How Iron Mountain secures your data, even when backup media is in transit. It accomplishes this through our secure logistics methodology of prevention, early detection and correction, and proof.
In today's regulatory environment, you need to exercise greater control over your sensitive documents and information. You need to know where they are and who's accountable every step of the way even while they're in transit. Iron Mountain has long set the standard for security and safety in the information protection and storage industry.
That's why we developed InControl, our secured transportation platform. InControl insures the protection of information while it is in transit. With patent-pending security, real-time tracking and auditable chain of custody. It accomplishes this through our secure logistics methodology of prevention, early detection and correction, and proof. Let's go inside Iron Mountain to see how it works.
InControl starts with prevention. Most off site storage and protection vendors utilize basic theft controls to protect information. Iron Mountain takes protection to the next level by incorporating error prevention controls into our fleet of secure vehicles. Our vehicle process controls includes patent-pending interlocking mechanisms and a key sequence that only a trained Iron Mountain driver can access. A special security key is needed to disarm the security system and open the cargo door. We've replaced the original factory locks with heavy-duty snap locks. These locking mechanisms render our vehicles virtually impenetrable without the key. There is no possibility of forgetting to lock the cargo door sensible automatically lock as soon as it is closed.
The cargo area simulates a rolling vault and is isolated from the driver's compartment by a full partition that is locked and bolted shut at all times. Some vehicles have an auxiliary air-conditioning system to keep data tapes at their optimum temperature range. Two keys are needed to operate the vehicle. The ignition key and the security key. The engine won't start unless both keys are inserted. This dual key sequence ensures that the cargo area is locked and alarmed before the vehicle can be started. Since the two keys are chained together at all times, it also means that the driver can't leave the engine running while making a delivery.
Drivers are equipped with radio-frequency key fobs. Should a driver mistakenly leave the proximity of an unsecured vehicle, the RF proximity system will automatically trigger an audible alarm. The only way to silence the alarm would be to return to the vehicle. The alarm system is powered by its own separate electrical system and battery, which is inside the master control box. This makes it extremely difficult to disable or a bypass the alarm. For increased security, there are additional alarm sensors around the vehicle. The ignition kill switch has a sensor. The master control box with the alarm system has its own sensor. And there's a vehicle- wide disturbance sensor that will detect any tampering with the vehicle including trying to tow it.
Finally, an in-motion security detection system triggers an alarm if any cargo area locking or security system fails while the vehicle is in motion. This process ensures that our driver will immediately pull over and remediate the issue, rather than wait until completion of their scheduled route. We realize that error prevention starts with quality employees. Driver screening and background checks help to ensure a high integrity workforce. And drivers are expertly trained to provide consistent service through a regimented set of standard operating procedures. InControl continues with early detection and correction.
InControl builds upon Iron Mountain's heritage of using multiple levels of checks and balances to ensure inventory integrity and accuracy. InControl's check-and-balance approach leverages real-time wireless scanning technology to validate pickup and delivery transactions. This process forms the foundation for effective chain of custody. By identifying potential discrepancies at the point of origin, we give our employees the information they need to correct workflow issues in real time before they become problems.
Here's an example: With InControl, our secure chain of custody begins as the driver scans each bar-coded box or container. During the scanning step, InControl systematically validates that the pickup count matches the estimated order quantity. Once a driver has validated the pickup count you'll be asked to acknowledge the service completion by signing the InControl hand-held scanner. This electronic signature becomes part of a verifiable audit trail that is transmitted in real time to Iron Mountain using wireless technology. In this way, InControl not only enables chain of custody, it helps prove it.
For orders placed using Iron Mountain Connect, automated electronic receipts provide real time proof of service. As information is routed through our delivery platform we keep a running audit trail documenting item level transactions. InControl removes the doubt every step of the way. The new InControl technologies and capabilities are becoming available as part of a rolling implementation. For more specific information on how InControl is applied within each of our service lines, please review the service facility tours and workflows.
Iron Mountain's InControl, it's about doing everything you can to prevent discrepancies from happening in the first place, detecting discrepancies and correcting them in real-time, and keeping a credible audit trail to prove what was done and when. InControl is just one of many ways in which Iron Mountain goes beyond basic storage.
Iron Mountain; protecting the world's information.