![]() ![]() Check ashes for any larger pieces that did not burn.Let papers burn until they are reduced ashes.Place the paper in the pit and set on fire.This can be a metal trash can or a barbecue grill. If you choose to use this method, have all safety equipment and follow these steps: Always wear proper safety equipment when handling fire and combustible materials. Always follow state and city rules as it pertains to burn permits and times of year you can and cannot burn items. Therefore when burning documents remember safety first! Always have a fire extinguisher nearby in case the fire gets out of control. When using fire to destroy items you are always at risk of being burned, the fire spreading beyond your control, and other health related issues such as smoke inhalation. Micro-cut shredders are the most secure of the three types because they turn documents into confetti, and there is no chance of putting these documents back together.īurning your sensitive documents is an effective way of destroying them but it does not come without risk. If you use a strip-cut or cross-cut shredders you should consider burning or pulping the shredding to ensure they cannot be pieced back together. While unlikely the document could be pieced back together. Cross-cut shredders cut the document into smaller pieces than strip-cut shredders. Strip-cut shredders are the least secure of the three types and document can be pieced back together. There are three types of shredders: strip-cut shredder, cross-cut shredders, and micro-cut shredders. However, not all shredders are created equal, and some do a better job at destroying your documents than others. ![]() Shredding is the most common method of destroying documents. Well, you are in luck!! Here are 5 ways you can destroy documents containing your sensitive information. This means we have to decide to either let our house look like it belongs on an episode of Hoarders, or get rid of these documents without compromising our sensitive information. While we cannot control how organizations secure and destroy our information, we can control what happens to the information in our possession. Out of fear of identity theft I tend to hold on to these drives because I do not want someone getting my personal information off these items. This leads to boxes full of old electronics and hard drives. If you are like me then you might have boxes full of old mail you refuse to throw away because it contains sensitive personal information.Īlso many of us buy some type of new technology every few years whether that is a computer, smartphone, scanner or some other device that contains a hard drive. Much of it containing sensitive information such as banking statements, credit card information, receipts, invoices, medical billing information and much more. Postal Service processes and delivers 493.4 million mail pieces each day. Many of us leave them lying on our kitchen counters or stored on old electronic devices.įor example, the U.S. I am sure if you look around your home right now you will find documents containing your personal information. Many businesses have measures in place to handle the securing and disposal of physical and digital documents but chances are you do not even think about the sensitive documents you might have lying around your house. Identity theft is the most common reason for the theft of personal information, and according to in 2017 there were 1,579 data breaches and 69% of those resulted in some type of identity theft. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |