Workflow Explainer

Chain of Custody Tracking

Verified, tamper-evident custody from origin seal to final delivery

A step-by-step operational workflow showing how Trailio AssetShield creates an unbroken, auditable chain of custody for assets in transit - from origin sealing through each handoff to final delivery acceptance.

AssetShield AssetTagTrueBrand

Custody gaps create liability, fraud, and audit failure

In high-value asset logistics, the most common failure is not theft during transit - it is the inability to prove what happened and who was responsible at each transfer point. When a consignment arrives damaged or short, operators face an evidence vacuum: no custodian names, no timestamps, no seal records.

Manual custody processes - paper dockets, verbal acceptance, counter-signatures - produce records that are easily disputed, easily lost, and rarely complete across multi-party routes. Insurance claims fail. Disputes are unresolvable. Regulatory audits expose gaps.

Chain-of-custody tracking replaces this with a digitally verified, tamper-evident event record at every handoff - binding each custodian to their custody moment and creating a legally defensible audit trail from first seal to final delivery.

Custody gap

No record of who had the asset between handoff points

Tamper exposure

Seals replaced without detection between scan events

Disputed liability

No custodian name or timestamp to assign responsibility

Audit trail failure

Incomplete records invalidate regulatory or insurance review

Grey market diversion

Assets diverted at handoff points with no digital record

How chain-of-custody tracking operates

Each step produces a verified event record. No handoff proceeds without a custodian scan. No gap is left undetected.

  1. 1

    Origin Sealing

    Asset sealed and identity registered

    The asset is placed in an HSA tamper-evident security bag or container. A serialised seal identifier is scanned and registered in Trailio - creating the first custody event with custodian identity, timestamp, and location. This initiates the chain-of-custody record.

  2. 2

    First Handoff

    Custody transferred to first carrier

    The first carrier or handler performs a verified scan to accept custody. Trailio records the accepting custodian's identity, device, time, and location. If the seal is found tampered or the scan is not completed, the system flags an open custody gap immediately.

  3. 3

    Transit Monitoring

    Continuous monitoring across transit stages

    Each intermediate handoff - depot, hub, cross-dock, transit checkpoint - requires a custody scan. AssetTag GPS data supplements scan events with continuous location telemetry. Route deviations and geo-fence exits trigger automated alerts to the operations team.

  4. 4

    Exception Handling

    Tamper or deviation events escalated

    If a seal is found broken, a scan is missed, or a route deviation is unresolved, an escalation workflow activates. Notifications are sent to designated operations contacts. The asset is placed in a query state until the incident is reviewed and resolved.

  5. 5

    Delivery Acceptance

    Recipient accepts custody with verified scan

    At final delivery, the recipient performs a scan to close the custody chain. Seal integrity is confirmed at this point. If the seal is broken on arrival, the event is recorded as a tamper event before acceptance - providing a defensible basis for claims or rejection.

  6. 6

    Record Closure

    Chain of custody closed and archived

    Once custody is accepted at the destination, the chain-of-custody record is closed and archived. The full event log - every scan, every custodian, every location - is available for audit query, dispute resolution, insurance documentation, or regulatory inspection.

What the platform detects and records

Missed custody scans

Any handoff not confirmed within the expected timeframe is flagged as a custody gap.

Tamper event detection

Broken, missing, or anomalous seal records at any scan point trigger an immediate escalation.

Duplicate scan detection

A seal or asset identity scanned in two locations simultaneously indicates a cloning or forgery attempt.

Route deviation alerts

GPS telemetry from AssetTag detects vehicles or assets outside authorised geographic corridors.

Custodian identity audit

Every event is attributed to a named custodian - providing individual accountability at each transfer.

Cross-leg custody visibility

Multi-carrier, multi-leg routes are tracked as a single continuous chain - not fragmented per carrier.

HSA physical products in this workflow

Trailio chain-of-custody tracking is designed for use with HSA-manufactured physical security products. Each physical seal, bag, or label carries a serialised identity registered in the platform - creating a physical-digital chain that cannot be broken without detection.

HSA Security Bags

Origin sealing for consignments, valuables, and high-value assets. Bag serial number registered at point of sealing - initiating the custody chain.

HSA Vault Seals

NFC-enabled seals for vault doors and containers. Each access event scan-recorded and linked to an authorised custodian record.

HSA Security Labels

Carton and unit-level tamper-evident labels. Scanned at warehouse pick, despatch, and delivery to confirm physical integrity.

HSA Security Tape

Pallet and carton sealing with unique serial identifiers. Verified at cross-dock and final delivery to detect any in-transit access.

Deploy this workflow in your operation

Our solutions team works with enterprise and government clients to implement, configure, and integrate Trailio workflows into existing operational environments.