Office of Protective Services Police in California

Police departments have to protect evidence collected during the investigation of a crime scene. Much of that evidence is now gathered in digital form as images, videos, and audio files. The chain of custody for all evidence in a criminal investigation needs to be preserved to prevent tampering that could render it inadmissible in court.

Office of Protective Services Police in California
“SecureData delivered the perfect solution. Now we can protect and preserve the chain of custody for the data we gather, and we have the user logs to prove it.” - Detective Amo Virk
Law Enforcement
Office of Protective Services Police in CaliforniaDownload PDF

The Office of Protective Services (OPS) generally provides specialized law enforcement services to individuals within the Developmental Services Community. Regardless of this, it is our aim to be trusted law enforcement professionals, wherever we can best serve the citizens of California. In order to accomplish this vision, we are dedicated to ever improving our knowledge, skills and abilities, as well as broadening our opportunities to serve.

The problem

Detective Amo Virk works as an investigator with the Office of Protective Services Police in Califfornia. He and his fellow officers regularly investigate suspicious deaths, sexual assaults, dependent abuse cases, financial crimes, and other criminal activity. The department needed a better way to handle sensitive digital case files. Previously, Protective Services investigators transported critical data on inexpensive USB drives with minimal security features. In order for the data gathered to be evidentiary, it needed to be protected while in transit to preserve the chain of custody. Det. Virk contacted SecureData to help him find the right solution.

THE SOLUTION

Det. Virk wanted a secure solution for safer data handling that was easy to deploy and that could establish a high standard for the protection of digital evidence in criminal investigations. He found exactly what he and his team of investigators needed. “SecureData delivered the perfect solution. Now we can protect and preserve the chain of custody for the data we gather, and we have the user logs to prove it.”

the results

After analyzing the company's requirements, two solutions were recommended to address both endpoint control and secure backup needs.

Endpoint Protection & Device Management

For USB security, the company implemented the SecureData Remote Management Console paired with SecureUSB BT, a hardware-encrypted drive with FIPS 140-2 Level 3 validation. The cloud-based Remote Management Console gives IT administrators a centralized, browser-based platform to manage and monitor all USB devices across the organization. Combined with SecureGuard, SecureData's port-blocking tool, only authorized USB devices are permitted to connect to company endpoints. All intellectual property stored on managed drives is protected by password authentication, ensuring sensitive data remains secure and compliant, even if a device is lost or stolen.

Automated Secure Backup

For Microsoft 365 data protection, the company deployed Veeam™ Backup in conjunction with SecureDrive BT, a FIPS 140-2 Level 3 validated hardware-encrypted external drive. A custom Veeam script automates the entire backup process unlocking the SecureDrive BT, executing the backup, and locking the drive upon completion. The result is an immutable, encrypted backup copy that cannot be modified, giving the company a reliable and auditable recovery point at all times.

A Unified Compliance-Ready Solution

By combining SecureData's endpoint management and encryption capabilities with Veeam's advanced backup platform, the company established a robust data protection strategy that addresses both data-at-rest security and regulatory compliance without adding complexity to daily operations.

Encrypted Drives

try for free

Experience our solutions in your environment with a complimentary 30-day evaluation. Request demo today to assess performance and compatibility.

request evaluation