Provide proof of your assets to satisfy audit requirements and to gain complete governance over your inventory.

Pathway to Information Governance

Evolving your records and information management program to an information governance structure requires you to proactively take steps towards improvement in your overall process. Enhancing your program to include automation and technology, such as Radio Frequency Identification (RFID) allows you to streamline governance of your information. You’ll be able to audit your inventory at a moment’s notice to prove the soundness of your program to customers, internal and external auditors and stakeholders.

As you create and store private, sensitive customer information the demand for regulation and privacy is increasing. Respond to the driving requests for quicker, more accurate reporting by leveraging RFID technology. With RFID you can verify the location of your physical assets and demonstrate the controls you’ve placed over your inventory. RFID technology supports the proper tracking and auditing of vital, sensitive material.

Prepare the information you want to store offsite by putting it in an RFID-ready¬ box or applying an RFID-ready¬ label to another box type. This enables a repeatable audit process by leveraging the RFID chip within the box label. You’ll be able to provide proof of controls and prove your security requirements with the utmost confidence.


RFID-ready Boxes and Labels

The Iron Mountain RFID-ready box is equipped with a pre-applied RFID label. With this label your asset is tagged and always ready for a requested audit.

Explore the Iron Mountain RFID-ready Box:


RFID Box

Download Full Reference Guide



Remain Compliant

Only 34% of organizations say they are using an automated tool to locate and preserve their relevant information.

SOURCE: Cohasset Associates I ARMA International 2016/2017 Information Governance Benchmarking Survey. N=1,000

74% of companies indicate they do not consistently or centrally monitor RIM program compliance in any program component, including physical storage assurance.

Source: 2012 Iron Mountain Compliance Benchmark Report

How RFID Works

All net new information stored at Iron Mountain will be prepared by packing your information in Iron Mountain RFID-ready boxes or boxes you to which you have applied an RFID label. The label contains a chip that can be detected and scanned by RFID readers.

RFID Readers scan for a passive radio frequency signal produced by the chip located in the RFID labels.

How RFID Audits Works

The scanned RFID signal transmits from the readers to the Iron Mountain database, securely verifying that the boxes are located in the proper place.

With an RFID-ready box or label, you can also use your own technology to track your boxes internally. Any RFID reader can scan the open source RFID chip. You can leverage this technology to locate your boxes quickly, wherever your inventory is located or while your information is in transit.

Once the audit is complete, you’ll receive a report that includes the overall target asset count and audit find rate, audit results by market, unresolved audit exceptions, and a recommendation on next steps including follow-up audits as necessary.