Data Center Services Chain of Custody
What Is Chain Of Custody?
Put simply, it is the careful process of transporting items that contain data from one point to another so that they are visibly accounted for at all times and supported with documentation to track their movement.
An effective chain of custody follows a specific and rigorous process that remains unbroken throughout the move. It can also be verified at any point during transport to ensure its integrity.
Every company, however large or small, has some data that they want to protect from competitors, prying eyes or malicious theft. And in this day and age when data security – or lack of it – makes headlines nearly every day, protecting that data has become a challenge that has business owners on guard.
Not only do outside parties and seasoned criminals pose a threat, but even a disgruntled employee may choose a data center move as an ideal time to vent their frustrations or take retribution into their own hands.
An Effective Process
An effective chain of custody begins by documenting exactly what is being moved. The items are then packaged, put into containers and sealed so they are tamper proof.
The containers are loaded onto the truck where the doors are closed with a padlock. A tamper evident security seal with a serial number is placed on the door and a business representative signs off on the process, acknowledging that the equipment that houses data has been handled securely.
It is important to note that the servers or other vital equipment do not leave the sight of the movers except for the period when they are secured in the truck. Nor does the truck itself ever leave the sight of at least one of the movers.
At the destination point, the truck is unsealed in front of a customer representative who acknowledges that the serial number is accurate. At no point from origin to destination should the cargo seal broken. If it needs to be broken because of truck breakdown or an inspection at a DOT roadside checkpoint, the mover needs to know the procedure for how to handle this. Otherwise, it would be difficult to maintain protection from a security breach.
Professional movers will not vary from their chain of custody discipline, ensuring that your most valuable assets follow a rigorous security protocol.