Chain of Custody Checklist
Discover if your provider is really protecting your information
There’s more to selecting a third party information management provider than meets the eye. You should be completely satisfied that your sensitive data and records are protected from the instant they depart your premises.
The Chain of Custody Checklist outlines how your information can and should be handled to ensure it’s completely protected at every point—from pickup to arrival and retrieval. Use it to assess your provider’s chain of custody processes.
You can evaluate:
- vehicle security and driver competency
- potential for cross contamination
- cataloguing and retrieval processes.