FACTA (Fair Trade & Accurate Credit Transactions Act)
Stipulates requirements for information privacy, accuracy, and disposal to aid in protecting consumers from identity theft.
HIPAA (Health Insurance Portability & Accountability Act)
Mandatory requirement of healthcare organizations to maintain safeguards preventing the disclosure of personal health information.
HITECH (Health Information for Economic & Clinical Health)
Promotes Meaningful Use (use of EHR’s to improve quality, safety, and efficiency while reducing health disparities) in Health Information Technology.
GLBA (Gramm Leach Bliley Act)
Requires financial institutions to explain their information-sharing practices to customers to protect consumers from privacy breaches resulting from the sale of personal financial information.
SOX (Sarbanes Oxley)
Protects investors by improving the accuracy and reliability of corporate disclosures.
FCRA (Fair Credit Reporting Act)
Federal Government legislation enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies.
NIST (National Institute of Standards and Technology)
Federal technology agency that works with industry to develop and apply technology, measurements, and standards.
PCI DSS (Payment Card Industry Data Security Standard)
Proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, JCB, and China UnionPay.
About Resource 1
Resource 1 is a regional leader in the on-site destruction of data bearing hard drives and backup tape media. Our highly secure NAID AAA Certified destruction processes, coupled with our state-of-the-art machinery and environmentally conscious practices, make securing your organization's most important information easier than ever. We have met or exceeded all government and legislative regulations and mandates overseeing the proper destruction and disposal of data bearing devices and decommissioned IT equipment, and ensure that everything we handle will be thoroughly and securely destroyed and never recovered.