U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Talking Trash

NCJ Number
Security Management Volume: 39 Issue: 2 Dated: (February 1995) Pages: 24-27
P Keough
Date Published
4 pages
Document disposal is the most basic element of information security and requires the same careful consideration by security managers as do other aspects of information security such as access control and other sophisticated security systems.
Before selecting a method of destruction, security managers should consider the sensitivity of the information, the quantity involved, timing considerations, and the medium (paper, magnetic, microforms, or electronic). Depending on these factors, possible destruction or disposal methods include trash disposal and recycling for nonsensitive materials and pulping, burning, shredding, grinding, and degaussing for more sensitive materials. companies can handle these functions inhouse or hire a destruction company to destroy or dispose of documents onsite or offsite. Organizations with extremely sensitive or classified information that might have to be destroyed at a moment's notice should also consider having an emergency destruction system in place. Every company should have a strict destruction policy to prevent a disgruntled employee or outside person from putting the company at risk. Illustration and photograph