Secure disposal of hardcopy materials

ISO/IEC 27018 Annex A.11.7 requires you to securely destroy hardcopy materials containing PII once they are no longer needed. To operationalize it, you need a documented retention-and-destruction workflow, approved destruction methods (for in-house and third-party services), chain-of-custody controls, and auditable evidence that destruction occurs on schedule.

Key takeaways:

  • “No longer needed” must be defined through retention triggers and documented disposal decisions, not informal practice.
  • Secure destruction means controlled collection, locked storage before destruction, and verified destruction (in-house logs or third-party certificates).
  • Audits focus on scope (where PII exists), consistency (everyone follows the same process), and evidence (proof of destruction).

“Secure disposal of hardcopy materials” sounds simple until you have to prove it under audit: what counts as hardcopy PII, where it lives, how long it is kept, who is allowed to destroy it, and what evidence demonstrates the destruction was secure and timely.

ISO/IEC 27018:2019 Annex A.11.7 targets a common gap for cloud service providers acting as PII processors: paper artifacts are often created outside core production systems (support tickets printed for troubleshooting, HR and onboarding packets, visitor logs, handwritten notes from incident bridges, courier receipts, printed screenshots). These materials can bypass your normal logical access controls and deletion tooling.

This requirement page is written for a Compliance Officer, CCO, or GRC lead who needs an operator-ready blueprint: scope and applicability, a step-by-step process, what to retain as audit evidence, and the failure modes that commonly cause nonconformities. The goal is to leave you with a disposal program that is easy for staff to follow and easy for auditors to verify.

Regulatory text

Requirement (verbatim): “Hardcopy materials containing PII shall be securely destroyed when they are no longer needed.” 1

What the operator must do:
You must (1) identify hardcopy materials that contain PII, (2) define when they are “no longer needed” through retention rules and business triggers, and (3) ensure destruction is secure, controlled, and verifiable. “Securely destroyed” is not just a shredder in a hallway; it is a controlled process that prevents loss, theft, or reconstruction prior to and during destruction, and leaves an audit trail after.

Plain-English interpretation

If your organization prints or receives paper that includes PII, you cannot keep it indefinitely “just in case.” Once the business purpose and retention requirement ends, you must destroy it using an approved method (commonly shredding) and be able to prove you did so. 1

Who it applies to (entity and operational context)

Entity scope: Cloud service providers acting as PII processors. 1

Operational scope (where this shows up in real programs):

  • Customer support and operations: printed cases, notes, call logs, address details, identity verification artifacts.
  • Security and incident response: printed runbooks with customer identifiers, incident bridge notes, printed screenshots.
  • HR and physical security: visitor logs, badge requests, background check packets, I-9 equivalents where applicable.
  • Finance and procurement: invoices or contracts that contain contact details, banking details, or individual identifiers.
  • Data center or facilities operations: shipping manifests, RMA forms, courier paperwork containing names/addresses.

Third-party risk angle: If a third party performs shredding or offsite destruction, they become part of your control chain. You need contractual requirements, oversight, and evidence collection that fits your audit model.

What you actually need to do (step-by-step)

1) Define “hardcopy materials containing PII” for your environment

Create a short, usable definition in your policy and training materials. Include:

  • Examples (support printouts, visitor logs, onboarding paperwork).
  • Clear inclusion rules (any paper with names plus identifiers; any paper containing government IDs, contact details, biometrics, etc.).
  • Clear exclusion rules (blank templates, anonymized materials).

Operator tip: Add a one-page “Hardcopy PII decision guide” so staff do not guess.

2) Map where hardcopy PII exists (don’t overcomplicate it)

Build and maintain a simple inventory of locations and workflows:

  • Departments that print or receive PII.
  • Physical locations (office floors, mailrooms, reception, secure rooms).
  • Storage points (locked cabinets, shred consoles, boxes awaiting pickup).
  • Special cases (remote workers printing at home; executive assistants; satellite offices).

Output: a “Hardcopy PII Locations & Workflows Register” owned by Compliance/GRC with departmental points of contact.

3) Set retention triggers: define “no longer needed”

This is the crux. “No longer needed” must be operationalized as explicit triggers, for example:

  • Ticket closure + no open dispute.
  • Completion of onboarding steps.
  • End of a defined legal/contractual retention requirement (where applicable).
  • Completion of an audit or investigation.

Your retention standard should state:

  • Who sets retention periods (Legal/Privacy + Compliance).
  • Who approves exceptions (named role, documented approval).
  • How to handle holds (litigation/regulatory hold; investigation hold).

Keep it implementable: staff need a trigger and an action, not a policy essay.

4) Standardize approved destruction methods and handling controls

Document what “secure destruction” means in your program. Include:

Collection and interim storage (before destruction)

  • Use locked shred bins/consoles in designated areas.
  • Prohibit open desk-side “to shred” piles.
  • Restrict access to interim storage to authorized personnel.

Destruction methods

  • In-house shredding (define acceptable shredder type for sensitivity; define who can operate it).
  • Third-party shredding (offsite or mobile shredding) with chain-of-custody and proof of destruction.
  • Special media embedded in hardcopy (e.g., printed labels with barcodes linked to identities): treat as PII.

Why auditors care: most failures happen before the shred event (documents left in trays, misrouted mail, bins accessible to visitors).

5) Implement chain-of-custody for high-risk streams

Not every paper flow needs the same rigor, but you need a defensible model. Create a tiering approach:

  • Standard hardcopy PII: place in locked consoles; scheduled pickup; destruction logged.
  • High-risk hardcopy PII (IDs, financial account data, health-related data if applicable): sealed envelopes/containers, controlled handoff, witness option, tighter logging.

Decide and document which categories fall into each tier. Train staff accordingly.

6) Control third parties that destroy your hardcopy

If a third party handles shredding:

  • Add contract clauses requiring secure transport, access controls, and documented destruction.
  • Require evidence: certificate of destruction (by pickup/date/location), service logs, or equivalent.
  • Validate operational reality: confirm locked containers, pickup procedures, and incident reporting.

Due diligence practicality: You are proving the control works, not collecting marketing brochures. Ask for the exact artifacts you plan to show an auditor.

7) Train, test, and enforce

Controls fail quietly if no one is accountable.

  • Role-based training for teams that regularly handle hardcopy PII (reception, HR, support ops).
  • Spot checks (walkthroughs) of printer areas, mailrooms, shred consoles.
  • A simple reporting channel for disposal incidents (lost paperwork, unlocked bins, misprints).

8) Build the audit trail (make it easy to produce)

Design evidence generation into the process:

  • Destruction logs (in-house) completed at the time of shredding.
  • Third-party destruction certificates stored centrally and tied to service dates.
  • Exception approvals (retention extensions, holds) stored with an owner and rationale.

If you use Daydream to manage compliance evidence, store the policy, training attestations, vendor destruction certificates, and your walkthrough results in a single control record so audits become retrieval work, not archaeology.

Required evidence and artifacts to retain

Auditors typically want proof across policy, process, execution, and oversight. Keep:

  • Policy/standard: Hardcopy PII handling and secure destruction standard mapped to ISO/IEC 27018 Annex A.11.7. 1
  • Hardcopy PII Locations & Workflows Register: where PII is printed/received/stored.
  • Retention schedule + triggers: including who approves exceptions and how holds work.
  • Destruction procedure: step-by-step; approved methods; roles/responsibilities.
  • Training records: completion and acknowledgments for relevant teams.
  • Operational records:
    • In-house shredding logs (date, location, category, operator).
    • Third-party certificates of destruction and pickup/service logs.
    • Walkthrough/spot-check results and remediation tickets.
  • Third-party oversight: contract language and periodic performance review notes tied to destruction services.

Common exam/audit questions and hangups

Expect these lines of inquiry:

  • Scope: “Show me all places hardcopy PII is created or stored.” Hangup: you only list HR, but support and facilities also print PII.
  • Meaning of ‘no longer needed’: “Who decides, based on what retention rule, and where is that documented?” Hangup: retention is implicit and varies by team.
  • Security of the pre-destruction period: “Are shred bins locked? Who has keys? Where are they located relative to public areas?” Hangup: bins exist but are not controlled.
  • Third-party chain-of-custody: “How do you know the shredding company destroyed your documents?” Hangup: you have invoices but no certificates or service logs.
  • Evidence sampling: “Pick a recent period and show destruction evidence end-to-end.” Hangup: records are scattered across email threads and shared drives.

Frequent implementation mistakes (and how to avoid them)

  1. Treating shredding as the whole control.
    Fix: document the lifecycle from creation to interim storage to destruction to evidence retention.

  2. No retention triggers, only retention “periods.”
    Fix: add business events that tell staff when to dispose (ticket closed, onboarding complete, audit complete).

  3. Ignoring printers, mailrooms, and reception.
    Fix: include physical walkthroughs in your control testing; update the workflow register when offices change.

  4. Assuming a third party’s “secure shredding” claim is sufficient.
    Fix: contract for proof of destruction and collect artifacts on a predictable cadence.

  5. Letting exceptions become the default.
    Fix: require documented approvals with an end date or review trigger, plus a simple way to revoke exceptions.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions. Practically, the risk is straightforward: hardcopy PII bypasses many technical controls, so a single mishandled document can become a reportable privacy incident, trigger contractual exposure, and undermine ISO audits. Treat hardcopy disposal as part of incident prevention, not office housekeeping.

Practical execution plan (30/60/90-day)

Use this as a quick operational rollout.

First 30 days (stabilize and scope)

  • Publish/update the hardcopy PII destruction standard aligned to ISO/IEC 27018 Annex A.11.7. 1
  • Build the initial Hardcopy PII Locations & Workflows Register via interviews with HR, Support, Security, Facilities, Finance.
  • Decide approved destruction methods (in-house vs third party) and interim storage requirements (locked consoles, access rules).
  • Start collecting any existing third-party destruction certificates into a central repository.

By 60 days (operationalize and evidence)

  • Implement retention triggers for top workflows (support printouts, visitor logs, HR packets).
  • Train high-touch teams; require acknowledgment.
  • Stand up logging: in-house destruction log template and/or a process to store third-party certificates consistently.
  • Run the first walkthrough inspection and document findings with remediation owners.

By 90 days (test, tighten, and make it audit-ready)

  • Expand scope to satellite offices and remote printing scenarios; document alternatives if home shredding is not feasible (e.g., return-to-office disposal process).
  • Formalize third-party oversight: contract clauses verified, evidence received on schedule, escalation path defined.
  • Execute a sample-based control test: pick a recent period and demonstrate end-to-end compliance (trigger → collection → destruction → evidence).
  • Fold metrics into governance (open findings, recurring issues, exception counts) without inventing numeric targets.

Frequently Asked Questions

Does “hardcopy materials” include handwritten notes taken during support calls or incident bridges?

Yes if the notes contain PII. Treat handwritten notes the same as printed documents: store securely, then destroy once the retention trigger is met. 1

What does “securely destroyed” mean in practice?

It means the document cannot be reasonably reconstructed and the process prevents access before destruction. Define approved methods (such as shredding) and require controlled collection/storage and evidence of destruction. 1

If we use a shredding company, is a certificate of destruction required?

ISO/IEC 27018 requires secure destruction; to prove it under audit, you typically need written evidence such as a certificate or service log tied to pickup dates and locations. Make it a contractual deliverable and store it centrally. 1

How do we define “no longer needed” without over-retaining?

Start with business triggers (case closed, onboarding complete) and align with any legal/contractual retention requirements your Legal/Privacy team sets. Document who can approve exceptions and how holds work so teams do not keep paper “just in case.” 1

What about misprints or documents left in printers?

Treat misprints as hardcopy PII and require immediate placement into locked shred consoles, not recycling bins. Add printer-area checks to walkthroughs and train teams that print PII frequently. 1

We’re mostly remote. How do we handle employees printing PII at home?

Decide whether home printing is allowed for PII workflows; if allowed, document how paper is stored securely and returned for destruction or destroyed through an approved method. Auditors will look for a defined rule and consistent enforcement. 1

Footnotes

  1. ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

Frequently Asked Questions

Does “hardcopy materials” include handwritten notes taken during support calls or incident bridges?

Yes if the notes contain PII. Treat handwritten notes the same as printed documents: store securely, then destroy once the retention trigger is met. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

What does “securely destroyed” mean in practice?

It means the document cannot be reasonably reconstructed and the process prevents access before destruction. Define approved methods (such as shredding) and require controlled collection/storage and evidence of destruction. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

If we use a shredding company, is a certificate of destruction required?

ISO/IEC 27018 requires secure destruction; to prove it under audit, you typically need written evidence such as a certificate or service log tied to pickup dates and locations. Make it a contractual deliverable and store it centrally. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

How do we define “no longer needed” without over-retaining?

Start with business triggers (case closed, onboarding complete) and align with any legal/contractual retention requirements your Legal/Privacy team sets. Document who can approve exceptions and how holds work so teams do not keep paper “just in case.” (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

What about misprints or documents left in printers?

Treat misprints as hardcopy PII and require immediate placement into locked shred consoles, not recycling bins. Add printer-area checks to walkthroughs and train teams that print PII frequently. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

We’re mostly remote. How do we handle employees printing PII at home?

Decide whether home printing is allowed for PII workflows; if allowed, document how paper is stored securely and returned for destruction or destroyed through an approved method. Auditors will look for a defined rule and consistent enforcement. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27018: Secure disposal of hardcopy materials | Daydream