ARMS employs all reasonable means to guarantee the security of shredded materials, stored documents, and other physical and digital assets containing sensitive information. Our procedures are designed to provide you with the highest level of security and compliance to applicable laws including:
HIPAA-HITECH – The Health Insurance Portability and Accountability Act governs the secure electronic transmission, storage and disposal of patient information.
SOX – The Sarbanes Oxley Act protects shareholders and the public from accounting errors and fraudulent practices in the enterprise.
GLB – The Gramm-Leach Bliley Act requires financial institutions to develop precautions to ensure the security and confidentiality of customer information. This includes secure storage, disposal, and sharing of confidential information.
FACTA – The Fair and Accurate Credit Transactions Act combats consumer fraud and related crimes, including identity theft. Specifically, the act requires the destruction of papers containing consumer information.
All of ARMS’s concrete and steel storage facilities are electronically monitored 24/7/365. We store data in a four hour fire-rated, climate-controlled vault equipped with heat and smoke sensors and fire suppression systems.
We take the security of your records and information very seriously with precautions such as:
- Records Center constructed of steel and concrete
- Media Vault constructed of concrete-filled block and reinforced Spancrete ceiling
- Fire detection and sprinkler system
- Engineered Halon 1301 gas fire detection / suppression system within our Media Vault
- Climate and humidity controlled
- Electronically monitored facility, including video monitoring, motion detection, and employee entry coding and logging
- Data materials are placed in the Media Vault immediately upon arrival
- Our facility remains locked during regular business hours. All visitors must be scheduled in advance and provide government-issued ID prior to entry.
- Visitors must sign a confidentiality form and register in our Facility Access Log. They are escorted by an ARMS representative.
- Authorized and verified release, access, or destruction of all materials
COMPUTER SYSTEMS SECURITY
Access to our software and data inventory systems is limited to ARMS employees with network, operating system and application passwords. Our software allows for additional limited access to container inventory only by approved users.