Compliance

  • What Exactly Is ITAD?

    What Exactly Is ITAD? Levi Hentges, Director of Business Development with SEAM When speaking with businesses in our community, I often hear: “I had no idea you guys existed!” This comes as no surprise. Most organizations only consider IT Asset Disposition, or ITAD, as an afterthought when they have to “get rid of stuff”. Computers, […]

    read more
  • What’s the Difference Between NAID Certification & NAID Membership?

    When choosing a data destruction provider, it’s important to understand the differences between NAID/i-SIGMA members and NAID AAA certified vendors.  Although NAID membership is often confused with NAID AAA certification, they are VERY different. Who is NAID? Since 1994, the National Association for Information Destruction (NAID) has been the governing body for data destruction operations […]

    read more
  • The Most Overlooked Part of Your Data Security

    One of the most critical areas of data security that often gets overlooked during this month of attention, is when your devices come off-line. Having a plan in place for securely getting rid of used equipment can instantly protect a company against the catastrophic risk of a data breach. Along with having a clearly defined […]

    read more
  • The End of Windows 10: Time for a Hardware Refresh

    The End of Windows 10: Time for a Hardware Refresh Windows 11 has arrived, with Microsoft ending support for Windows 10 on October 14th, 2025. Microsoft has already began rolling out Windows 11, prioritizing PCs based on how old they are.  All compatible machines should have the option to upgrade by the middle of 2022,  […]

    read more
  • The FACTA Disposal Rule: What Does It Mean for Your Business?

    Businesses have a lot to consider when protecting their company and client data. No one wants to be subjected to identity theft due to lax data protection policies. To better protect consumers, the Fair and Accurate Credit Transaction Act (FACTA) was established in 2003. This act provides specific rules on how personal and company data […]

    read more
  • Tech Audits: How Often Should They Be Done?

    Is the technology your business uses reliable? Can your employees count on it to do their jobs effectively? It’s important that you be able to answer this question with confidence, and the best way to do that is with a thorough technology audit. What Is a Technology Audit? A technology audit is a complete assessment […]

    read more
  • How Often Should Your Business Complete a Data Risk Assessment?

    No business is safe from the risk of a data breach. A breach involves the theft, unauthorized access, or destruction of data containing personally identifying information or other confidential information. It is imperative that every business be vigilant about identifying data risks and finding ways to effectively shut those risks down. Many business owners understand […]

    read more
  • Practical Tips to Pre-Plan and Prepare for an Audit

    There are a few essential things to consider when preparing for an audit or an administrative inspection. Not being prepared can leave you vulnerable to costly fines, violations, interruptions of business, and more frequent inspections. Investing time and effort into pre-planning and preparing for an administrative inspection will help you avoid mistakes. While many businesses […]

    read more
  • Why Do Certifications Matter?

    Why Do Certifications Matter? When it comes time to recycle or resell your devices, choose wisely who you trust. Data security and environmental compliance is critical in today’s high-risk business landscape, and there are many companies who will take your equipment and give you their word…but how do you know they can really be trusted? […]

    read more