Shredding for our future: a history of man’s struggle to create and destroy

Papyrus, bill of sale for a donkey.

Papyrus, bill of sale for a donkey.

They say that man is the animal that creates. I say that man is the animal that can create and will destroy. And sometimes a creation’s purpose could be destruction. This is the case with shredding machines.

The year was 2.560 B.C. when man in his desperate search for means of expression created papyrus. Before that his irresistible urge to express himself manifested mostly on cave walls or clay tablets or other difficult to impossible to shred mediums. Papyrus changed all of that. [1]

With the invention of papyrus, man felt for the first time in history the need to rip into pieces something that he created to imprint certain information. Why? Because for the first time in history, man could do it; Papyrus made possible such action.

This first papyrus shred to pieces could be of a painting or a poem gone horribly wrong. Or of symbols that articulated emotions or desires for the future. It could be a list of financial assets or a text of religious significance. The owner of the papyrus could have destroyed it. Or maybe it was a thief. Or it might even be a jealous wife or a loyal servant. We don’t know why or who did it but we can be certain that someone took the decision to destroy. There could be a reason for doing it or there could be no specific reason at all but it was done by someone.

And after the first man, there were many more that followed a similar course of action because they could do it. The Chinese discovered paper [2], and as centuries passed, humans kept finding new reasons to destroy.

Early wooden printing press, 1568

Early wooden printing press, 1568

Gutenberg [3] discovered the printing machine and the mass paper media was born. Reading was not anymore a privilege of the aristocracy.

In 1806 a man called Henry Fourdinier created the Fourdinier machine. These were steam-driven papermaking machines that could make paper with fibres from wood pulp. Great quantities of paper could be made in great speed. [4]

By the 20th century paper was an everyday commodity, part of every human activity. Common people used it, companies used it, and government agencies used it too.

And then, in 1909, almost 6.000 years after the invention of papyrus, 103 years after the creation of the Fourdinier machine, a man from the United Stated of America called Abbot Augustus Low had a simple but glorious idea. In a world dominated by paper, he had a simple idea. He thought: “What if I created a machine that shreds paper?” And thus, he filed a patent for what he called a “waste – paper receptable”. The first shredding machine came into existence. A creation meant to destroy. It could change the course of history. It did!

Papermaking machine

Papermaking machine

According to him, his invention related “to the provision of improved means for disposing of waste paper and is designed more particularly for use in offices and other places where not only the collection and storage of waste paper is desirable, but also its cancellation or mutilation in such manner as to render it unavailable or unintelligible for re-use or for information”.

The invention consisted “of a receptacle having a cutting or cancelling device interposed between it and a receiving hopper, whereby the papers are disintegrated and rendered useless as such before they enter the body of the receptacle, in which latter the fragments are stored temporarily in a suitable bag to be removed from time to time for the disposition of the waste”.

Waste Paper Receptacle, 1909

Waste Paper Receptacle, 1909

Augustus didn’t just invent the device but knew of the advantages it could hold for banks and other organizations “where the practical destruction of correspondence, memoranda, liquidated bonds, accounts, books, and the like is a desideratum […] since the particles of paper are useless for identification, information, or fraudulent purposes of any character” [5]

However, not many sh(a)red his enthusiasm. And as it is often the case with all those we come to admire as genius, it took society quite a long time to understand the necessity of such a device. [6]

In reality, there was no demand for a paper shredder; no market. And how could there be such a demand when most of the people didn’t feel the need to shred their documents using a device. And while it was probable that US intelligence agencies might have understood its importance the simple fact is that the concept of identity theft or data protection was not very common; not common enough for the “common people”. [7]

Now, all this has changed. In the 21st century, “information destruction” is a multi-billion business and shredding machines are at the centre of it.

Shredding machines have evolved and are becoming more and more sophisticated. They will destroy from paper to DVDs and CDS or hard drives. Anything that can hold data of any kind can be destroyed and recycled. [8]

Shredding Machine

Shredding Machine

Everyone is using them. From small offices to big corporations, from government agencies, to schools and hospitals; in some countries it has become a requirement of the law to shred specific documents using shredding machines. [9]

Companies make shredding machines and sell them. Other companies are going mobile, arriving at an organization’s premises with trucks equipped with machines that chew and spit piles of paper. They destroy data that are not meant to be seen by the general public, data that should not fall in the wrong hands. Doctors, spies, everyone uses them.

From the papyrus to the computer and the world of internet, creation goes hand in hand with destruction. In reality, evolution was also the evolution of the means of destruction; they seem somehow interrelated, as if they complement each other. It is human somehow. This is how we evolve; this is how we express ourselves more effectively. We create paper to destroy it; we share information to delete it; we decide what to keep; we shred for our future. We evolve.

  1. http://en.wikipedia.org/wiki/Papyrus
  2. http://en.wikipedia.org/wiki/Ts%27ai_Lun
  3. http://en.wikipedia.org/wiki/Johannes_Gutenberg
  4. http://en.wikipedia.org/wiki/Henry_Fourdrinier
  5. http://www.google.com/patents/US929960?dq=ininventor:%22ABBOT+AUGUSTUS+LOW%22
  6. http://en.wikipedia.org/wiki/Abbot_Augustus_Low
  7. http://www.foxnews.com/tech/2013/06/26/declassified-govt-report-details-decades-nsa-computer-spying/
  8. http://www.ironmountain.co.uk/services/secure-shredding
  9. http://www.cpni.gov.uk/Documents/Publications/2013/2013062-secure-destruction-sensitive-information.pdf

Winners write history: from Hosni Mubarak’s regime, to the Stasi and the Nazis, a history of shredding

 Sir Winston Churchill, 1942

Sir Winston Churchill, 1942

Sometimes I wonder, how much do we really know about past events?

It was Winston Churchill  who said: “History will be kind to me for I intent to write it”.

Yes, history was kind to him. He was among the protagonists of a world war that had cost the lives of many millions of innocent people. He, as a part of the winning side, made history. And history is favorable to the winners. They write it.

Different accounts can come to dominate in different periods of time or in different societies; depending on how free a society is, these accounts can be more or less accurate to the events in question.

Power struggles within societies can question the present social order. New agendas would rise that could question old dominant discourses and thus lead to a retelling of historical events bringing forward accounts, events and details that had been cast aside. It has happened before. [1]

But history cannot be objective. It is the story as it is told by the winners. It doesn’t have to be the “truth”. The truth is that half of the “facts” we think we know are merely fictions, pieces put together to create convenient and powerful stories; myths that support a certain scheme of things, a dominant power/knowledge system. [2] From what we have been taught in schools to the everyday news we read in the newspapers or the live coverage of important events on our television screens: all past is history, all present is history as well..

We can’t avoid it. We cannot avoid or dismiss history; choices of what should be kept and what we should forget. And yet, history is always on the making. And sometimes winners will become losers. History will be rewritten. Then, as regimes fall, and the dominant discourse and its surrounding myths collapse all kinds of evidence can rise into the surface; facts of the real nature of regimes that would otherwise be forgotten or would exist just for the eyes of the privileged few.

Egyptian State Security kept files on citizens and activists.

Egyptian State Security kept files on citizens.

This is the case with Egypt. On March the 5th of 2011 thousands of Egyptians stormed the headquarters of the State Security Police known as Amn Al – Dawla. Among the people of Egypt this is the “Capital of Hell”. They wanted to halt any effort by allies of the ex-President Hosni Mubarak’s regime to destroy police and intelligence documents of great value. Demonstrators succeeded to get hold of thousands of records providing evidence that there was a wide-reaching campaign of surveillance, torture and secret detention. Evidence was found that proved that media owners were on the payroll of the secret police. Documents existed that described extreme violations of human rights. However, protestors also found mountains of shredded or burned documents on the spot. [3]

In East Germany, during the Peaceful Revolution of 1989 – a series of political demonstrations against the regime of the GDR (German Democratic Republic) – Stasi’s offices were stormed by protesters. Stazi existed almost for 40 years. But the amount of agents and informers was such that the files they amassed had filled more than 60 miles of shelving. They had huge special shredding machines that could shred hundreds of meters of files. They worked day and night for more than three months. At the end, when they finally abandoned their posts, more than 16.000 sacks of shredded files were found which accounts just for 5% of the most important documents.

According to Karina Juengert – an archivist who has devoted her life in piecing together shredded documents of her nation’s past – the effort to reconstruct those destroyed documents is an effort to reconstruct a nation’s “shredded” history: “Nobody is going to spend time and energy tearing up documents that have no importance. So the work we are doing is, yes, of absolute importance“. [4]

From left to right: Neville Chamberlain, Édouard Daladier, Adolf Hitler, Benito Mussolini, and Galeazzo Ciano.

From left to right: Neville Chamberlain, Édouard Daladier, Adolf Hitler, Benito Mussolini, and Galeazzo Ciano.

In Nazi Germany they did not have nowadays technology of paper shredders. If they had, so many of the evidence of what the Third Reich had done or did plan to do would have been lost. With no evidence of the events many war criminals would have walked away free still advocating their ideas of hatred, denying the horror of their actions. Yes, it is true, neo-nazis still deny the Holocaust, and the existence of death camps, the experiments on humans, the millions of deaths. But if documents were shredded, the victory of the Allied forces would not be so clear. Without evidence, history would have been more kind to the Nazis. Even nowadays, they try to rewrite history by destroying documents; assistance comes from unexpected places.  [5] 

History is connected with documents. And there are times when the most secure thing to do is to shred them before they are used for harmful purposes. You know, it doesn’t have to be regimes or secret agencies. This is also the case with companies or organizations, public or private, which deal with credit reports or other documents containing sensitive consumer information such as patients’ records. [6]

Documents of this nature are a vital part of the personal history of individuals that no agency or company should keep copies off. Information of this kind in the wrong hands can be used to blackmail or to deny access to services, they can even prove valuable for identity theft purposes. [7] In that sense, shredding is a procedure of essential importance for citizens and businesses alike.

Sorting & Shredding Room

Sorting & Shredding Room, 1901

In fact, this is not just an ethical issue. Under the Data Protection Directive, it becomes a requirement of the law to destroy any documents that contain sensitive information. According to the Directive, data – processing systems should be designed to serve man; “whereas they must, whatever the nationality or residence of natural persons, respect their fundamental rights and freedoms, notably the right to privacy, and contribute to economic and social progress, trade expansion and the well-being of individuals” [8]

Failure to comply may lead to proceedings against the data controller, large fines or financial compensation to the data subject. The Directive – after the NSA leaks – will become stricter. [9]

Shredding machines is the most secure and common tool that people use to destroy sensitive documents. Shredding has been used to protect regimes as it is used to protect citizens. In the end, history is not definite; it can be kind to us as long as we respect the laws and make good use of the tools we have in hand. Shredding machines is such a tool. [10]

  1. http://www.rcgfrfi.easynet.co.uk/ratb/cuba/cuba_rev.htm
  2. https://www.msu.edu/~comertod/courses/foucault.htm
  3. http://nsarchive.wordpress.com/2011/03/10/egyptians-seize-secret-police-files/
  4. http://www.npr.org/2012/10/08/162369606/piecing-together-the-worlds-largest-jigsaw-puzzle
  5. http://www.writing.upenn.edu/~afilreis/Holocaust/swiss-shredding.html
  6. http://www.frostbrowntodd.com/resources-512.html
  7. http://www.reuters.com/article/2013/08/09/us-greece-tax-theft-idUSBRE9780QX20130809
  8. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
  9. http://www.lexology.com/library/detail.aspx?g=958ca7da-9c49-4510-9a0f-7626e2197069
  10. http://www.ironmountain.co.uk/services/secure-shredding

Edward Snowden: revealing the ongoing war on data that no one wants to know

report-nicaragua-willing-to-give-asylum-to-edward-snowden

It all started with a young man called Edward Joseph Snowden. A former CIA employee and NSA contractor who publicized many top – secret US and British government mass surveillance programs such as the PRISM, Tempora and Xkeystore.

Some call him a hero, others call him a traitor. The undeniable truth is that he is responsible for the most significant leak in US history.

According to his own words his sole motive was “to inform the public as to that which is done in their name and that which is done against them”. Edward Snowden didn’t want the story to be about him. He wanted it to be: “about what the US government is doing… about what kind of world we want to live in”.

The world in shock

Now, the whole world is in shock. Leaders of great nations also expressed their shock. As if this somehow makes them innocent. Angela Merkel puts a sad face and shows her mobile phone. Now look at me, she might had said, I am just like you: “bad spies tapped my phone too”.  “This should not be done among allies”, she complains. She just didn’t expect it. It was such s shock.

I suppose she didn’t know that when a leader of one of the greatest nations of the world uses an unsecured cellphone, there is a high probability that the NSA or any other agency of any country might try to intercept it.

But if Angela Merkel showing her mobile phone with a sad face raises questions, it all becomes quite preposterous when French political leaders express their “deep shock” about the extent of monitoring taking place in their country by US intelligence services.

“France is the evil empire”

France, according to the CEO of a top German satellite manufacturer “is the evil empire, stealing technology and Germany knows this”.

French secret agencies don’t need the US to spy on their citizens. They can do it on their own without help from “outsiders”. According to a revealing article by “Le Monde” the French foreign intelligence service DGSE “systematically collects the electromagnetic signals from computers and phones in France, as well as the exchange [of data] between France and abroad.” The newspaper notes that: “Politicians are perfectly aware of it, but secrecy is the rule”.  I am deeply shocked.

The fact is that French intelligence budget was increased by 9 percent for 1992 — and this was the period just after the end of the Cold War.

The Germans do it. As Hans – Georg Wieck, the former CEO of the German foreign intelligence service BND stated, there was no surprise at the extent of internet surveillance by British and US intelligence agencies. These are “the natural, daily bread of the secret services”—including the BND.

Everyone spies

China, South Korea, Japan, also do it.

Even Canada does it; The Canadian Secret Agency spied on the Brazilian mining and energy ministry. Then they met in Ottawa with corporations that have interests in Brazil and briefed them on everything they had learnt. You see, there are more than 40 Canadian companies involved in Brazil’s mining sector. The stakes are high.

It is not even about terrorism or security anymore. It is about economy and corporations.

After the end of the Cold War it was clear that international rivalry would be economic rather than political – military. Consequently, in the US, the Clinton administration decided to establish the National Economic Council. From that moment after economic issues where of the same importance as national security issues. Even a “war room” was established by the Commerce Department.

This change had an effect on US intelligence agencies. International trade and competitiveness was the new battlefield. CIA’s director-designate R. James Woolsey said in 1993 that economic intelligence has become “the hottest current topic in intelligence policy”.

Economic security similar to military security

Other great nations followed similar paths. For all of them economic security is similar to military security. If many things were permitted towards achieving traditional security the same applied to economic security.

Pierre Marion, the former director of DGSE, the French equivalent of the CIA described France as a notorious economic spy: “We are really allied. But in the economic competition, in the technological competition, we are competitors; we are not allied.” For him, it was natural that the US will receive the most attention from intelligence services: “America has the most technical information of relevance. It is easily accessible.”

Stansfield Turned, intelligence director during the Carter administration had a similar view: “If economic strength should be now recognized as a vital component of national security, parallel with military power, why should America be concerned about stealing and employing economic secrets?”

Nobody knows anything

The entire world is doing it and yet no one seems to know anything about it.

Some say that all this is too obviously hypocritical, statements meant for public opinion. Noone really wants the spying “monster” killed because they raised it.

And it is true, if the French and German governments cared so much about their citizens learning that their privacy and data are being systematically assaulted and used without their consent wouldn’t it make sense that their government would be the first to offer asylum to the person who made everything visible? Instead, they denied him of any support; they didn’t listen to his pleas for protection of his basic political rights. They were even hostile. It was like they tried to stop him from leaking more secrets.

Edward Snowden as a villain

Many believe that the open outrage expressed by nations against NSA practices was really an outrage towards the person who revealed all their secrets and the media who made them public. Something larger was in stake..

Governments already knew, citizens didn’t; They “didn’t have to know”.

Edward Snowden made evident that there is a whole system based on economic espionage and data collection. It takes place in unprecedented levels. And this is “business as usual”.

Revising the 1995 data protection law

From this point of view the discussion opened by the revelations about the NSA surveillance programs around the necessity of a revision of the 1995 data protection law in the European Union reflecting the changing nature of internet usage should be seen as part of an ongoing economic war that has become central for the security of nations after the end of the Cold War. And it is more than clear that in our times of crisis data is more important than ever. It can be decisive.

“We have to accept that apparently, the NSA is monitoring the entire global telecommunications goings-on. We have to achieve a political, international agreement that this is unacceptable and has to be limited,” said Alexander Dix, Berlin Commissioner for Data Protection. “This applies to other intelligence [bureaus] as well, not only the American ones”.

http://rt.com/news/data-protection-rules-eu-491/

100 million euro fines for breaching data protection

This measure if approved will force companies outside the EU such as Facebook, Yahoo and Google to comply with European data protection laws when they operate in Europe. Fines for breaching data protection rules could reach up to 100 million euros. In the new legislation prepared there is also a “right to erasure” clause that limits the access of internet companies to the private data of users.

The draft approved on October 21st – with a record-breaking 4,000 amendments – has elements that aim at winning over skeptical business interests with requirements for small and midsize organizations and businesses – as long as their central focus is not information processing – being much less than larger companies.

Complying with new requirements

With changes of such great scale taking place organizations of any size trust well – established companies on the sector of data protection to help them cope with new requirements.

Iron mountain is a company with a long history of high quality data protection services that are designed to mitigate risks in compliance with regulations that demand uniform processes and accountability.

It is not just a requirement of the law, it is a necessity. In a world where securing data is linked to the survival of businesses, institutions, even nations, no one has the right to pretend being shocked. It just won’t do it.

The Importance of Archiving Data

Memories

When I was young I used to collect all sorts of things: cd’s with my favorite music, magazine articles for things that interested me, coins, DVD’s, gadgets from my holiday’s destinations and even matchboxes for a short while. The reason is obvious: it was the simple desire to store and preserve everything that made me happy or brought to me good memories from the past. Well, it is a habit I kind of miss since I grew up a little bit. I remember the joy and the feeling of satisfaction every time I felt like updating or even checking on one of my boyish collections. It was a true feeling of joy!

What does it mean to grow up? Well, it means that the necessities of life knock at your door at some time (along with the pleasures of the adult life that is). A necessity of adult life couldn’t be other than the need to gather and preserve data that concern your professional life. You might need to do it by yourself if you are an accountant that works from home. Or, you might need to do it for your company if you’re one of the lucky ones that has his own office downtown (in the times of high rates of unemployment around Europe, yes, this is what I call luck!).

Archiving Data

How many times a company had to face devastating results in the light of a mismanagement of its data? I guess it must be many! Nowadays especially, the need of a company to store its data in an appropriate way it’s not only a necessity directed from the need to operate smoothly and efficiently but it is also a matter of stricter regulations and policies concerning data management and archive storage. E.U. recent regulations have generated heated discussions concerning the issue. Nevertheless, what matters in this case is not how things should have been but how one can adjust to new realities.

Guinness World Record/Shred Day DFW 2012

Iron Mountain provides excellent services for document storage. The company simply gathers the documents and stores them to their off-site storage facilities. Web services offered by the company provide an easy and quick access to your archive. What is more, you can label, search and of course request a retrieval of documents at any time. Iron Mountain has over 1.000 storage facilities around the world and has been operating on the field since 1951. Now, this is what I call a safe choice if you want to guarantee business continuity for your own company!

Apart from storing data and information though, there is also another necessity. It consists of the simple fact that some data, some information, needs to be destroyed. And this is another sensitive issue that has been thoroughly discussed by everyone concerned: individuals, companies, institutions and governmental agencies. It goes like this: some information is valuable (it could costs millions sometimes!) and some other is simply, from a point onward, confidential waste, meaning simply waste. And these are confidential waste that a company must get rid of.

Interactive Kiosks

In addition, by being waste it means that you need to make proper use of them! The world we live in faces a problem, we all know it: it is the single most crucial problem this planet faces and will need to face in the future and it’s the ecological one. I will put it bluntly: if we want to imagine that sometime from now in the future normal life will still go on than we really need to start protecting the environment. In other words, your confidential waste must become recycling material and obviously this is a job that needs to be handled professionally.

Businesswoman signing the contract.

Many companies choose to outsource the job of destroying their data in order to keep up with data destruction requirements and ecological concerns. Usually, they are provided with locked consoles which are emptied on a regular basis by the external company’s stuff. The waste will be 100% recycled. In addition, a small company that wishes to avoid signing a contract, it can request on-demand shredding services by another company. That means that they can use their services whenever is needed as a small company probably doesn’t need to deal with huge amount of information and confidential waste that is.

This whole issue is all about responsibility and transparency in case you didn’t get it. I only hope that most companies will comply with all of the the rules and regulations…

The Wild Wide Web and Data Protection Mechanisms

wild_west

Wild Wild West

You are surely familiar with all of those American movies of the fifties about the Wild Wild West, its brave cowboys and sheriffs, about all that gold rush and the fight to keep one’s own resources safe and well protected. A common message that trans-passes all of these good old movies of the fifties is the following: it is often difficult to protect your property and your precious resources and it definitely is a tricky business to keep threats away and manage your own way smoothly. What we all know about these movies is that their plot develops around itchy issues: crossing the boundary of private property, raids and robberies and all sorts of threats towards one’s resources or belongings. For sure, the Wild Wild West has always been the harshest challenge!

Nowadays, the battle and the whole threat went online – especially for companies and corporations! What’s at stake is privacy, like always! along with discretion and a safe and secure storage, scanning and management of the data. You surely do not want your data to be invaded by unwanted eyes or visited by uninvited guests! You might want to keep private what is yours and what is meant to be kept this way – both private and of your own! And, for sure, you do not want to be lost into an infinity of information that sometimes seems impossible to handle – it is, for sure, a Sisyphus’ job to search into endless amounts of archived information, not knowing where to start from or even where to store it!

3487096552_d82a8c917a

Iron Mountain
Storage and Information Management Company

Anyway, do not panic! There are bright solutions to come to your rescue and protection! Like, for instance, great professional services that take care of your confidential waste. Confidential waste is nothing else than data that you consider that you do not need anymore and that it is to be thrown away. However, see confidential waste as the furthest away borders of your property, that need to be protected nevertheless, just as the closest of your boundaries, as they are still yours and you want them as such, as you want them to be confidential until their “end”. Do not forget that confidential waste is still part of your property – at least in intellectual terms – and it should always be. In order to be so, you do not have anything to do but contract the specialized services offered to you and your company and let it all on the hands of the professionals!

Of course, you can also benefit from similar services that can prove useful both with managing data and protecting it, be it archived data or that of active use. Imagine that your data could be protected of all risks and challenges! Imagine that you could at once be carefree about the data you possess and you need to protect and manage! Imagine that there could be a way for your company to get rid of the burden of keeping huge amounts and piles of files and records, careful not to vanish and careful not to burn. Oh well, nowadays there is such a thing like records management and it takes care of all of the aforementioned burdens for you and even more of that!

In other words, you can’t do it today without a proper a data recovery plan. Your documents and the documents of your company must be safely stored in special storage spaces secured and protected from all unwanted threats. So, your (intellectual) property can finally be safe and sound, untouched and untainted by unwanted intruders over your fence!

Records management services can include not only the archived data, but also the management your active files – in the most discreet and efficient manner! All of the active files of your company can be kept safe and sound, but still be accessible and all of them able to be accessed in a timely manner. All of those precious files containing important information are to be kept secured, just like in a safe box, with all of the advantages conferred by outsourcing – such as not having your precious space occupied with papers, files and having to manage them yourself! Having someone taking care of all of that hassle for you! And all with the maximum of guaranteed discretion!
Not to mention that, if you want to and choose so, your documents can easily be scanned and digitized for an even easier access! But that is another story, that will happen in some other “movie”…maybe one of the science fiction genre…

Let’s now stick to our Westerns. Wouldn’t all of those guys there living in the Wild Wild West have liked to be protected, along with all their borders and belongings!? Of course they would have! Well, see the similarities between the life of a cowboy and that of a company or corporation nowadays in charge of taking care of its intellectual property and of its private borders and limitations imposed by incumbent secrecy. You surely want to be saved of threats! And it is time to think about doing it, especially today, when we all spend most of your time running around the … Wild Wide Web! I wish you good luck with your data management and protection and hope you handle with all of that confidential waste! Hasta la vista!

Digitize it!

We like to store things. As a matter of fact, not only that we like to store our things, but we’re also forced to. If you want to preserve anything valuable – whether it is of sentimental value or, more likely, of monetary value -, you have to store it carefully. Along with living in the digital era, the idea of storing and preserving becomes even more urgent. We live in times when information travels faster than the speed of light… or at least faster than Superman, let’s say – if we want to be sensible on this!

Information, in its digital forms, does not only that travel fast, but it is also more vulnerable. However, document archiving offers unimaginable capabilities that can keep up with the times we live in and latest transformations, so that it can actually take the human habit of gathering, storing and taking care of things to the next level and to a different extent. The idea of digitalizing all of the world’s libraries, for instance, is not new; it was born in 1971 when Michael Hart, the founder of Project Gutenberg, first talked about his vision. Could you even imagine how brilliant it would be for this great idea to come to life? This way, there would never be a disaster such as the burning of the Library of Alexandria ever again! Plus, Alexandria wasn’t the only temple of knowledge the world has lost… The destruction of the world’s largest and most important storage of knowledge makes me think of how privileged we are to live in the era of digitalization. To put it simply, while we haven’t eliminated all possible dangers, we certainly live in times of unlimited possibilities.  Let’s make the best out of it!

What Waste Means

…and Possible Solutions

What is waste nowadays? Well, waste is not simply rubbish, that’s for sure. Waste is one of the hot issues of the day, whether we are talking about household waste and the recycling of it, whether we talk about nuclear waste and the risky consequences of not being handled with very special care, or whether we are dealing with economic waste and the reduction of it, especially in the context of current economic crisis.

Recycling seems to be top of the list when it comes to priorities and possible solutions that could impose themselves over waste. Recycling involves the transformation and reuse of already used material – be it raw material or not. But what if recycling would be applied in the reuse of already used information? What if some – by thinking recycling-wise – would try to build their kingdom on already thrown away data?

If so, this is when the term of confidential waste comes into the discussion. Handling with care confidential waste can become a priority for many businesses, if the philosophy of recycling gets too much rooted in the minds and intentions of competitors. It would mean that the confidential waste produced by your own company would become the fertile ground of competitors, who would even use whatever might be strictly confidential for you in their own advantage, for increasing their own profits and benefits. And this is how the philosophy of recycling could lose its ethical ground and become its opposite. Also, by comparison, your own confidential waste not handled with care can become as dangerous to your business’s well being as nuclear waste can be to the planet, despite nuclear power having been so useful.

But is there any solution to avoid or diminish at maximum any risk for a disaster? Well, there might be. Just as handling with care and attention the nuclear waste so that it not to produce a disaster to the whole humanity, handling with care and maximum of attention the confidential waste produced by your company could also impose itself as the most proper of even only existing solution at the moment. Also, as there are specialized organisms handling very dangerous waste, there are also specialists in handling whatever is to be considered confidential waste, so that it won’t turn against the well being of the organism or enterprise that produced it in the first place.

Back in the old days, when businesses still existed and confidentiality was an issue as well, papers and documents containing information that could have been harmful for one party or another used to be thorn apart before being thrown away. Based on that example, shredding services have been invented to insure the proper handling of that data that should and must disappear.

It is absolutely necessary to make use of such shredding services for the sake of the health of the business you might be running. The bad news today is that the software to manage to put back thorn apart documents has already been invented. Therefore, information that you might consider destroyed and long gone already might be recreated by use of specialized software. Therefore, there is the urgent need to rely upon some experts that could do the job properly.

Moreover, in case you do care not only for the well being of your own business, but also for the well being of the environment, you should then also think about some specialized companies that can handle the informational waste with care, but also the physical waste with proper consideration. This involved to contract the services of those companies who could actually guarantee, on the one hand, the fact that the confidential data would not be ‘recycled’, but, on the other hand, the fact that the physical support upon which this data had been inscribed – be it paper of plastic – could be recycled, for the benefit of the whole planet and the protection of the natural environment.

Given the complex relationship between waste and recycling – be it confidential or not, be it well-intended or not – we then need to conclude that proper care and attention will always be the best guards to prevent a possible disaster. Take care!