Governance
Access Control & Custody Integrity Overview
This overview summarizes access-control choices, custody integrity controls, and documentation patterns that support a preservation-first engagement. It is written for attorneys, insurers, and compliance teams who need a clear record and defensible handling boundaries.
Scope note: This page describes operational controls and documentation practices. It does not provide legal advice.
Engagement begins only after written scope and authorization are confirmed.
Why access control matters
- Integrity: reduce the risk of alteration or loss during collection, transfer, and storage.
- Accountability: ensure each action is attributable to a named handler and timestamp.
- Defensibility: align handling controls with the written scope and the expected review process.
Controls that typically appear in preservation-first workflows
- Least privilege: limit who can access evidence media, working copies, and logs.
- Separation of duties: where practical, avoid single-person control over intake, copying, and release.
- Write-protection / read-only handling: use hardware or procedural controls to prevent modification.
- Checksum verification: document hashes at key points (acquisition, transfer, storage, delivery).
- Secure storage: controlled physical access plus encrypted storage where applicable.
- Documented transfers: clear transfer receipts and chain-of-custody continuity.
Documentation artifacts
Common artifacts include a written scope & authorization summary, intake notes, chain-of-custody logs, transfer receipts, and integrity verification records. These artifacts are designed to support a clear written record and reduce scope disputes.