The 2019 update to our 2018 Sustainability report is available here.

The following site covers subject matter through 2018.

Better Workforce


For more than a decade, Waste Management Security Services, Inc. (WMSSI) has provided overall protection of our more than 2,000 facilities and $25 billion-plus in assets. Today, WMSSI not only serves Waste Management, but we have expanded it as a service offering to customers. WMSSI monitors alarms and provides innovative programs that can enhance business operations by minimizing risk of loss.

Our security services team uses intelligent video monitoring and a state-of-the-art Master Control Center to alert both internal and external clients instantly when a covered situation arises. Services provided by WMSSI include video monitoring, mobile surveillance systems, fire and intrusion alarm monitoring, access control, intelligent operations (software application), systems administration, fleet GPS tracking, lone worker safety, executive home protection and security systems integration.


As the Waste Management customer experience increasingly moves online, we recognize the need to enhance our internal training and protect IT resources from cyberthreats. Waste Management’s Digital department is constantly reviewing information on emerging threats and manages security systems that include SPAM management, a simple-to-access phishing alert and management tool, real-time response to potential threats and entity-wide training. We conduct an annual enterprise-wide test and a minimum of two systemwide tests per year, but also continuously scan our e-commerce sites for vulnerabilities and engage an external party to validate them quarterly.

Employee education, training and coaching is an important element of data security. Our intranet provides a full-service resource for information on how to identify and resist social engineering attempts; tips on the latest phishing techniques and how to spot them; company policies and support on encryption; computer and data security internal procedures and authorizations; and policies on use of mobile devices. In mid-2017 as part of an enhanced risk identification and management process, we began to include scenario planning for minor to severe cyberthreats with an eye to improving system resilience.