Shredding is the most important step in keeping your information secure in both the workplace and at home. Eliminating information in a timely manner limits your liability and protects proprietary information.

When you consider how much it can cost for one of your employees to do this task, you’ll find outsourcing to a professional document destruction company will save you time and money.

American Document Destruction is not limited to only paper and files. We destroy hard drives, CDs, video tapes, x-rays, casino chips and other types of electronic media as well.

There is no need to remove staples, paperclips, ACCO fasteners, binder clips or small spiral bindings. We do request that you do not put 3 ring binders in the material to be destroyed.

All shredded paper material is recycled, as well as other materials that can be safely recycled. Other types of materials that cannot be recycled are disposed of in an environmentally safe manner.

Absolutely. We offer on site shredding services as well as drop off shredding services to our location. Both offer the ability to witness the destruction of your documents.

We provide a Certificate of Destruction every time records have been destroyed for clients to keep for their records.

NAID is the non profit trade organization of the secure destruction industry. It was founded in 1994 and their mission is to promote the proper destruction of all forms of discarded media containing personal or proprietary information.
NAID is the non-profit organization that sets the standards for the document destruction industry. NAID certification verifies the shredding organization is adhering to strict security protocols. When NAID certifies an organization they undergo an audit of their hiring practices, security procedures, equipment, security cameras, service vehicles and facilities. These are some of the security specifications that NAID auditors verify:
– All employees undergo local and federal background checks prior to hiring and throughout the course of employment.

– Written security procedures are followed

– Access to materials is restricted at all times.

– Containers and vehicles protect information from unauthorized access at all times during transport and processing.

– There is an audit trail, including CCTV image capture and retention, and a thorough, documented chain of custody.

More than half of NAID certification audits are unannounced, “surprise” audits. NAID certified information destruction companies operate every day with the knowledge that they could be audited without notice.

Please refer to for more information.

Laws and


The increase in IDENTITY THEFT crime has caused the enactment of the laws described below in order to protect individuals and businesses. The essence of these laws is to protect from the crime of IDENTITY THEFT by securing private personal information. Some states have also enacted laws, including the states of California, Wisconsin, and Georgia. One of the first and most well known of the laws is HIPAA, which was enacted to protect the privacy of patient information.


Health Insurance Portability and Accountability Act (HIPAA), was enacted in 1996 and includes provisions intended to safeguard the privacy of patient health records. HIPAA is a significant piece of legislation with onerous penalties. For a full text of the SUMMARY OF THE HIPAA PRIVACY RULE from the Department of Human Services, available online go to See page 14 of this document in regards to shredding information.


The Fair and Accurate Credit Transactions Act of 2003 also known as the FACT Act was signed into law on December 4, 2003. The Act amends the Fair Credit Reporting Act (“FCRA”). The Act contains a number of provisions intended to combat IDENTITY THEFT and consumer fraud and related crimes. Specifically, the act requires the destruction of PAPERS CONTAINING CONSUMER INFORMATION. Virtually every business or organization is bound by this law.


Gramm Leach Bliley (GLB) is another federal law with a much broader scope than HIPAA. This law was designed to compel financial institutions to “respect the privacy of its customers and to protect the security and confidentiality of those customers’ non-public personal information.” This language suggests that paper documents containing such personal information should also be protected when in use and safely destroyed when no longer current and usable.