Paper shredder

Last updated
Paper shredder with built-in wastebasket Paper Shredder.jpg
Paper shredder with built-in wastebasket
Inner view of a paper shredder with motor Paper shredder - detail-9831.jpg
Inner view of a paper shredder with motor
Detail of a cross-cut paper shredder Paper shredder - detail-9839.jpg
Detail of a cross-cut paper shredder

A paper shredder is a mechanical device used to cut sheets of paper into either strips or fine particles. Government organizations, businesses, and private individuals use shredders to destroy private, confidential, or otherwise sensitive documents.

Contents

Invention

The first paper shredder is credited to prolific inventor Abbot Augustus Low, whose patent was filed on February 2, 1909. [1] His invention was however never manufactured because the inventor died prematurely soon after filing the patent. [2]

Adolf Ehinger's paper shredder, based on a hand-crank pasta maker, was the first to be manufactured in 1935 in Germany. Supposedly he created a shredding machine to shred his anti-Nazi leaflets to avoid the inquiries of the authorities. [3] Ehinger later marketed and began selling his patented shredders to government agencies and financial institutions converting from hand-crank to electric motor. [2] Ehinger's company, EBA Maschinenfabrik, manufactured the first cross-cut paper shredders in 1959 and continues to do so to this day as EBA Krug & Priester GmbH & Co. in Balingen.

Right before the fall of the Berlin Wall, a “wet shredder” was invented in the former German Democratic Republic. To prevent paper shredders in the Ministry for State Security (Stasi) from glutting, this device mashed paper snippets with water. [2]

With a shift from paper to digital document production, modern industrial shredders can process non-paper media, such as credit cards and CDs, and destroy thousands of documents in under one minute. [2]

History of use

Until the mid-1980s, it was rare for paper shredders to be used by non-government entities.

A high-profile example of their use was when the U.S. embassy in Iran used shredders to reduce paper pages to strips before the embassy was taken over in 1979, but some documents were reconstructed from the strips, as detailed below.

After Colonel Oliver North told Congress that he used a Schleicher cross-cut model to shred Iran-Contra documents, sales for that company increased nearly 20 percent in 1987. [4]

Paper shredders became more popular among U.S. citizens with privacy concerns after the 1988 Supreme Court decision in California v. Greenwood ; in which the Supreme Court of the United States held that the Fourth Amendment does not prohibit the warrantless search and seizure of garbage left for collection outside of a home. Anti-burning laws also resulted in increased demand for paper shredding.

More recently, concerns about identity theft have driven increased personal use, [5] with the US Federal Trade Commission recommending that individuals shred financial documents before disposal. [6]

Information privacy laws such as FACTA, HIPAA, and the Gramm–Leach–Bliley Act are driving shredder usage, as businesses and individuals take steps to securely dispose of confidential information.

Types

Multi-cut scissors used to shred paper ShredderScissors.jpg
Multi-cut scissors used to shred paper

Shredders range in size and price from small and inexpensive units designed for a certain amount of pages, to large expensive units used by commercial shredding services and can shred millions of documents per hour. While the very smallest shredders may be hand-cranked, most shredders are electrically powered.

Shredders over time have added features to improve the shredder user's experience. Many now reject paper that is fed over capacity to avoid jams; others have safety features to reduce risks. [7] [8] Some shredders designed for use in shared workspaces or department copy rooms have noise reduction.[ citation needed ]

Mobile shredding truck

Larger organisation or shredding services sometimes use "mobile shredding trucks", typically constructed as a box truck with an industrial-size paper shredder mounted inside and space for storage of the shredded materials. Such a unit may also offer the shredding of CDs, DVDs, hard drives, credit cards, and uniforms, among other things. [9]

Kiosks

A 'shredding kiosk' is an automated retail machine (or kiosk) that allows public access to a commercial or industrial-capacity paper shredder. This is an alternative solution to the use of a personal or business paper shredder, where the public can use a faster and more powerful shredder, paying for each shredding event rather than purchasing shredding equipment.[ citation needed ]

Services

Some companies outsource their shredding to 'shredding services'. These companies either shred on-site, with mobile shredder trucks or have off-site shredding facilities. Documents that need to be destroyed are often placed in locked bins that are emptied periodically.

Shredding console Shredding Console.jpg
Shredding console

Shredding method, and output

As well as size and capacity, shredders are classified according to the method they use; and the size and shape of the shreds they produce.

The shredded remains of a National Lottery play slip. Shreddedlottoticket.jpg
The shredded remains of a National Lottery play slip.

Security levels

There is a number of standards covering the security levels of paper shredders, including:

Deutsches Institut für Normung (DIN)

The previous DIN 32757 standard has now been replaced with DIN 66399. This is complex, [10] but can be summarized as below:

  • Level P-1 = ≤ 2000 mm² particles or ≤ 12 mm wide strips of any length (For shredding general internal documents such as instructions, forms, expired notices)
  • Level P-2 = ≤ 800 mm² particles or ≤ 6 mm wide strips of any length
  • Level P-3 = ≤ 320 mm² particles or ≤ 2 mm wide strips of any length (For highly sensitive documents and personal data subject to high protection requirements, purchase order, order confirmations or delivery notes with address data)
  • Level P-4 = ≤ 160 mm² particles with width ≤ 6 mm (Particularly sensitive and confidential data, working documents, customer/client data, invoices, private tax and financial documents)
  • Level P-5 = ≤ 30 mm² particles with width ≤ 2 mm (Data that must be kept secret, balance sheets and profit-and-loss, strategy papers, design and engineering documents, personal data)
  • Level P-6 = ≤ 10 mm² particles with width ≤ 1 mm (Secret high-security data, patents, research and development documents)
  • Level P-7 = ≤ 5 mm² particles with width ≤ 1 mm (Top secret, highly classified data for the military, embassies, intelligence services)

NSA/CSS

The United States National Security Agency and Central Security Service produce "NSA/CSS Specification 02-01 for High Security Crosscut Paper Shredders". They provide a list of evaluated shredders. [11]

ISO/IEC

The International Organization for Standardization and the International Electrotechnical Commission produce "ISO/IEC 21964 Information technology — Destruction of data carriers". [12] [13] [14] The General Data Protection Regulation (GDPR), which came into force in May, 2018, regulates the handling and processing of personal data. ISO/IEC 21964 and DIN 66399 support data protection in business processes.[ citation needed ]

Shredding and the Law

Navigating the complex landscape of federal regulations for data protection and document destruction is crucial for businesses in maintaining compliance and avoiding penalties. Understanding these regulations ensures that sensitive information, whether in digital or physical form, is handled securely.

Health Insurance Portability and Accountability Act (HIPAA) - 1996 Established by the federal government, HIPAA mandates businesses to implement safeguards for protecting health information. Non-compliance can result in substantial fines. This act emphasizes the importance of handling medical records with utmost confidentiality and security. More information about HIPAA can be found on the CDC's website.

Computer Fraud and Abuse Act (CFAA) - 1984 The CFAA regulates how businesses manage sensitive data on digital platforms. It underscores that simply deleting files from a hard drive doesn't guarantee data security. To ensure complete data destruction, the physical destruction of hard drive platters is necessary. Detailed information on CFAA is available at the U.S. Department of Justice website.

Gramm-Leach-Bliley Act (GLBA) - The GLBA sets forth guidelines for financial institutions on the disposal and management of financial records. This act ensures that financial documents are handled and destroyed in a manner that prevents unauthorized access and misuse. The Federal Trade Commission provides further details.

Legal Document Protection Across 32 States and Puerto Rico - A majority of states and Puerto Rico have enacted laws to safeguard identifying information managed by law firms, businesses, and government entities. These laws dictate the storage duration, handling, and destruction methods for legal documents, requiring them to be rendered unreadable or undecipherable. New York’s specific regulation can be explored at N.Y. Gen. Bus. Law § 399-H.

Sarbanes-Oxley Act - 2002 This act governs the retention period for business records before destruction is permissible. It’s vital for businesses to be aware of these retention times to ensure compliance. For further guidance, refer to the official bill text.

Fair and Accurate Credit Transactions Act (FACTA) - An amendment to the Fair Credit Report Act, FACTA protects consumers from identity theft by providing guidelines on the proper disposal and protection of customer data, including account numbers and social security numbers. The FTC’s website offers comprehensive information on FACTA.

Understanding and adhering to these federal regulations is vital for businesses to ensure the secure handling and destruction of sensitive data, thereby safeguarding against breaches and maintaining compliance. Information provided by Country Mile Document Destruction.

Destruction of evidence

There have been many instances where it is alleged that documents have been improperly or illegally destroyed by shredding, including:

Unshredding and forensics

An example of a shredded and reassembled document during the Iran hostage crisis Shredded 1979-09-01 1305Z CIA cable from American Embassy Tehran.jpg
An example of a shredded and reassembled document during the Iran hostage crisis

To achieve their purpose, it should not be possible to reassemble and read shredded documents. In practice the feasibility of this depends on

The resources put into reconstruction should depend on the importance of the document, e.g. whether it is

How easy reconstruction is will depend on:

Even without a full reconstruction, in some cases useful information can be obtained by forensic analysis of the paper, ink, and cutting method.

Reconstruction examples

Forensic identification

The individual shredder that was used to destroy a given document may sometimes be of forensic interest. Shredders display certain device-specific characteristics, "fingerprints", like the exact spacing of the blades, the degree and pattern of their wear. By closely examining the shredded material, the minute variations of size of the paper strips and the microscopic marks on their edges may be able to be linked to a specific machine. [25] (c.f. the forensic identification of typewriters.)

Recycling of waste

The resulting shredded paper can be recycled in a number of ways, including:

See also

Related Research Articles

A document management system (DMS) is usually a computerized system used to store, share, track and manage files or documents. Some systems include history tracking where a log of the various versions created and modified by different users is recorded. The term has some overlap with the concepts of content management systems. It is often viewed as a component of enterprise content management (ECM) systems and related to digital asset management, document imaging, workflow systems and records management systems.

<span class="mw-page-title-main">Computer Fraud and Abuse Act</span> 1986 United States cybersecurity law

The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

Medical privacy, or health privacy, is the practice of maintaining the security and confidentiality of patient records. It involves both the conversational discretion of health care providers and the security of medical records. The terms can also refer to the physical privacy of patients from other patients and providers while in a medical facility, and to modesty in medical settings. Modern concerns include the degree of disclosure to insurance companies, employers, and other third parties. The advent of electronic medical records (EMR) and patient care management systems (PCMS) have raised new concerns about privacy, balanced with efforts to reduce duplication of services and medical errors.

<span class="mw-page-title-main">Health Insurance Portability and Accountability Act</span> United States federal law concerning health information

The Health Insurance Portability and Accountability Act of 1996 is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996. It modernized the flow of healthcare information, stipulates how personally identifiable information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft, and addressed some limitations on healthcare insurance coverage. It generally prohibits healthcare providers and healthcare businesses, called covered entities, from disclosing protected information to anyone other than a patient and the patient's authorized representatives without their consent. With limited exceptions, it does not restrict patients from receiving information about themselves. It does not prohibit patients from voluntarily sharing their health information however they choose, nor does it require confidentiality where a patient discloses medical information to family members, friends, or other individuals not a part of a covered entity.

<span class="mw-page-title-main">Briquette</span> Compressed block of biomass used for fueling a fire

A briquette is a compressed block of coal dust or other combustible biomass material used for fuel and kindling to start a fire. The term derives from the French word brique, meaning brick.

Enterprise content management (ECM) extends the concept of content management by adding a timeline for each content item and, possibly, enforcing processes for its creation, approval, and distribution. Systems using ECM generally provide a secure repository for managed items, analog or digital. They also include one methods for importing content to bring manage new items, and several presentation methods to make items available for use. Although ECM content may be protected by digital rights management (DRM), it is not required. ECM is distinguished from general content management by its cognizance of the processes and procedures of the enterprise for which it is created.

Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.

Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore.

Information security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

<span class="mw-page-title-main">Burn bag</span> Bag used to contain classified items for burning

A burn bag is a security bag that holds sensitive or classified documents which are to be destroyed by fire or pulping after a certain period of time. The most common usage of burn bags is by government institutions, in the destruction of classified materials.

Physical information security is the intersection, the common ground between physical security and information security. It primarily concerns the protection of tangible information-related assets such as computer systems and storage media against physical, real-world threats such as unauthorized physical access, theft, fire and flood. It typically involves physical controls such as protective barriers and locks, uninterruptible power supplies, and shredders. Information security controls in the physical domain complement those in the logical domain, and procedural or administrative controls.

Protected health information (PHI) under U.S. law is any information about health status, provision of health care, or payment for health care that is created or collected by a Covered Entity, and can be linked to a specific individual. This is interpreted rather broadly and includes any part of a patient's medical record or payment history.

Information technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Revolution has led to organizations becoming increasingly dependent on information, information processing and especially IT. Various events or incidents that compromise IT in some way can therefore cause adverse impacts on the organization's business processes or mission, ranging from inconsequential to catastrophic in scale.

<span class="mw-page-title-main">Shred-it</span>

Shred-it is an information security solution provided by Stericycle Inc. Its services include document destruction, hard drive destruction, and specialty item shredding. The company is also known for its Annual Data Protection Report commissioned with Ipsos, a yearly survey of small business owners, C-level executives and consumers focusing on data protection and information security.

<span class="mw-page-title-main">IT risk management</span>

IT risk management is the application of risk management methods to information technology in order to manage IT risk, i.e.:

<span class="mw-page-title-main">DARPA Shredder Challenge 2011</span>

DARPA Shredder Challenge 2011 was a prize competition for exploring methods to reconstruct documents shredded by a variety of paper shredding techniques. The aim of the challenge was to "assess potential capabilities that could be used by the U.S. warfighters operating in war zones, but might also identify vulnerabilities to sensitive information that is protected by shredding practices throughout the U.S. national security community". The competition was sponsored by the Defense Advanced Research Projects Agency (DARPA), a research organization of the United States Department of Defense. Congress authorized DARPA to award cash prizes to further DARPA’s mission to sponsor revolutionary, high-payoff research that bridges the gap between fundamental discoveries and their use for national security.

The Health Information Technology for Economic and Clinical Health Act, abbreviated the HITECH Act, was enacted under Title XIII of the American Recovery and Reinvestment Act of 2009. Under the HITECH Act, the United States Department of Health and Human Services resolved to spend $25.9 billion to promote and expand the adoption of health information technology. The Washington Post reported the inclusion of "as much as $36.5 billion in spending to create a nationwide network of electronic health records." At the time it was enacted, it was considered "the most important piece of health care legislation to be passed in the last 20 to 30 years" and the "foundation for health care reform."

ISO/IEC 27040 is part of a growing family of International Standards published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in the area of security techniques; the standard is being developed by Subcommitee 27 (SC27) - IT Security techniques of the first Joint Technical Committee 1 of the ISO/IEC. A major element of SC27's program of work includes International Standards for information security management systems (ISMS), often referred to as the 'ISO/IEC 27000-series'.

<span class="mw-page-title-main">Machine Identification Code</span> Digital watermark which certain printers leave

A Machine Identification Code (MIC), also known as printer steganography, yellow dots, tracking dots or secret dots, is a digital watermark which certain color laser printers and copiers leave on every printed page, allowing identification of the device which was used to print a document and giving clues to the originator. Developed by Xerox and Canon in the mid-1980s, its existence became public only in 2004. In 2018, scientists developed privacy software to anonymize prints in order to support whistleblowers publishing their work.

Banknote processing is an automated process to check the security features and the fitness of banknotes in circulation, to count and sort them by denomination and to balance deposits. This processing of currency is performed by security printing companies, central banks, financial institutions and cash-in-transit (CiT) companies.

References

  1. Abbot Augustus Low Waste-paper receptacle February 2, 1909 Patent filing
  2. 1 2 3 4 Beyes, Timon; Holt, Robin; Pias, Claus (2019-12-17). The Oxford Handbook of Media, Technology, and Organization Studies. Oxford University Press. ISBN   978-0-19-253795-9.
  3. Woestendiek, John (February 10, 2002). "The Compleat History of SHREDDING". The Baltimore Sun . Archived from the original on 22 August 2016. Retrieved 22 February 2017.
  4. "Business notes office equipment". Time. 1988-02-29. Archived from the original on 2007-09-30. Retrieved 2009-07-27.
  5. "About Identity Theft". US FTC website. Archived from the original on 2009-05-20.
  6. "Fighting Back Against Identity Theft". US FTC website. Archived from the original on 2009-05-28.
  7. "Paper Shredder Safety Alert" (PDF) (Press release). U.S. Consumer Product Safety Commission. 11 June 2007. Archived (PDF) from the original on 22 November 2008.
  8. "Paper Shredder Danger". Snopes.com. 17 August 2006. Retrieved 2009-07-27.
  9. Rock, Michael (2023-11-14). "The Cutting-Edge Shred-Tech MDS 25GT Mobile Shredding Truck". Country Mile Shredding Services. Retrieved 2023-11-14.
  10. "New times, new storage media, new standards". HSM. Archived from the original on 23 February 2017. Retrieved 22 February 2017.
  11. "NSA/CSS EVALUATED PRODUCTS LIST for HIGH SECURITY CROSSCUT PAPER SHREDDERS" (PDF). Archived (PDF) from the original on 2017-02-23.
  12. "ISO/IEC 21964-1:2018: Information technology — Destruction of data carriers — Part 1: Principles and definitions". Geneva: International Organization for Standardization. May 2018. Retrieved 2020-07-28.
  13. "ISO/IEC 21964-2:2018: Information technology — Destruction of data carriers — Part 2: Requirements for equipment for destruction of data carriers". Geneva: International Organization for Standardization. August 2018. Retrieved 2020-07-28.
  14. "ISO/IEC 21964-3:2018: Information technology — Destruction of data carriers — Part 3: Process of destruction of data carriers". Geneva: International Organization for Standardization. August 2018. Retrieved 2020-07-28.
  15. 1 2 Walsh, Lawrence (August 4, 1993). "Vol. I: Investigations and prosecutions". Final report of the independent counsel for Iran/Contra matters. Independent Council for Iran/Contra Matters. Archived from the original on 17 April 2009. Retrieved 15 May 2009.
  16. "Interim Report March 2005" (PDF). Archived from the original (PDF) on 2009-08-05. Retrieved 2009-07-27.
  17. Eizenstat, Stuart (2003). Imperfect Justice . New York: PublicAffairs. ISBN   1-58648-110-X. Page 94
  18. Eizenstat p 94, 95
  19. Eizenstat p 95
  20. Swiss parliament: Parliamentary Initiative 96.434: Bundesbeschluss betreffend die historische und rechtliche Untersuchung des Schicksals der infolge der nationalsozialistischen Herrschaft in die Schweiz gelangten Vermögenswerte Archived 2008-02-26 at the Wayback Machine ; in German. Entry in force December 14, 1996. This edict was the legal foundation of the Bergier commission, constituted on December 19, 1996. Articles 4, 5, and 7 made the willful destruction or withholding of documents relating to orphaned assets illegal. On the dates given, see Chronology: Switzerland in World War II — Detailed Overview of the years 1994-1996 Archived 2006-07-18 at the Wayback Machine . URLs last accessed 2006-10-30.
  21. Dānishjūyān-i Musalmān-i Payraw-i Khaṭṭ-i Imām, Dānishjūyan-i Musalmān-i Payraw-i Khaṭṭ-i Imām (1980). Documents from the U.S. Espionage Den. Published by Muslim Students Following the Line of the Iman. Archived from the original on 2013-10-18.
  22. "National Association for Information Destruction". naidonline.org. Archived from the original on 2009-08-05.
  23. Heingartner, Douglas (2003-07-17). "Back Together Again". New York Times. Archived from the original on 2008-03-05. Retrieved 2007-01-03.
  24. "Darpa Shredder Challenge". Darpa.mil. U S. Department of Defense. Archived from the original on 25 August 2016. Retrieved 27 September 2016.
  25. Jack Brassil (2002-08-02). "Tracing the Source of a Shredded Document" (PDF). Hewlett-Packard. Archived (PDF) from the original on 2006-10-29. Retrieved 2007-01-03.{{cite journal}}: Cite journal requires |journal= (help)
  26. bOnline LTD. "Wilki Engineering manufactures bespoke shredding machines & balers". wilkiengineering.co.uk.