This invention relates generally to the collection and confidential disposal of items and more particularly, to a method of improving the security of the collection and disposal process.
The issue of protecting personal and financial information has become more critical in recent years. For example, personal and financial information must be protected from unauthorized disclosure under requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Gramm/Leach/Bliley Financial Modernization Act of 1999 (GLB), the Video Privacy Protection Act (18 USC §2710), the Federal Education Rights and Privacy Act (“FERPA” 20 U.S.C. 1232g), as well as 42 C.F.R. §2.16. More general rights to personal privacy are guaranteed by the Fourth Amendment to the Constitution of the United States as well as various State Constitutions and statutes. In addition, businesses have vast amounts of internal proprietary information that must be kept confidential for competitive and other reasons. Although processes of collecting and disposing of paper are well known, emerging requirements have made many such processes obsolete. For example, with many processes, paper is simply collected for recycling. In other processes, paper containing confidential records and other proprietary information is collected in large plastic tubs that may or may not be equipped with simple locks, or canvas bags suspended inside of decorative cabinets. This paper is dumped from these tubs and bags, visually sorted, often by multiple personnel, according to ease of shredding and value in recycling, shredded, and finally recycled.
Some existing protocols call for the accumulation of used paper in non-secure holders before being transferred to relatively large, centrally located collection tubs or bags. In this process, confidential papers remain open to view and are susceptible to being lost or otherwise compromised before being transferred to the larger tubs.
There are other examples where the protection of corporate and personal information has become more critical in recent years. For example, containers for prescription pharmaceuticals have labels that contain proprietary patient information and further, those labels are not readily separable from the respective containers. Therefore, pharmacies must dispose of such used containers of in a secure manner. In another example, packaging of pharmaceuticals is often manufactured in excess of their need; and such packaging must be disposed of in a secure manner.
Thus, there is a need to improve the security of the methods used to process paper and plastic items that contain sensitive information requiring secure disposal to insure individual privacy as well as the security of other proprietary or otherwise private information, from the time the items are designated for secure disposal until they are destroyed, for example, by shredding, incineration or other processes.
With the present invention, tamper-evident bins having self-locking closures are locatable at individual workstations. Confidential records or other confidential items requiring secure disposal are inserted into the bins as necessary. While secured within the tamper-evident bins, such confidential items remain securely out of sight; and unauthorized removal would be evidenced by damage to the tamper-evident bins. Therefore, the security of the collection process is improved.
Further, the bins with the confidential items therein are collected and replaced with new tamper-evident bins without ever being opened. Unopened, tamper-evident bins containing confidential items are processed through machinery that simultaneously destroys both the bins and the confidential items within. Since the tamper-evident bins are never opened during the paper collection, transportation, and destruction processes, all opportunities for confidential records to be lost or viewed by unauthorized parties are eliminated.
In addition, each tamper-evident bin can be labeled with a unique identifying code that permits it to be tracked at every step from its placement in service until its destruction. Thus, the disposal method of the present invention is substantially more secure than any known method.
These and other objects and advantages of the present invention will become more readily apparent during the following detailed description taken in conjunction with the drawings herein.
The confidential items collection and disposal process of the present invention has several different embodiments.
Basic Service
As with many item collection and disposal services, a user is able to select different levels of service. One embodiment of the present invention contemplates a collection and disposal process that is initiated substantially by the user on an as-needed basis.
The flowchart of
In response to a pickup request, the item collection and disposal service generates (step 206) various work orders and pickup routes. The work order and pickup routes can be printed and given to a service person. The service person then travels (step 208) to a first, or next, customer location to retrieve the old tamper-evident bin (step 210). The service person then determines via the work order (step 217) whether that was the last bin; and if not, the service person repeats the above process for the other bins at the current location. If the work order identifies more locations (step 218) for this route, then the service person travels to the next location (step 208), and the process of steps 208-217 is repeated.
As part of retrieving the old bin, the service person is able to observe the condition of the old bin. If the old bin is torn, it is highly likely that there has been an unauthorized entry into the old bin. Even though the self-locking closure and tamper-evident bin do not prohibit unauthorized entry into the bin, by visual inspection, one is readily able to detect damage to the bin and thus, determine whether there has been an entry into the bin. Therefore, the Basic Service has a substantially higher level of security than nontamper-evident collection bins, which are most often used for item collection.
Second Chance Service
A customer has an option of delaying the destruction of a collected bin. With some customers, for example, banks, it is often helpful to have the ability to retrieve items that have inadvertently been thrown away. Such customers can instruct that the destruction of certain bins, identified as second chance bins, be delayed for a period of time, for example, one month, after being collected. Therefore, during that period, they are able to retrieve items that were erroneously placed in the bin. At the end of the one month period, the customer is notified of the expiration of the one month period and is asked whether the stored second chance bins are to be destroyed or stored for a further time period.
Therefore, in continuing the Basic Service, the service person travels to the disposal facility and the old tamper-evident bins are unloaded. The incoming second chance bins are identified and stored in accordance with a customer's instructions (step 220). Thereafter, all second-chance bins and recently collected bins that are currently scheduled for destruction are collected and destroyed (step 222) without being opened by either a customer or service person. It should be noted that with each step of the process, the person handling the tamper-evident bin is able to check the integrity of the bin and thus, determine whether the contents of the bin remain secure.
A major advantage of the Basic Service is that the tamper-evident bins are never opened, and confidential records cannot be viewed during the collection and disposal process. No one can see what was thrown away, and the confidentiality of records is preserved. A second advantage is that the tamper-evident bins show physical evidence of a bin being opened, for example, a tearing of a wall, joint, or self-locking closure. Once observed, an investigation can be initiated as whether the opening was authorized. Such evidence of the bin being opened provides more security than open collection bins or bins having locks that are easily defeated without leaving evidence of tampering. A third advantage is that the second chance temporary storage provides an opportunity to be sure that records are not too hastily destroyed.
Scheduled Service
Another embodiment of the present invention contemplates an item collection and disposal process that occurs according to a regular schedule. Within this Scheduled Service, the tamper-evident bins within a particular location are placed at workstations, for example, individual offices, desks or work tables, copy rooms, mail rooms, etc. Further, a schedule for bin pickup is created for each workstation, for example, some bins are scheduled for pickup once a day, while other bins are scheduled for pickup once a week. Referring to
A service person then travels (step 238) to the next location according to the pickup route and goes to a specific workstation (step 240) as instructed by the work order. Referring to
The identity code for the new replacement tamper-evident bin and its location is then captured or written down (step 248), and that identity code becomes the valid bin identity code now expected to be located at the current workstation. If this is not the last workstation (step 250) with a bin scheduled for pickup, the service person then proceeds to the other workstations at the current location as instructed by the work order. Thus, the process of steps 240-250 is repeated until the tamper-evident bins at all of the workstations scheduled for pickup at the current location have been replaced. The service person then travels to the next customer location (step 238) as determined by the pickup route; and the process of steps 238-252 is repeated until the last customer location for the pickup route has been serviced.
Once the service route is complete, the service person travels to the disposal facility where two processes occur. First, the recorded identity codes of the old bins are compared (step 254) with the identity codes in the work order. Thus, the disposal service provider is able to determine whether the bins that were picked up are the same ones that were previously placed at the workstation. If there is a discrepancy between the recorded identity codes and identity codes in the work order, an error report is generated (step 255).
Second, the physical integrity of the incoming tamper-evident bins is checked. Again, while an unauthorized entry into the tamper-evident bins cannot be prevented, one can easily determine whether there has been an improper switching of bins or an unauthorized access into a bin.
In a manner similar to that described with respect to
The Scheduled Service has the same advantages of the Basic Service, that is, first, the tamper-evident bins are never opened; and confidential records cannot be viewed during the collection and disposal process. Second, tamper-evident bins leave evidence of the bin being opened; and third, the second chance temporary storage provides an opportunity to be sure that records are not prematurely destroyed. In addition, the scheduled service provides various scheduling options in which, at the highest level, each bin is individually scheduled for automatic pickup and destruction. Further, the Scheduled Service can include an option to uniquely identify each tamper-evident bin with an identity code that allows the bin to be tracked from the time that it is put into service until the time of its destruction. The use and tracking of identity codes permits a determination of whether there has been an unauthorized removal, replacement or opening of a tamper-evident bin. Thus, with the processes described herein, the security of the confidential items collection and disposal process is substantially improved.
Data Collection
One aspect of the embodiment of
In a further embodiment, the capturing of identity codes can be automated by the service person collecting the bin using a data entry or collection device 101 such as that depicted in
The reader 104 is used to read coded indicia located on a bin or associated with a location, for example, a coded label attached to an object, for example, a desk, a door edge, a door frame, etc. The identity code is unique to a particular tamper-evident bin or location. The reader 104 interfaces with the computer 102, and the computer 102 executes an operational routine to perform various data handling functions including presenting data to the output device 106. Although not expressly depicted, the computer 102 can be remotely linked to a central computer via, for example, a wireless network connection. The printer/display device 106 provides messages and other information to a user and such information is usually generated under the control of the operational routine running on the computer 102.
The work orders and pickup routes can be downloaded to the computer 102 and displayed to the service person via the output device 106. One or more work orders can be stored in the computer 102 and include the identity of the pickup location and the identity codes of each of the bins expected to be encountered at the pickup location. Further, the error report described at step 255 can be generated by the computer 102 and used by the service person collecting the bin or by another person within the service provider.
Tamper-Evident Bin
A layout of an exemplary tamper-evident bin useful in various embodiments of the present invention is illustrated in
The tamper-evident bin of
The view depicted in
Glue or adhesive is placed on the exposed portion of the tab 306, and the panels 314, 336, 308 are folded as a unit along line B-B. In this manner, the tab 306 is affixed to a portion of the panel 308, which becomes adjacent thereto due to the folding along the line B-B. Glue or adhesive is now applied to the exposed portion of the tab 320, and the panels 312, 318, 302 are folded as a unit along the line A-A. In this manner, the tab 304 is affixed to a portion of the panel 302, which becomes adjacent thereto due to the folding along line B-B; and a portion of the panel 318 becomes affixed to the tab 320.
As a result of this preassembly, the tamper-evident bin 300 is substantially flat but has a self-assembling and automatically locking bottom. Therefore, when the user separates the two folded over halves of the bin, the glued panels automatically create a secure bottom leaving only assembly of the top tabs and panels for the user.
The layout and scoring of the bin illustrated in
To assemble the self-locking closure of the lid, butterfly tabs 324 and 326 are folded over the flap 334, which is then inserted through the opening of lip 316 to provide a fully assembled tamper-evident bin 300 as illustrated in
In use, the tamper-evident bin 300 is often placed under a desk or table 301, and a user can easily insert paper through the slot 328, thereby collecting the paper in the bin 300. The insertion slot 328 has several beneficial features. First, the slot 328 is not a full cutout but, instead, a flap 329 is hinged along a bottom edge of the slot 328 and prevents papers from inadvertently sliding back out of the slot 328. Second, the insertion slot 328 is provided in an endwall 340 of the bin 300, which requires that paper be inserted in a horizontal orientation. Therefore, paper can be inserted into the bin 300 without having to move the bin and without interference with the horizontal surface. Further, placing the insertion slot 328 near the top of the endwall greatly facilitates horizontal stacking of the paper over the full height of the bin.
With known box designs having a paper insertion slot in the top surface of the box, inserted papers tend to remain vertically oriented and often clog the paper insertion path below the slot, thereby preventing the insertion of more paper. Further, with a top surface insertion slot, the requirement of having to reorient the paper inside the box for proper stacking substantially limits the volume of paper that can be collected in the box.
While the invention has been illustrated by the description of several exemplary embodiments and while the embodiments have been described in considerable detail, there is no intention to neither restrict nor in anyway limit the scope of the appended claims to such detail. Additional advantages and modifications will readily appear to those who are skilled in the art. For example, in
The identity codes on the tamper-evident bins and workstations described herein are either man-readable codes and/or machine readable codes, for example, bar codes. As will be appreciated, in alternative embodiments, other functionally equivalent methods and techniques readily exist that can be used as well, for example, RF identification tags, etc.
One example of the construction of a cardboard tamper-evident bin that is preassembled and has a self-locking closure is described herein. As will be appreciated, other materials and constructions as well as other designs for a self-locking closure can be used. Further, while the bin is described as being made of cardboard, in alternative embodiments, other materials that are compatible with a paper destruction or shredding process may be used. For example, if the destroyed paper is not to be recycled, the tamper-evident bin can be made of a plastic material that can be incinerated unopened with the confidential records and paper inside.
The Basic Service as described herein does not include the use of identity codes on the tamper-evident bins; however, as will be appreciated, in alternative embodiments, the use of identity codes can be an option in association with the Basis Service.
Therefore, the invention in its broadest aspects is not limited to the specific details shown and described. Consequently, departures may be made from the details described herein without departing from the spirit and scope of the claims, which follow.
Number | Date | Country | |
---|---|---|---|
60498631 | Aug 2003 | US |