Device data handling
Controlled
Audit-ready workflows
Data wipe standard
NIST
NIST 800-88 aligned
Returns + refurbishment
Managed
Secure chain-of-custody
Secure Returns Workflow
Receive → Diagnose → Wipe → Refurbish
Security Controls Built for Clinical Trial Operations
Device security is not a policy document—it is execution. Delve implements operational controls across returns, storage, wiping, and redeployment so sponsors can demonstrate compliance and reduce risk.
- RMA initiation workflows and labeled returns packaging
- Barcode verification and device chain-of-custody logs
- Quarantine + diagnostics prior to refurbishment
- NIST 800-88 aligned secure wipe and wipe evidence retention
- Device re-provisioning, re-kitting, and redeployment readiness
- MDM controls: lockdown, app restrictions, remote wipe capability
- Inventory disposition tracking (redeploy, refurbish, retire)
The Four Pillars of Secure Device Returns
Security in decentralized trials is operational. Delve applies repeatable, auditable controls to protect patient data, prevent leakage, and keep redeployable inventory compliant.
Chain-of-Custody
Barcode verification, receiving logs, and controlled handling.
NIST 800-88 Wipe Evidence
Secure wipe performed and logged for audit readiness.
MDM + Lockdown
Restrictions, remote wipe capability, and controlled app access.
Refurbish + Re-Kit
Quarantine, diagnostics, refurbishment, and redeployment tracking.
MDM, Lockdown Mode & Remote Wipe Controls
Delve can deploy devices in a “study-only” configuration. That reduces variability, prevents app drift, and ensures devices can be remotely secured if a device is lost or the study ends.
- App whitelisting and restriction profiles
- Remote wipe capabilities and device retirement flows
- OS update governance and controlled release windows
- Device status auditing (policy compliance, enrollment state)
- Documented configuration baselines per study
Security becomes repeatable when devices are standardized.
Need Audit-Ready Device Security?
Let Delve manage secure returns, verified wipes, and controlled redeployment—without adding burden to sites.
Talk to a Security Specialist