• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Metals
    • Precious Metals
    • Copper Alloys
      • Bronze & Brass
      • Master Alloys
  • ITAD
    • What is ITAD?
    • IT Inventory Services
    • ITAD Programs
      • Data Center Services
      • On-Site ITAD Services
      • Box Program
      • ITAD Processing Facilities
    • IT Asset Recycling
    • IT Asset Remarketing
    • Secure Data Destruction
      • Secure Data Wiping
      • Shredding and Crushing
      • Degaussing
      • FIREMELT™
    • Reporting
  • Secure Destruction
  • About
    • Why work with Sipi?
    • Certifications
    • Leadership
    • Coverage Map
    • Our Markets
    • Careers
    • ITAD White Papers and Case Studies
    • News
    • Events
  • Blog
  • Contact
    • Locations

Sipi

blog

Home / Blog / Where is the chain of custody for in-transit data-bearing equipment and devices?

Where is the chain of custody for in-transit data-bearing equipment and devices?

AEric Dorns part of Data Privacy Week, Eric Dorn, SVP and General Manager, Sipi Asset Recovery, shares the single most common data security disconnect he witnesses almost daily. And it’s keeping him up at night.

“Data in transit risk is a critical problem that needs to be addressed! Specifically, equipment and devices moving from one customer’s facility to another facility or to disposition. For National Data Privacy Week, I recommend a thorough review of your end-to-end transit chain of custody process.

Oftentimes we (Sipi Asset Recovery) receive gaylords, pallets, or a truckload of devices and equipment that were accumulated and packed over several weeks or months. This equipment and/or devices arrive without a scanned serial number list and rarely an itemized quantity which makes it virtually impossible to verify. Ironically, the shipper includes very specific disposition instruction to prevent a data breach, once the equipment and/or devices have reached their designated location but has not addressed the significant risk arising from a lack of oversight of secure tracking and handover of valuable, possibly data-laden IT equipment.

The terrifying and real problem is this: if the shipper does not know exactly what they have shipped, there’s no way that their job can be verified before processing. This gives ample and widespread opportunities for a data breach to occur due to a lack of accountability at every step: storage, packing, loading dock, warehouse staff and logistics (to name a few). Additionally, the lack of verified data destruction (shred, wipe, degauss) or encryption before loading amplifies the data security challenge. If a single device, or worse, a pallet or a box of multiple devices, goes missing, how do you know what is missing and the liability involved?

That RISK, the uncounted, untracked, unverifiable disconnect between the shipping and receiving, is what keeps me up at night.

A comprehensive chain of custody control process resolves this significant vulnerability in data custody. Detailed serial # scanning, packing, and shipping on the front end and signatures as shipments change hands will completely remove ambiguity and close that very real gap in IT asset tracking and data risk. At Sipi Asset Recovery, because we scan and verify upon receipt, we know immediately if something is missing and exactly what that missing device is.

For Data Privacy Week, protect the privacy of all your customer and company data with the winning combination of secure onsite data destruction and/or encryption for all devices and a secure chain of custody process. No matter how large or small the shipment, the process should include barcode scanning and inventory as you pack and ship and signature verification at every handoff to the carrier. With a strict chain of custody process that is adhered to, you’ll significantly reduce the opportunity for an accidental or nefarious data breach and keep your brand reputation intact.

I welcome anyone to reach out to me for guidance on a chain of custody process that includes all their vendors, partners, and staff. We can work together to stop data from getting into the wrong hands and I’ll be able to sleep at night.”

Eric participated in a series of Data Privacy Week articles posted by Guardian Data Destruction, see the rest of the articles here.

How can Sipi help you? We’re ready to listen

Footer

Sipi Metals Corp.
1720 N. Elston Avenue
Chicago, Illinois 60642-1579
(800) 621-8013
(773) 276-0070
sales@sipi-metals.com
hr@sipi-metals.com for Recruiting, Legal
or Human Resource Questions

Sipi Asset Recovery
1300 W.N. Thorndale Avenue
Elk Grove Village, Illinois 60007
(847) 750-9350
sales@sipiAR.com

    

© 2022 SIPI METALS CORP  /  PRIVACY POLICY

HOME

ABOUT

CERTIFICATIONS

RESOURCES

COMMUNITY

CAREERS

CONTACT US

PRECIOUS METALS

COPPER ALLOYS

IT ASSET DISPOSITION

SECURE DESTRUCTION

NEWS

ITAD BLOG

COMPANY HISTORY

Sipi Corp Logo

CONTACT US

"*" indicates required fields

Name*
Sipi Asset Recovery values your trust - data security is in the heart of what we do. By clicking below, you are providing consent for Sipi to securely store your data so we can respond to your request. For more information on how we protect your data, see our Privacy Policy. We look forward to getting in touch!
Sipi Asset Recovery values your trust - data security is in the heart of what we do. By clicking below, you are providing consent for Sipi to securely store your data so we can respond to your request. For more information on how we protect your data, see our Privacy Policy. We look forward to getting in touch!
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Name*
Hidden
GDPR Agreement*
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Name*
GDPR Agreement*
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Name*
Hidden
GDPR Agreement*
This field is for validation purposes and should be left unchanged.