How do you track your data-bearing storage assets? Can you pinpoint every information-containing device from the time it enters your building to the time it leaves – and beyond? If you can answer yes to these questions, good! You have a solid chain-of-custody that is protecting your organization from legal and regulatory risk.
If you are unsure about the answers, consider getting help.
The Revert ChainLink Media Tracking System (CMTS) is the core of an asset tracking strategy that enables organizations to maintain control of storage-related assets. As the name implies, it helps eliminate possible weak links in your media chain-of-custody.
It is an easy-to-use tool that integrates simply with the people and processes already employed in your organization. It enables you to track sensitive media assets at every stage of their lifecycle and make that information available when required.
Revert has developed this system specifically with information storage assets in mind. The storage systems on your raised floor are like a living organism with parts – especially disk drives – that can fail over time. What you do with those failed drives (after you or your vendor has swapped in replacements) can have profound consequences, if not managed properly.
With the Revert CMTS, you are assured total visibility, and total control. We developed this system to serve customers that are leading the way in the protection of Protected Health Information (PHI) and Personally Identifiable Information (PII).
At the point of ingest, the user captures all the critical information about every storage asset. From that point forward, the status of that device is updated at every juncture, from sanitization for reuse to destruction and responsible recycling.
At your fingertips, this information protects your organization from any conceivable risk associated with these information-bearing assets. The data is easily accessible and easy to share via PDF reports and spreadsheet files. The ability to do so has become ever more important with new and more stringent requirements in both HIPAA* and GDPR**.
Your internal and external auditors, and your compliance department, will be pleased.
*For more information on HIPAA, particularly with respect to The Security Rule and safeguarding information-bearing assets, please click here.
** For more information on GDPR and The Security Principle that speaks to information security, please click here.