Secure Data Chain of Custody for Your Document Management Process
Total security for your archive – at all times.
Each Access facility is governed by strict chain-of-custody procedures. Archived documents will have a unique identifier attached, allowing you to track where and when the document is at all time.  Whenever an item is retrieved, accessed, or distributed, this information goes into the permanent unique record for that item.Chain of Custody Solutions that gives you Proof of Protection – every step of the way
Chain of custody benefits
There are endless benefits to working with chain of custody security experts who understand what it takes to keep your information safe.When you have a trusted chain of custody partner at your side the benefits you reap include:
- Complete visibility and control over your assets’ location.
- Only you know the location of your assets.
- Controlled access to all facilities.
- End-to-end oversight on asset retrieval. Prior identity verification required.
Chain of Custody Flow
Through this simplified process, your chain of custody security is guaranteed.
- Service request is generated. Client emails for additional service.
- Shred work automatically generates.
- Work orders populate for scheduling. Routes are downloaded to handheld scanners.
- Destruction Center Transportation Specialist (DCTS) arrives at client’s facility with locking security container.
- DCTS verifies barcode or unit and scans client’s locking security container.
- Service information is capture and confirmed with handheld scanner
- Handheld scanner captures client’s electronic signature
- Locking security container is security transported to either Access plant (with GPS) or vehicle for destruction.
- Scanner data is uploaded and work order is completed
- Shredded material is loaded into 40′ containers and shipped to paper mill, completing chain of custody
- Client receives Certificate of Destruction to ensure documents have remained in compliance throughout destruction. Automated invoice sent for payment.