Paper shredder with built-in wastebasketInner view of a paper shredder with motorDetail of a cross-cut paper shredder
Apaper shredder is a mechanical device used to cut sheets ofpaper into either strips or fine particles. Government organizations, businesses, and private individuals use shredders to destroy private,confidential, or otherwise sensitive documents.
The first paper shredder is credited toinventorAbbot Augustus Low, whosepatent was filed on February 2, 1909.[1] His invention was never manufactured because he died prematurely soon after filing the patent.[2]
Adolf Ehinger's paper shredder, based on a hand-crankpasta maker, was the first to be manufactured in 1935 in Germany. Supposedly he created a shredding machine to shred hisanti-Nazi leaflets to avoid the inquiries of the authorities.[3] Ehinger later marketed and began selling his patented shredders to government agencies and financial institutions switching from hand-crank shredders to electric motor shredders.[2] Ehinger's company, EBA Maschinenfabrik, manufactured the first cross-cut paper shredders in 1959 and continues to do so today as EBA Krug & Priester GmbH & Co. inBalingen.
With a shift from paper to digital document production, modern industrial shredders can process non-paper media, such ascredit cards andCDs, and destroy thousands of documents in under one minute.[2]
After ColonelOliver North toldCongress that he used a Schleicher cross-cut model to shredIran-Contra documents, sales increased nearly 20 percent in 1987.[4]
Paper shredders became more popular among U.S. citizens withprivacy concerns after the 1988Supreme Court decision inCalifornia v. Greenwood; in which the Supreme Court of the United States held that theFourth Amendment does not prohibit the warrantless search and seizure of garbage left for collection outside of a home. Anti-burning laws also resulted in increased demand for paper shredding.
More recently, concerns aboutidentity theft have driven increased personal use of paper shredders,[5] with the US Federal Trade Commission recommending that individuals shred financial documents before disposal.[6]
Shredders range in size and price. Small, inexpensive units are designed for a certain number of pages. Large, expensive units are used by commercial shredding services and can shred millions of documents per hour. While the smallest shredders may be hand-cranked, most shredders are electric.
Over time, new features were added to improve user experience, including rejecting paper over capacity to avoid jams, and other safety features to reduce risk.[7][8] Some shredders designed for use in shared workspaces or department copy rooms have noise reduction.[citation needed]
Large organizations or shredding services sometimes use "mobile shredding trucks", typically constructed as abox truck with an industrial-size paper shredder mounted inside with storage space for shredded materials. Such units may also provide the shredding ofCDs,DVDs,hard drives,credit cards, anduniforms, among other things.[9]
A 'shredding kiosk' is anautomated retail machine (orkiosk) that allows public access to a commercial or industrial-capacity paper shredder. This is an alternative solution to the use of a personal or business paper shredder, where the public can use a faster and more powerful shredder, paying for each shredding event rather than purchasing shredding equipment.[citation needed]
Some companiesoutsource their shredding to 'shredding services'. These companies either shred on-site, with mobile shredder trucks or have off-site shredding facilities. Documents slated for shredding are often placed in locked bins that are emptied periodically.
As well as size and capacity, shredders are classified according to the method they use; and the size and shape of the shreds they produce.
Strip-cut shredders use rotating knives to cut narrow strips as long as the original sheet of paper.
Cross-cut orconfetti-cut shredders use two contra-rotating drums to cut rectangular, parallelogram, orlozenge (diamond-shaped) shreds.
Particle-cut orMicro-cut shredders create tiny square or circular pieces.
Cardboard shredders are designed specifically to shred corrugated material into either strips or a mesh pallet.
Disintegrators andgranulators repeatedly cut the paper at random with rotating knives in a drum until the particles are small enough to pass through a fine mesh.
The previousDIN 32757 standard has now been replaced with DIN 66399. This is complex,[10] but can be summarized as below:
Level P-1 = ≤ 2000 mm2 particles or ≤ 12 mm wide strips of any length (For shredding general internal documents such as instructions, forms, expired notices)
Level P-2 = ≤ 800 mm2 particles or ≤ 6 mm wide strips of any length
Level P-3 = ≤ 320 mm2 particles or ≤ 2 mm wide strips of any length (For highly sensitive documents and personal data subject to high protection requirements, purchase order, order confirmations or delivery notes with address data)
Level P-4 = ≤ 160 mm2 particles with width ≤ 6 mm (Particularly sensitive and confidential data, working documents, customer/client data, invoices, private tax and financial documents)
Level P-5 = ≤ 30 mm2 particles with width ≤ 2 mm (Data that must be kept secret, balance sheets and profit-and-loss, strategy papers, design and engineering documents, personal data)
Level P-6 = ≤ 10 mm2 particles with width ≤ 1 mm (Secret high-security data, patents, research and development documents)
Level P-7 = ≤ 5 mm2 particles with width ≤ 1 mm (Top secret, highly classified data for the military, embassies, intelligence services)
Navigating the complex landscape of federal regulations for data protection and document destruction is crucial for businesses in maintaining compliance and avoiding penalties. Understanding these regulations ensures that sensitive information, whether in digital or physical form, is handled securely.
Health Insurance Portability and Accountability Act (HIPAA) - 1996 Established by the federal government, HIPAA mandates businesses to implement safeguards for protecting health information. Non-compliance can result in substantial fines. This act emphasizes the importance of handling medical records with utmost confidentiality and security. More information about HIPAA can be found on theCDC's website.
Computer Fraud and Abuse Act (CFAA) - 1984 The CFAA regulates how businesses manage sensitive data on digital platforms. It underscores that simply deleting files from a hard drive doesn't guarantee data security. To ensure complete data destruction, the physical destruction of hard drive platters is necessary. Detailed information on CFAA is available at theU.S. Department of Justice website.
Gramm-Leach-Bliley Act (GLBA) - The GLBA sets forth guidelines for financial institutions on the disposal and management of financial records. This act ensures that financial documents are handled and destroyed in a manner that prevents unauthorized access and misuse. TheFederal Trade Commission provides further details.
Legal Document Protection Across 32 States and Puerto Rico - A majority of states and Puerto Rico have enacted laws to safeguard identifying information managed by law firms, businesses, and government entities. These laws dictate the storage duration, handling, and destruction methods for legal documents, requiring them to be rendered unreadable or undecipherable. New York’s specific regulation can be explored atN.Y. Gen. Bus. Law § 399-H.
Sarbanes-Oxley Act - 2002 This act governs the retention period for business records before destruction is permissible. It's vital for businesses to be aware of these retention times to ensure compliance. For further guidance, refer to theofficial bill text.
Fair and Accurate Credit Transactions Act (FACTA) - An amendment to the Fair Credit Report Act, FACTA protects consumers from identity theft by providing guidelines on the proper disposal and protection of customer data, including account numbers and social security numbers. TheFTC’s website offers comprehensive information on FACTA.
Understanding and adhering to these federal regulations is vital for businesses to ensure the secure handling and destruction of sensitive data, thereby safeguarding against breaches and maintaining compliance. Information provided byCountry Mile Document Destruction.
There have been many instances where it is alleged that documents have been improperly or illegally destroyed by shredding, including:
Oliver North shredded documents relating to theIran–Contra affair between November 21 and November 25, 1986.[15] During the trial, North testified that on November 21, 22, or 24, he witnessedJohn Poindexter destroy what may have been the only signed copy of a presidential covert action finding that sought to authorize CIA participation in the November 1985Hawk missile shipment to Iran.[15]
According to the report of thePaul Volcker Committee, between April and December 2004,Kofi Annan'sChef de Cabinet, Iqbal Riza, authorized thousands of United Nations documents shredded, including the entire chronological files of theOil-for-Food Programme during the years 1997 through 1999.[16]
TheUnion Bank of Switzerland used paper shredders to destroy evidence that their company owned property stolen fromJews during theHolocaust by theNazi government. The shredding was disclosed to the public through the work ofChristoph Meili, a security guard working at the bank who happened to wander by a room where the shredding was taking place. Also in the shredding room were books from the GermanReichsbank.[17] They listed stock accounts for companies involved in the holocaust, includingBASF,Degussa, andDegesch.[18] They also listed real-estate records for Berlin properties that had been forcibly taken by the Nazis, placed in Swiss accounts, and then claimed to be owned by UBS.[19] Destruction of such documents was a violation of Swiss laws.[20]
After theIranian Revolution and the takeover of the U.S. embassy inTehran in 1979, Iranians enlisted local carpet weavers who reconstructed the pieces by hand. The recovered documents would be later released by the Iranian government in a series of books called "Documents from the US espionage Den".[21] The US government subsequently improved its shredding techniques by adding pulverizing, pulping, and chemical decomposition protocols.
Modern computer technology considerably speeds up the process of reassembling shredded documents. The strips are scanned on both sides, and then a computer determines how the strips should be put together. Robert Johnson of the National Association for Information Destruction[22] has stated that there is a huge demand for document reconstruction. Several companies offer commercial document reconstruction services. For maximum security, documents should be shredded so that the words of the document go through the shredder horizontally (i.e. perpendicular to the blades). Many of the documents in theEnron Accounting scandals were fed through the shredder the wrong way, making them easier to reassemble.
In 2003, there was an effort underway to recover the shredded archives of theStasi, the East German secret police.[23] There are "millions of shreds of paper that panicked Stasi officials threw into garbage bags during the regime's final days in the fall of 1989". As it took three dozen people six years to reconstruct 300 of the 16,000 bags, the Fraunhofer-IPK institute has developed theStasi-Schnipselmaschine ('Stasi snippet machine') for computerized reconstruction and is testing it in a pilot project.
TheDARPA Shredder Challenge 2011 called upon computer scientists, puzzle enthusiasts, and anyone else with an interest in solving complex problems, to compete for up to $50,000 by piecing together a series of shredded documents. The Shredder Challenge consisted of five separate puzzles in which the number of documents, the document subject matter and the method of shredding were varied to present challenges of increasing difficulty. To complete each problem, participants were required to provide the answer to a puzzle embedded in the content of the reconstructed document. The overall prizewinner and prize awarded was dependent on the number and difficulty of the problems solved.DARPA declared a winner on December 2, 2011 (the winning entry was submitted 33 days after the challenge began) – the winner was "All Your Shreds Are Belong To U.S." using a combination system that used automated sorting to pick the best fragment combinations to be reviewed by humans.[24]
The individual shredder that was used to destroy a given document may sometimes be offorensic interest. Shredders display certain device-specific characteristics, "fingerprints", like the exact spacing of the blades, the degree and pattern of their wear. By closely examining the shredded material, the minute variations of size of the paper strips and the microscopic marks on their edges may be able to be linked to a specific machine.[25] (c.f. theforensic identification of typewriters.)
The resulting shredded paper can be recycled in a number of ways, including:
Animal bedding — To produce a warm and comfortable bed for animals[26]
Void fill and packaging — Void fill for the transportation of goods
Briquettes — an alternative to non-renewable fuels
Insulation — Shredded newsprint mixed with flame-retardant chemicals and glue to create a sprayable insulation material for wall interiors and the underside of roofing[citation needed]
^"Paper Shredder Safety Alert"(PDF) (Press release). U.S. Consumer Product Safety Commission. 11 June 2007.Archived(PDF) from the original on 22 November 2008.
^abWalsh, Lawrence (August 4, 1993)."Vol. I: Investigations and prosecutions".Final report of the independent counsel for Iran/Contra matters. Independent Council for Iran/Contra Matters.Archived from the original on 17 April 2009. Retrieved15 May 2009.
^Dānishjūyān-i Musalmān-i Payraw-i Khaṭṭ-i Imām, Dānishjūyan-i Musalmān-i Payraw-i Khaṭṭ-i Imām (1980).Documents from the U.S. Espionage Den. Published by Muslim Students Following the Line of the Iman.Archived from the original on 2013-10-18.