Protection of PII on storage media leaving the premises
To meet the “protection of PII on storage media leaving the premises” requirement, you must ensure any PII stored on portable, removable, or transportable media is protected from unauthorized access, misuse, or corruption whenever it leaves your controlled facilities, typically through strong encryption, controlled custody, and secure handling through transit and disposal. This is a practical, operations-heavy control: you need clear rules, technical enforcement, and auditable proof.
Key takeaways:
- Encrypt PII on any media that can leave your premises, and manage the keys so loss of the device does not mean loss of PII.
- Control custody end-to-end (authorization, checkout, transport, receipt, and secure disposal) with logs you can produce on demand.
- Make it hard to “accidentally” export PII by limiting who can write to removable media and by using monitored, approved transfer methods.
“Media leaving the premises” shows up in real incidents as a simple failure mode: a forgotten backup drive, a laptop shipped for repair, a decommissioned server sent to a recycler, or a contractor walking out with a USB stick. ISO/IEC 27018 treats this as a direct protection requirement for PII processed in public cloud contexts where the organization acts as a PII processor, but the operational pattern is universal: if PII can be copied onto something portable, it can be lost, stolen, tampered with, or corrupted in transit.
The good news is that this requirement is straightforward to operationalize if you treat it as a lifecycle control rather than a one-time encryption setting. You need (1) a clear scope of what counts as “media” and what counts as “leaving,” (2) technical controls to prevent or encrypt PII exports, (3) a custody process for the cases you allow, and (4) evidence that is easy to produce under audit pressure.
This page translates the requirement into a step-by-step implementation playbook a CCO, GRC lead, or compliance officer can hand to IT, Security, and Operations and then verify with artifacts.
Regulatory text
Requirement excerpt: “PII on media leaving the organization's premises shall be protected against unauthorized access, misuse, or corruption.” 1
Operator meaning: if storage media that contains PII is taken outside your controlled facilities (or outside the cloud provider premises in a processor context), you must apply safeguards that prevent:
- Unauthorized access (confidentiality loss from theft, loss, or improper sharing)
- Misuse (intentional abuse, unsanctioned copying, policy violations)
- Corruption (damage, tampering, incomplete transfer, or integrity loss)
The common operational interpretation aligned to this requirement is: encrypt portable/removable media containing PII, control who can create it, track custody during transit, and validate secure return/disposal. 1
Plain-English interpretation (what you’re being held to)
If PII is written to anything that can leave your premises, you must treat that media like a high-risk data transfer channel. Your baseline expectation should be:
- Default deny for copying PII to removable media.
- Explicitly approved exceptions only, with encryption and documented custody.
- Verifiable controls that demonstrate protection through the whole journey: creation → storage → transit → receipt → sanitization/disposal.
Auditors typically won’t accept “we tell people not to” as a control. They want proof that the organization either technically prevents it or tightly controls it.
Who it applies to (entity and operational context)
Applies to: Cloud Service Providers acting as PII processors and any organization operating a similar processor role where PII may be placed onto media that leaves controlled facilities. 1
Operational contexts that trigger the requirement:
- Backups or exports placed on external drives for recovery, migration, or customer delivery.
- Field work where staff carry laptops, removable drives, or ruggedized storage with PII.
- Hardware repair and replacement where devices may be shipped offsite.
- Decommissioning of servers, storage arrays, or endpoint devices leaving for resale, return, or recycling.
- Third-party handling (couriers, data recovery firms, eDiscovery providers) transporting or storing the media.
If you can’t answer “What media can leave, and how do we know when it happens?” you have an operational gap.
What you actually need to do (step-by-step)
1) Define scope: what counts as “media” and “leaving”
Create a short scope statement your teams can execute:
- Media: removable drives (USB, external HDD/SSD), tapes, laptops, mobile devices with local storage, removable server drives, and any shipment of physical storage components.
- Leaving the premises: exiting controlled office/data center space, being shipped to a third party, carried by employees/contractors, or transferred to disposal/recycling.
Deliverable: a one-page standard that names approved and prohibited media types and the default rule for PII.
2) Set the default rule: block removable media for PII unless approved
Operationalize a “default deny” posture:
- Disable USB mass storage where business permits.
- Restrict write access to removable media to specific roles and managed devices.
- Require a documented exception for any PII export to physical media.
This reduces your reliance on after-the-fact detective controls.
3) Encrypt any allowed PII on portable/removable media
For allowed cases, encryption is the simplest way to meet “unauthorized access” protection. Implement:
- Strong encryption on the media (full-disk or container-based) before data is written.
- Separate key control so the person transporting the device does not also have unrestrained access to keys.
- Key lifecycle controls (issuance, rotation practices, revocation on loss, access logging).
Your test: if a drive is lost, can an unauthorized person read PII from it? The control must make the answer “no” in practice. 1
4) Add integrity and corruption protections for transit
Corruption is often overlooked. Put lightweight integrity checks into the process:
- Generate checksums/hashes for the exported dataset before shipment.
- Validate hashes on receipt before use.
- Use write-protected modes where feasible (especially for “golden” backups).
- Maintain a chain-of-custody log so you can investigate if corruption occurs.
5) Implement custody controls (authorization, checkout, transport, receipt)
Create a simple custody workflow that matches your risk:
- Authorization: require an approved ticket/request that states the purpose, dataset, media type, encryption method, and recipient.
- Checkout log: asset tag, serial number, who checked it out, date/time, and destination.
- Secure transport: tamper-evident packaging, trusted courier options, and delivery confirmation.
- Receipt confirmation: named recipient attests to receipt and verifies encryption and integrity checks.
- Return or destruction: media is returned, sanitized, or destroyed with evidence.
If a third party is involved, your third-party due diligence should explicitly cover media handling and transport expectations.
6) Control the “shadow paths” where PII leaves accidentally
Most failures come from side channels:
- Laptop local downloads and sync folders.
- Debug logs, database dumps, or support bundles copied to USB “temporarily.”
- Printing-to-file workflows saved to removable media.
Mitigations:
- Endpoint DLP rules for PII patterns to block copying to removable media.
- Limit admin access that enables bulk export tools.
- Approved secure transfer alternatives (managed file transfer, secure portals) so teams don’t “make their own way.”
7) Train the few roles that matter, and make the process usable
Targeted training beats broad awareness here. Train:
- IT operations (backup/restore and hardware lifecycle)
- Support/escalation engineers (data extraction workflows)
- Facilities/asset management (shipping and disposal)
- Procurement/third-party managers (courier/recycler/data recovery oversight)
Keep the approved workflow fast. Slow controls create workarounds.
Required evidence and artifacts to retain
Keep evidence tied to the lifecycle, not just policy PDFs:
Policy & standards
- Media handling standard for PII (scope, defaults, exceptions)
- Encryption and key management standard for portable media
- Acceptable use standard covering removable media
Technical configuration evidence
- Endpoint configuration showing removable media controls
- Encryption configuration screenshots/config exports
- Key management access controls and logs (role-based access evidence)
Operational records
- Exception approvals/tickets for PII exports
- Chain-of-custody logs (checkout, shipment, receipt, return)
- Integrity verification records (hash/checksum logs where used)
- Incident records for lost media (even if no breach occurred)
Third-party artifacts (if applicable)
- Contracts/SOW clauses requiring protection of PII on transported media
- Due diligence reviews focused on physical media handling
- Destruction/sanitization certificates from recyclers or destruction providers
Common exam/audit questions and hangups
Expect these questions, and prepare “show me” artifacts:
- “List the media types that can leave the premises and the controls for each.”
- “How do you prevent employees from copying PII to USB drives?”
- “Show evidence that exported PII was encrypted before leaving the building.”
- “How do you manage encryption keys for portable media?”
- “What is your chain of custody for backup tapes/drives?”
- “How do you verify data integrity after transport?”
- “How do you handle devices shipped for repair or returned at end of lease?”
Hangups auditors focus on:
- Policies without technical enforcement.
- Encryption with shared passwords or uncontrolled keys.
- No inventory of media that leaves facilities.
- Reliance on individuals to remember steps with no logged workflow.
Frequent implementation mistakes and how to avoid them
- Mistake: treating laptops as “not media.” Laptops are portable storage. Apply the same “leaving” logic and require full-disk encryption plus access controls.
- Mistake: allowing ad hoc USB exceptions. Require a ticketed exception with named owner and a defined return/destruction step.
- Mistake: encrypting the drive but storing the key on the same device or in the same shipment. Keep key access separate from the transported object.
- Mistake: ignoring corruption/integrity. Add checksum validation for exports that will be used for recovery or production restoration.
- Mistake: no third-party controls. If a courier, recycler, or repair shop touches the media, bake requirements into contracts and verify operationally.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so don’t assume regulators will cite this exact ISO clause in an action. Treat it as a control that reduces breach likelihood and narrows impact when portable media is lost or stolen. ISO/IEC 27018 frames the obligation clearly: PII on media leaving premises must be protected against unauthorized access, misuse, or corruption. 1
A practical 30/60/90-day execution plan
First 30 days (Immediate stabilization)
- Publish a short “PII on portable media” standard: default deny, named exceptions, encryption requirement, custody steps.
- Identify the highest-risk flows: backups, hardware disposal, support data pulls, migration exports.
- Turn on or tighten endpoint controls for removable media on managed devices where feasible.
- Stand up an exception workflow (ticket template + approval routing + required fields).
By 60 days (Operational control + evidence)
- Implement encryption for any approved portable media path and document key handling.
- Create custody logs (checkout/shipment/receipt/return) and make them mandatory for approved exports.
- Add integrity verification for backup/export shipments where corruption risk is material.
- Update third-party contracts/SOWs for transport, repair, and disposal to include required safeguards and evidence (custody, encryption, destruction proof).
By 90 days (Coverage + assurance)
- Run a tabletop test: “encrypted drive lost in transit” and verify you can prove protections and execute key revocation steps.
- Audit your own exceptions: confirm each export has approval, encryption evidence, custody trail, and closeout (return/destruction).
- Add monitoring/alerts for attempts to write PII to removable media (where your tooling supports it).
- Consider a control automation layer. Daydream can help you centralize third-party evidence requests and map the operational artifacts (custody logs, encryption proof, third-party destruction certificates) to the requirement so audits don’t become a scavenger hunt.
Frequently Asked Questions
Does “media leaving the premises” include employee laptops used for travel?
Yes, laptops are portable storage that regularly leaves controlled facilities. Treat them as in scope for protecting PII against unauthorized access and misuse, typically through full-disk encryption and controlled access. 1
If we encrypt a USB drive, is that sufficient to meet the requirement?
Encryption is usually the baseline for preventing unauthorized access, but auditors will still expect custody controls and a clear exception process. You should also address corruption risk for data that must be reliably restored or re-imported. 1
What counts as “leaving the premises” for a cloud provider or processor?
Operationally, treat it as leaving the set of controlled environments you manage (facilities, secured areas, and approved transport processes). If PII is placed onto physical media and then transported outside controlled custody, it triggers the requirement. 1
How do we handle backups that must be shipped to a customer or another site?
Require an approved request, encrypt before writing, record chain of custody through shipment and receipt, and verify integrity on arrival. Close out the record with confirmation of secure storage, return, or destruction. 1
What evidence do auditors typically want to see?
They will ask for the policy/standard, proof that removable media controls are enforced, and a sample set of exception records with encryption and custody proof. If third parties transport or destroy media, retain their destruction/sanitization certificates and related contract terms.
We block USB drives, but engineers can still create database dumps locally. Are we covered?
Blocking USB reduces one exit path, but the requirement is about protection when media leaves premises. Address local dumps with controls on who can export PII, where exports can be stored, and which transfer methods are approved for moving data offsite. 1
Footnotes
Frequently Asked Questions
Does “media leaving the premises” include employee laptops used for travel?
Yes, laptops are portable storage that regularly leaves controlled facilities. Treat them as in scope for protecting PII against unauthorized access and misuse, typically through full-disk encryption and controlled access. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
If we encrypt a USB drive, is that sufficient to meet the requirement?
Encryption is usually the baseline for preventing unauthorized access, but auditors will still expect custody controls and a clear exception process. You should also address corruption risk for data that must be reliably restored or re-imported. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
What counts as “leaving the premises” for a cloud provider or processor?
Operationally, treat it as leaving the set of controlled environments you manage (facilities, secured areas, and approved transport processes). If PII is placed onto physical media and then transported outside controlled custody, it triggers the requirement. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
How do we handle backups that must be shipped to a customer or another site?
Require an approved request, encrypt before writing, record chain of custody through shipment and receipt, and verify integrity on arrival. Close out the record with confirmation of secure storage, return, or destruction. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
What evidence do auditors typically want to see?
They will ask for the policy/standard, proof that removable media controls are enforced, and a sample set of exception records with encryption and custody proof. If third parties transport or destroy media, retain their destruction/sanitization certificates and related contract terms.
We block USB drives, but engineers can still create database dumps locally. Are we covered?
Blocking USB reduces one exit path, but the requirement is about protection when media leaves premises. Address local dumps with controls on who can export PII, where exports can be stored, and which transfer methods are approved for moving data offsite. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream