paper products.

We take document destruction and security very seriously. If you have any concerns or questions about our service, we’d love to hear from you. Contact us today to find out how we can help you to safely and securely destroy your business’s confidential data and protect you from problems like corporate fraud, identity theft and industrial espionage.