About Security Bag Tracking
A comprehensive solution using security bags with NFC tags and a complementary smartphone app. Data is collected on site, during transport, and in storage. It includes a web based administration software for managing all security bag data and alerts in case of delay or loss – all of this can be integrated into the existing IT landscape.
Typical use cases
Security bags with integrated NFC tags are particularly suitable for the safe transport, professional storage, and secure safekeeping of important objects that require tamper protection. The following are examples of typical use case for these security bags:
▶ confidential and important document transfer
▶ transport of high value goods
▶ equipment security policy for weapons, illegal narcotics, and other restricted access items
▶ transport of urine and blood samples for doping tests
▶ chain of custody drug testing
▶ forensic evidence collection and storage
▶ personal property bags for patients in hospitals or deceased individuals
▶ inmate personal property inventory
▶ chain of custody for expensive or dangerous pharmaceutical, biological, or chemical products
▶ secure data disposal to verify the destruction of hard drives and other storage devices that contain important data
Functions of the smartphone App:
Activation of security bag including registration for monitoring:
After the filling and sealing of the security bag it is registered for monitoring. All relevant information for the security bag is recorded by the sender using a smartphone or tablet. In addition, the following information can be added: a photo of the sealed bag, a photo of the contents, the employee name and actual location, electronic signature of the employee captured on the smartphone or tablet, and video or audio notes.
Chain of custody during transport:
Every step of the security bag logistics can be extensively documented with proof, such as photos and electronic signatures
Security bags often change hands many times before reaching their destination. For each transfer, the bag is scanned and the ownership of the bag transferred to another – all of these transactions can be documented. If desired, photos, videos, audio notes and text comments can be attached to the transfer process.
Recording the opening of a security bag:
The opening of the security bag is documented, which ends its monitoring process.
If the security bag is opened according to the planned schedule and thereby destroyed, then the security bag chain of custody is considered closed and the bag is removed from monitoring. In this case, the process of closing this chain of custody is enhanced with various text information, photos, audio or video notes, and an electronic signature capture.
Recording of the actual location or workplace of an employee:
Proof of the actual location or workplace of an employee increases the integrity of the security bag scan and improves the quality of documentation.
By scanning a tamper-proof location NFC tag, it verifies the workplace and the exact location of where the security bag scan took place. A location can also be recorded using cell tower location information, Wi-Fi stations, and Bluetooth sources (fingerprinting).
Advantages:
▶ error-free and 100% traceable documented tracking for transport of critical objects
▶ complete documentation of the contents and storage area as well as the responsible person in each case for the NFC security bag
▶ management of additional information for each security bag (e.g. comments, photos, audio notes, videos, electronic signature capture, etc.)
▶ evidence of tampering, changing, or tampering with the contents of the security bag are evident and identifiable
-------------------
Find more: http://www.ginstr.com/nfc-security-bag-tracking/
-------------------
App was developed in cooperation with Packaging Horizons: https://www.alertsecurityproducts.com/nfcsecuritybag/index.shtml