CentricsIT provides secure chain of custody for every hardware shipment by default, and we have documentation, physical parameters, and fail-safes to prove it.
Upon arrival, your units are carefully packed in Secure Transportable Units for Data Destruction, or “STUDD” for short. This lockable bin securely contains your data-bearing units from your facility to ours, with each lock being uniquely identifiable.
The STUDDs are then loaded into point-to-point, dedicated trucks; “dedicated” meaning that the truck does not stop or pick up other clients’ units along the way. Our drivers are highly vetted and experienced within the industry.
Each truck is cable-sealed with a serialized lock. Our drivers (and you) will know immediately if there has been unauthorized access.
Pictures are taken throughout the entire shipment process to provide physical evidence of comprehensive security statuses. Our technicians take pictures of each locking mechanism before we leave your data center. Pictures are taken if/when drivers are relieved. Final pictures are taken upon arrival at our warehouse.
If your vendor is unwilling to provide you with the proper documentation and empirical assurances, don’t hire them. CentricsIT provides the proper documentation and procedures to guarantee your data (and your brand’s) security from end-to-end.
Compliance and Peace of Mind
Every service provided by CentricsIT is backed by our Certificate of Secure Data Erasure or Certificate of Secure Data Destruction. You will receive this certificate, along with detailed reporting, when your services are completed.
Security certificates and reports are important documents to have for compliance and auditing purposes. CentricsIT will make every effort to accommodate your logging and reporting requirements to help you remain compliant by any standards, whether internal to your organization or mandated by any governing authority.