Item collection bin and disposal method

a technology for items and bins, applied in the field of collection and confidential disposal of items, can solve problems such as unauthorised removal, and achieve the effect of improving the security of the collection process

Inactive Publication Date: 2005-03-31
BUSINESS INFORMATION SERVICES
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0006] With the present invention, tamper-evident bins having self-locking closures are locatable at individual workstations. Confidential records or other confidential items requiring secure disposal are inserted into the bins as necessary. While secured within the tamper-evident bins, such confidential items remain securely out of sight; and unauthorized removal would be evidenced by damage to the tamper-evident bins. Therefore, the security of the collection process is improved.

Problems solved by technology

While secured within the tamper-evident bins, such confidential items remain securely out of sight; and unauthorized removal would be evidenced by damage to the tamper-evident bins.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Item collection bin and disposal method
  • Item collection bin and disposal method
  • Item collection bin and disposal method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The confidential items collection and disposal process of the present invention has several different embodiments.

[0018] Basic Service

[0019] As with many item collection and disposal services, a user is able to select different levels of service. One embodiment of the present invention contemplates a collection and disposal process that is initiated substantially by the user on an as-needed basis.

[0020] The flowchart of FIG. 1 illustrates an exemplary process flowchart of the activities and functions that occur with the Basic Service. With the Basic Service, the collection and disposal service receives a pickup request (step 204) from the user. The user often makes the pickup request when their item collection bins are relatively full. Typically, a lead-time of one or more days is helpful, so that different customer destination stops can be scheduled in an efficient manner. However, requests can also be handled on a near real-time basis, such that a pickup request is handl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A tamper-evident bin for collecting confidential items has a self-locking closure that allows one to determine whether there has been an unauthorized opening of the bin. On a requested or a scheduled basis, a disposal service retrieves the old tamper-evident bin, provides a new tamper-evident bin, and disposes of the old tamper-evident bin and all of its contents without ever opening the bin. The bins can also include respective identity codes that allow them to be easily tracked to determine whether there has been an unauthorized replacement of a bin. Optional temporary storage of selected bins allows a second chance access to the bins prior to destruction.

Description

FIELD OF THE INVENTION [0001] This invention relates generally to the collection and confidential disposal of items and more particularly, to a method of improving the security of the collection and disposal process. BACKGROUND OF THE INVENTION [0002] The issue of protecting personal and financial information has become more critical in recent years. For example, personal and financial information must be protected from unauthorized disclosure under requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Gramm / Leach / Bliley Financial Modernization Act of 1999 (GLB), the Video Privacy Protection Act (18 USC §2710), the Federal Education Rights and Privacy Act (“FERPA” 20 U.S.C. 1232g), as well as 42 C.F.R. §2.16. More general rights to personal privacy are guaranteed by the Fourth Amendment to the Constitution of the United States as well as various State Constitutions and statutes. In addition, businesses have vast amounts of internal proprietary ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): B65F1/14
CPCB65F1/1484B65F2210/1121B65F2250/106B65F2240/1562B65F2210/1123Y02W30/64
Inventor ALBI, FRANK J.
Owner BUSINESS INFORMATION SERVICES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products