Security Datasheet for Electronic Delivery using Image On Demand

Solution Guides

Security details for the electronic document delivery service utilizing our Image On Demand option.

December 25, 20236 mins
Man in suit pointing at lock

Electronic delivery using Image on Demand

Iron Mountain Image on Demand service enables digital retrieval of the physical records and documents that you have stored in an Iron Mountain Record Center. This pay-as-you-go solution enables fast, secure digital access to your documents wherever and whenever you need them.

With Image on Demand, you can rest easy with the knowledge that your information is secure throughout the entire process.

Comprehensive employee training

All Iron Mountain employees that have electronic access are required annually to complete Security Awareness training provided by an internationally recognized leader in compliance training and education.

Every Iron Mountain employee also certifies annually to Iron Mountain’s Code of Ethics & Business Conduct (“Code”) training. Iron Mountain’s Code covers the following information security areas:

  • Data privacy & security
  • Confidential & proprietary information
  • Protecting company assets
  • Appropriate computer use
  • Employee privacy
  • Incident reporting
  • Confidential & anonymous helpline

Iron Mountain’s Code in all the languages our employees speak around the globe can be accessed at

Secure imaging workstations

Your original files never leave Iron Mountain’s custody when you use Image on Demand. All imaging operations are physically located inside Iron Mountain’s secure facilities. Imaging operators undergo the same background checking and drug testing as all Iron Mountain employees. Iron Mountain employees are not permitted camera-enabled personal mobile devices in the scanning center.

Access to the imaging workstations is restricted and requires username/ password login information. All user activity is logged and monitored. Imaging workstations work on a single application for a single customer at a time. Each imaging application is processed by its own batch class and verified against the customer ID.

All imaging workstations are configured with hardening standards for both servers and networking equipment. In addition, each system is subjected to a vulnerability scan before being put into production. Workstations and servers are equipped with anti-virus software that is updated daily.

Image conversion is performed using dedicated image capture software and hardware connected to Iron Mountain’s internal firewall-protected Network. Iron Mountain maintains a three tier firewall architecture designed to support defense in depth. Multiple firewall vendors are also used. Perimeter firewalls terminate internet connections and Demilitarized Zone (DMZ) firewalls isolate those network segments. Firewalls are also used to separate layers of the application stack for additional security.

During the capture process, the capture software uses disk storage as cache, re-using and overwriting older information. The output images will be held for 30 days then purged.

Encrypted data transfer

Digital files provided are implemented using Transport Layer Security (TLS), a protocol for transmitting documents via the Internet using encryption technology. This ensures an extremely high level of data transmission security through industry standard encryption technology. As information is transferred between the server and the Web clients, all data is encrypted. The solution uses server- side certificates to encrypt the data using TLS for the Web application. Any Internet traffic that lands on the clear text site using Hypertext Transfer Protocol (HTTP) will be redirected to the secure port for Hypertext Transfer Protocol Secure (HTTPS). When using Web services integration, a two-way authentication is employed using both client-and server-side certificates. All unauthorized requests are rejected. All data is securely and separately stored.

On request, Iron Mountain can set up Globalscape SFTP (secure file transfer protocol) to transfer information to a customer.

Restricted user access

To place an Image on Demand order, customers use Iron Mountain Connect™ or Iron Mountain ReQuest™, our web-based customer hubs. Only authorized users of these systems can place an Image on Demand order or retrieve the requested images. All unauthorized requests are rejected. Customer super users are set up by Iron Mountain. Those users can then manage their company’s own internal users.

If a customer uses file transfer protocol (FTP) for ingesting assets/ documents, access is provided through a secure FTP channel that assigns each customer a unique username and password.

Iron Mountain performs access control reviews for administrative users of the system on a quarterly basis and documents the results.


To learn more about electronic delivery using Image on Demand, contact Iron Mountain today. 

Talk to an expert