Confidential Documents - CoC Description
This confidential documents transport security app with integrated ginstr cloud and integrated office software is a comprehensive solution using security bags with NFC tags and a complementary smartphone app for tracking the transportation of confidential documents.
Data is collected on site, during transport and in storage.
This ginstr solution includes a web based administration software for managing all security bag data. It provides a professional chain-of-custody which ensures highest possible protection of the confidential documents.
All of this can easily be integrated into your existing IT landscape.
Typical use case
Security bags with integrated NFC tags are particularly suitable for the safe transport of confidential documents, professional storage, and secure safekeeping of important documents that require tamper protection: the bags cannot be opened without destroying them so any access to the documents will be obvious.
Features:
Registration of security bags
In order to ensure that no unauthorized security bags or any other NFC tags can be handled with this confidential documents transport security app, the registration of authorized security bags allows to limit the usage of this app to authorized security bags.
Activation of security bags including registration for monitoring:
After the filling and sealing of the security bag it is registered for monitoring. All relevant information for the security bag is recorded by the sender using a NFC capable smartphone or tablet. In addition, the following information can be added: a photo of the sealed bag, a photo of the contents, the employee name and actual location, electronic signature of the employee captured on the smartphone or tablet, and video or audio notes.
Chain of custody during transport:
Every step of the security bag logistics can be extensively documented with proof, such as photos and electronic signatures
Security bags often change hands many times before reaching their destination. For each transfer, the bag is scanned and the ownership of the bag transferred to another – all of these transactions can be documented. If desired, photos, videos, audio notes and text comments can be attached to the transfer process.
Recording the opening of a security bag:
The opening of the security bag is documented, which ends its monitoring process.
If the security bag is opened according to the planned schedule and thereby destroyed, then the security bag chain of custody is considered closed and the bag is removed from monitoring. In this case, the process of closing this chain of custody is enhanced with various text information, photos, audio or video notes, and an electronic signature capture.
Recording of the actual location or workplace of an employee:
Proof of the actual location or workplace of an employee increases the integrity of the security bag scan and improves the quality of documentation.
By scanning a tamper-proof location NFC tag, it verifies the workplace and the exact location of where the security bag scan took place. A location can also be recorded using cell tower location information, Wi-Fi stations, and Bluetooth sources (fingerprinting).
Advantages:
▶ error-free and 100% traceable documented tracking for confidential documents transport
▶ complete documentation of the contents and storage area as well as the person responsible for the NFC security bag in each case
▶ management of additional information for each security bag (e.g. comments, photos, audio notes, videos, electronic signature capture, etc.)
▶ evidence of tampering, changing, or tampering with the contents of the security bag are evident and identifiable
Find more: http://www.ginstr.com/nfc-security-bag-tracking/
Data is collected on site, during transport and in storage.
This ginstr solution includes a web based administration software for managing all security bag data. It provides a professional chain-of-custody which ensures highest possible protection of the confidential documents.
All of this can easily be integrated into your existing IT landscape.
Typical use case
Security bags with integrated NFC tags are particularly suitable for the safe transport of confidential documents, professional storage, and secure safekeeping of important documents that require tamper protection: the bags cannot be opened without destroying them so any access to the documents will be obvious.
Features:
Registration of security bags
In order to ensure that no unauthorized security bags or any other NFC tags can be handled with this confidential documents transport security app, the registration of authorized security bags allows to limit the usage of this app to authorized security bags.
Activation of security bags including registration for monitoring:
After the filling and sealing of the security bag it is registered for monitoring. All relevant information for the security bag is recorded by the sender using a NFC capable smartphone or tablet. In addition, the following information can be added: a photo of the sealed bag, a photo of the contents, the employee name and actual location, electronic signature of the employee captured on the smartphone or tablet, and video or audio notes.
Chain of custody during transport:
Every step of the security bag logistics can be extensively documented with proof, such as photos and electronic signatures
Security bags often change hands many times before reaching their destination. For each transfer, the bag is scanned and the ownership of the bag transferred to another – all of these transactions can be documented. If desired, photos, videos, audio notes and text comments can be attached to the transfer process.
Recording the opening of a security bag:
The opening of the security bag is documented, which ends its monitoring process.
If the security bag is opened according to the planned schedule and thereby destroyed, then the security bag chain of custody is considered closed and the bag is removed from monitoring. In this case, the process of closing this chain of custody is enhanced with various text information, photos, audio or video notes, and an electronic signature capture.
Recording of the actual location or workplace of an employee:
Proof of the actual location or workplace of an employee increases the integrity of the security bag scan and improves the quality of documentation.
By scanning a tamper-proof location NFC tag, it verifies the workplace and the exact location of where the security bag scan took place. A location can also be recorded using cell tower location information, Wi-Fi stations, and Bluetooth sources (fingerprinting).
Advantages:
▶ error-free and 100% traceable documented tracking for confidential documents transport
▶ complete documentation of the contents and storage area as well as the person responsible for the NFC security bag in each case
▶ management of additional information for each security bag (e.g. comments, photos, audio notes, videos, electronic signature capture, etc.)
▶ evidence of tampering, changing, or tampering with the contents of the security bag are evident and identifiable
Find more: http://www.ginstr.com/nfc-security-bag-tracking/
Open up