Kadansky Logo

Personalized Computer Services

(617) 484-6657
Home

Services

How I Work

About

Contact

Resources

Newsletter

NEWSLETTER
Practical Computer Advice
from Martin Kadansky
Volume 4 Issue 6June 2010
In This Issue
Data Security: How can I protect my paper records?
One major part of complying with the new "Protection of Personal Information" Massachusetts law involves securing your paper records. Here's my advice on how to get started.
Data Security: How can I protect my paper records?

On March 1, 2010 Massachusetts passed a new law requiring that all organizations take certain steps to secure the personal information of any Massachusetts customers or employees, or be subject to fines and penalties for non-compliance.

For example, if your company, nonprofit, or volunteer-run organization has individual or corporate customers in Massachusetts who pay you by check, or you have any Massachusetts employees or contractors, then this law applies to you.

As I've written before, there are two basic approaches to complying with this law:
  • Doing the minimum specifically required by the law, or
  • Doing more than what's required, within reason, especially when it's simpler
How could doing more be simpler? For example, you may determine that out of your 100 clients, you handle personal information for 10 of them. The minimum approach would be to move the paper records for those 10 clients into a new locked file cabinet, leaving the records for your other 90 clients in your old (unlocked) file cabinet. However, the simpler approach would be to put all of your clients' records into one locked file cabinet, which is more than required by law but probably less overall work for you.

Getting started: What sensitive paper records do you handle?
  • Get familiar with the state's definition of "personal information" (see "Data Security: The new Massachusetts law you can't ignore" at http://kadansky.com/files/newsletters/2010/2010_03_17.html).
  • Identify the particular types of customer personal information your organization handles, no matter how briefly, including customer checks or credit card information. For example, how are checks received from customers? Where are they kept before they're deposited? Do you make copies of them? Who deposits them?
  • Identify any personal information your organization handles regarding any employees or contractors. For example, how are your payroll and 1099 records stored? Who has access?
  • As part of this process you could also secure your own business records. Where does your organization store its own sensitive records, including your checkbook, bank and credit card statements, income and expense records, tax records, incorporation papers, etc.?
What access to records do you have?
  • Identify any information you handle that could lead to personal information. For example, customer passwords (which give access to their email accounts, voice mail systems, computer log-ins, bank accounts, credit card accounts, or retirement accounts) all lead to information which in turn may enable someone to get access to your customers' personal information, and even direct access to their money.
  • How do you secure access to personal information on your premises? For example, the keys to your locked cabinets and offices, alarm codes, keyless remotes, and lock combinations should all be stored securely.
  • Similarly, any spare keys to customers' or employees' homes or offices that you may handle, along with their alarm codes, keyless remotes, and lock combinations should also be secured.
Are you currently handling those sensitive paper records in a secure way?
Once you've identified what sensitive information you're handling, the next step is to examine how you're handling it, from the perspective of security. Ask yourself:
  • Are you taking reasonable measures to protect that information from being seen by unauthorized people inside your organization?
  • Is it also secure from being seen or stolen by people outside your organization?
  • Does sensitive information arrive by mail or fax? Is your mailbox or fax machine out in the open for anyone to see? Could an unauthorized person see or take your payroll reports, paychecks, or confidential mail from customers?
  • Do you or your employees leave confidential information on their desks or in unlocked rooms or cabinets? Does such information get taken home at night?
  • How does obsolete sensitive information get archived or disposed of?
Are there any sensitive paper records you could get rid of, reducing your exposure?
Decide whether any of the information you're handling is actually important for your organization to operate. Getting rid of any unnecessary customer information (and, if possible, no longer collecting it going forward) eliminates the risk of that information being stolen.

For example, if you're in the habit of photocopying the checks that customers give you in payment, once those checks have cleared you could shred those copies instead of keeping them long-term.

What would it take to make those sensitive paper records secure?
Now that you've identified your security risks, what reasonable steps can you take to minimize or eliminate them? For example:
  • Lock up your mailboxes, file cabinets, desks, or private offices, and only give access to appropriate people.
  • Move your fax machine out of a public area into a private, locked office.
  • Adopt a strict, formal, written policy on how your organization handles sensitive information.
  • Train your employees, contractors, and vendors on your policies.
  • Require your vendors to secure any sensitive customer or employee records you need to share with them.
Involve your employees, contractors, and vendors in this process of keeping this information secure. They probably have many great ideas to contribute.

Changes I've made in my business
In my client records, I keep track of personal information for some of my clients at their request. I decided that securing all of my clients' information (beyond what the law requires) was simpler and easier than doing the minimum. Towards that end, here's what I've done so far:
  • Since the file cabinet I was using to store my active client records was almost full, I bought a second file cabinet and moved the rest of my paper records into it, including my inactive clients and my own business records.
  • Since neither file cabinet had a built-in lock, I hired a handyman to install "lock bars" (also called "swing-away file cabinet locking bars") on each cabinet. These are hinged vertical metal bars that, when swung shut and locked with an external lock, prevent the drawers from opening.
  • I didn't want to keep track of any keys, so instead of regular padlocks I bought "set-your-own-combination" locks (also called "resettable combination padlocks"), and added the combinations to my password chart.
  • I've changed how I handle paper records with increased security in mind. When I leave my office I now lock all business-related papers in my file cabinets instead of leaving them on my desk, including client projects, not-yet-deposited checks, and my "paper to be shredded" pile.
Where to go from here
  • Review the sensitive customer and employee paper records that your organization handles, and find reasonable ways to secure them from being stolen.
  • Set up locked storage for sensitive paper records (desks, file cabinets, offices, etc.).
  • Buy a good-quality cross-cut paper shredder (not one that makes long strips, nor a cheap one that balances on top of a trash can), or hire a trustworthy paper shredding service.
  • If you find "set-your-own-combination" locks appealing (also known as "resettable combination locks"), I've seen them at stores like Home Depot, including dial combination locks ("right 24, left 17, right 5") along with 3- and 4-digit brass locks, all made by Master Lock.
If you know someone who might find this helpful, please feel free to forward it.
If you have any comments about this article, send me a reply!
If you have a topic that you'd like me to write about, I'd love to hear about it!
How to contact me:
email: martin@kadansky.com
phone: (617) 484-6657
web: http://www.kadansky.com

On a regular basis I write about real issues faced by typical computer users. To subscribe to this newsletter, please send an email to martin@kadansky.com and I'll add you to the list, or visit http://www.kadansky.com/newsletter

Did you miss a previous issue? You can find it in my newsletter archive: http://www.kadansky.com/newsletter

Your privacy is important to me. I do not share my newsletter mailing list with anyone else, nor do I rent it out.

Copyright (C) 2010 Kadansky Consulting, Inc. All rights reserved.

I love helping people learn how to use their computers better! Like a "computer driving instructor," I work 1-on-1 with small business owners and individuals to help them find a more productive and successful relationship with their computers and other high-tech gadgets.

Printer-friendly version

Subscribe to this free newsletter

Go to the Newsletter Archive

 

 

To the Top


All original content copyright © 2002 - 2010 Martin Kadansky

Site designed and developed by and copyright © 2002 - 2007 ozbarron