Best Practices in Data Destruction

Posted October 31, 2006 | Leadership |

More than ever, companies are responsible for ensuring the privacy of the personally identifiable information (PII) in their care. The fact that PII is often in the hands of personnel using powerful mobile computers and storage devices away from corporate facilities only complicates matters. Not surprisingly, information security and privacy incidents are on the rise, along with growing public awareness of them. What is a company to do?

About The Author
DJ Vogel
D.J. Vogel, CISSP, CISA, is a Principal at 403 Labs, LLC, an information security firm providing security, risk management, and compliance consulting. He works closely with regulatory agencies and payment card associations to help define and strengthen industry security standards, including the Payment Card Industry Data Security Standard (PCI DSS), Payment Application Best Practices (PABP), and forensic procedures. Mr. Vogel can be reached at E… Read More
Mark Fischer
Mark Fischer, CISSP, MSIA, is an information security consultant and educator. He has presented classes and speeches to bankers, regulators, and information security professionals across the US, Africa, and the Middle East. He is also an Adjunct Professor in the Master of Science in Information Assurance (MSIA) program at Norwich University (Vermont, USA). Mr. Fischer can be reached at mfischer@403labs.com.
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.