Making It Accountable


CHAIN-OF-CUSTODY

We Know Where Your Assets Are,
Now You Can Too!


Chain-of-Custody

Chain-of-Custody

Learn More
Security

Security

Learn More
Detailed Reporting

Detailed Reporting

Learn More

Chain-of-Custody


Ingram Micro's Chain-of-Custody controls not only ensure your assets are handled safely according to best practice and your specific instructions, they also provide the audit and tracking detail necessary to prove data sanitization and legislative / environmental compliance.

Secure Chain-of-Custody starts when you initiate a request service through our online client portal. At pickup, the driver records all assets - including serial numbers if required - to document the shipment, then photographs all pallets before and after loading. The driver obtains customer sign-off on the Bill of Lading prior to leaving the site. 

We employ a range of explicit precautionary measures that protect assets in transit, including but not limited to photographs, sealed shipments, locked cargo areas, and GPS tracking. Processing takes place at our TAPA FSR Class A-Certified Processing Centers where significant access controls further ensure asset safety.

Our tracking capabilities provide end-to-end visibility. We record all asset serial numbers, track each asset individually, and scan all serial numbers as assets move through each step of the ITAD process.

Need to locate your assets? We provide the transparency you need to find them: simply log into our client web portal to see which processing stage each asset has reached. Whether you search and run reports by job number, originating location, asset serial number, asset tag number, or other attributes – or run any of the available stock reports – processing status is always available.

Finally, at the end of the ITAD process, Ingram Micro provides a detailed Settlement Report you can use to prove data sanitization and asset disposition, including a Certificate of Data Erasure & Destruction for each asset. If an asset has been recycled that will be reflected on the certificate.

Security


The time when assets are most vulnerable to pilferage and theft is the time before they leave your facility. The second most vulnerable time is during transit, so we have very specific controls in place to ensure safe transport. These controls include GPS tracking, constant driver contact through company-issued smart phones, and cargo areas that remain padlocked at all times (except during active loading). We also use numbered seals to ensure cargo areas have not been entered from the time the vehicle is secured at your location until formal receipt at the processing facility.

Asset security isn't just about physical movement of goods or process controls alone. Security starts with the hiring process, which is backed by training and continued vigilance.

We take pride in our dedicated, trustworthy workforce. As a baseline, all Ingram Micro associates pass criminal, professional, and educational background checks prior to employment as well as alcohol/drug testing and, for drivers, a motor vehicle record test. Post-hire, we monitor employees and conduct additional tests as warranted.

Strong physical security measures protect your assets from both internal and external threats. Our facilities are TAPA FSR-Class A certified, with facility security measures including badge-controlled access, walk-through and/or wand metal detectors, facility-wide CCTV systems with 24/7 monitoring, and central security alarm systems connected to local fire and police authorities.

Detailed Reporting

Providing feature-rich IT Asset Disposition and Lifecycle Support Services solutions for clients is great, but it’s only part of the picture.

Most clients want – and many require – insight into processing so they can locate any asset at any time. Ingram Micro provides that level of detail and more. Our services are backed by extensive reporting for asset accountability and risk mitigation: the wealth of details we collect form the basis to measure the success of your program.

Standard reports vary based on service type and may be accessed and downloaded online through the web portal. Clients have the option to run reports based on multiple search parameters and fields to meet specific reporting needs. If a client has a unique reporting requirement not covered by standard reporting, we are pleased to collaborate to create tailored reporting options.




Learn about the technology behind our 
Chain-of-Custody and Reporting

Making IT Smarter