Making It Accountable


CHAIN-OF-CUSTODY

We Know Where Your Assets Are,
Now You Can Too!


Chain-of-Custody

Chain-of-Custody

Learn More
Security

Security

Learn More
Detailed Reporting

Detailed Reporting

Learn More

Chain-of-Custody


Ingram Micro's Chain-of-Custody controls not only ensure your assets are handled safely and properly, they also provide the audit and tracking detail necessary to prove data sanitization and legislative / environmental compliance.

Secure Chain-of-Custody starts when you request service through our online client portal to initiate the job order. At pickup, the driver records all assets - including serial numbers if required - to document the shipment, then photographs all both pallets before and after loading. The driver obtains customer sign-off on the Bill of Lading prior to leaving the site. 

We employ a range of explicit precautionary measures that protect assets in transit, including but not limited to - photographs, sealed shipments, locked cargo areas, and GPS tracking. Processing takes place at our TAPA FSR Class A-Certified Processing Centers where significant access controls further ensure asset safety.

Our tracking capabilities provide end-to-end visibility. We record all asset serial numbers, track each asset individually, and scan all serial numbers as assets move through each step of the ITAD process.

Need to locate your assets? We provide the transparency you need to find them: simply log into our client web portal to see which processing stage each asset has reached. Whether you search and run reports by job number, originating location, asset serial number, asset tag number, or other attributes – or run any of the available stock reports – processing status is always available.

Finally, at the end of the ITAD process, Ingram Micro provides a detailed Settlement Report you can use to prove data sanitization and asset disposition, including a Certificate of Data Erasure & Destruction for each asset. Additionally, if the asset has been recycled that will be reflected on the certificate.

Security


The time when assets are most vulnerable to pilferage and theft is the time before they leave your facility. The second most vulnerable time is during transit so we have very specific controls in place to ensure safe transport. These controls include GPS tracking, constant driver contact through company-issued smart phones, and cargo areas that remain padlocked at all times (except during active loading). We also use numbered seals to ensure cargo areas have not been entered from the time the vehicle is secured at until formal receiving at the processing facility.

Ingram Micro ensures more than physical and process controls. Security starts with the hiring process, which is backed by training and continued vigilance.

We take pride in our dedicated, trustworthy workforce. As a baseline, all Ingram Micro associates pass criminal, professional, and educational background checks prior to employment as well as alcohol/drug testing and, for drivers, a motor vehicle record test. Post-hire, we monitor employees and conduct additional tests as warranted.

Strong physical security measures protect your assets from both internal and external threats. Our facilities are TAPA FSR-Class A certified, with facility security measures including badge-controlled access, walk-through and/or wand metal detectors, facility-wide CCTV systems with 24/7 monitoring, and central security alarm systems connected to local fire and police authorities.

Detailed Reporting

Providing feature-rich ITAD and Lifecycle Support Services solutions for clients is great, but it’s only part of the picture.

Most clients want – and many require – insight into processing so they can locate any asset at any time. Ingram Micro provides that level of detail. Our services are backed by extensive reporting for asset accountability and risk mitigation, and the wealth of details we collect form the basis to measure the success of your program.

Standard reports vary based on the service type and can be accessed and downloaded online through the web portal. Our clients may run reports based on multiple search parameters and fields to meet specific reporting needs. In the unlikely event our standard reporting options don’t address a specific reporting need, we will be pleased to work with you to create tailored report options.




Learn about the technology behind our 
Chain-of-Custody and Reporting

Making IT Smarter