{"id":11086,"date":"2025-03-10T10:01:56","date_gmt":"2025-03-10T15:01:56","guid":{"rendered":"https:\/\/protechingenieria.com\/?p=11086"},"modified":"2025-03-21T08:24:15","modified_gmt":"2025-03-21T13:24:15","slug":"archivo-de-documentacion","status":"publish","type":"post","link":"https:\/\/protechingenieria.com\/en\/archivo-de-documentacion\/","title":{"rendered":"What is Document Custody and When is it Necessary?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11086\" class=\"elementor elementor-11086\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aec6a21 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"aec6a21\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-370a752 elementor-widget elementor-widget-text-editor\" data-id=\"370a752\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Most Companies That Consider External Document Custody Services Do So for One of Two Reasons:<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a35e71 elementor-widget elementor-widget-heading\" data-id=\"1a35e71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1.Lack of Storage Space <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa13308 elementor-widget elementor-widget-text-editor\" data-id=\"aa13308\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To continue archiving physical copies of the documents they produce, companies often face high storage costs or need to allocate that space for more productive activities.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11133f4 elementor-widget elementor-widget-heading\" data-id=\"11133f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. No One Takes Responsibility for Managing Archived Documents<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5450a28 elementor-widget elementor-widget-text-editor\" data-id=\"5450a28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This leads to various challenges, including:\nDocument filing and organization, Searching and retrieving documents when needed, Tracking who has access to which document and for how long, Ensuring document security, Returning documents to their designated storage location, Conducting document audits and purging outdated files, Monitoring retention periods, Ensuring confidential document disposal, By outsourcing document custody services, businesses can optimize space, improve efficiency, and maintain better control over their documentation.<\/p><p><a href=\"https:\/\/www.funcionpublica.gov.co\/eva\/gestornormativo\/norma.php?i=61791\" target=\"_blank\" rel=\"noopener\">Learn more<\/a><\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fef62f elementor-widget elementor-widget-image\" data-id=\"9fef62f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1-1024x535.webp\" class=\"attachment-large size-large wp-image-11109\" alt=\"archivo de documentaci\u00f3n\" srcset=\"https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1-1024x535.webp 1024w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1-300x157.webp 300w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1-768x401.webp 768w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1-18x9.webp 18w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1-150x78.webp 150w, https:\/\/protechingenieria.com\/wp-content\/uploads\/2025\/03\/archivo-de-documentacion1.webp 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9363575 elementor-widget elementor-widget-heading\" data-id=\"9363575\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Is Document Custody Necessary? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f671f61 elementor-widget elementor-widget-heading\" data-id=\"f671f61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Ahorro de costes de almacenamiento<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcdf6a8 elementor-widget elementor-widget-text-editor\" data-id=\"bcdf6a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">In certain cases, some documents must be stored indefinitely, but this doesn\u2019t mean companies have to spend a fortune on storage. An external document custody service  is significantly more cost-effective than keeping them in-house, especially when considering the cost per square meter**. The valuable office space that is freed up can be used for **income-generating activities.<\/p><p>Document storage services typically charge per stored unit, which can be a box, container, or binder used to hold documents. In some cases, if the documents being stored include files or medical records, the billing unit may be based on the linear meters of stored documents.<\/p><p>In any case, if the archived documentation is stored on the company\u2019s premises, the cost will be based on the total space allocated for document storage. However, if the documents are kept in an external document custody service, the company will only pay for the units of storage used. The savings can be significant, as outsourced storage facilities are often located in areas where the cost per square meter is much lower than that of the company\u2019s office location.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-beb7b0a elementor-widget elementor-widget-heading\" data-id=\"beb7b0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Improves the Security of Document Access<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec79b34 elementor-widget elementor-widget-text-editor\" data-id=\"ec79b34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The management of private document archives requires a security system that ensures protection and access identification, including surveillance cameras and other security measures\u2014features that a conventional business does not typically have in its facilities.<\/p><p>Using an outsourced document custody service transfers the responsibility for security to the service provider, who\u2014if properly chosen\u2014will have the knowledge, experience, and resources required to protect the company\u2019s confidential documentation.<\/p><p class=\"translation-block\">The company will not only guarantee the protection of access to documentation but also manage the traceability of requested documents to identify who requested them and how long they have had them. Additionally, it can recommend the secure disposal of outdated confidential documents.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab8a9d3 elementor-widget elementor-widget-heading\" data-id=\"ab8a9d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Enhances the Physical Security of Documentation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85d7ca1 elementor-widget elementor-widget-text-editor\" data-id=\"85d7ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The facilities of a document custody and archiving company are equipped with strict security measures to ensure the physical protection of documents. Compared to in-house storage, keeping documents in a purpose-built facility offers unmatched protection against theft, fires, floods, and natural disasters.<\/p><p>Each document is stored in a high-density shelving system and safeguarded with the latest fire detection and suppression technology. The security system consists of multiple layers, including internal and external monitoring, access control that restricts and logs all entries, movement tracking within the facility, and protective measures against flooding, among others.<\/p><p>Instead of assigning a single storage space for the entire document archive, the document inventory is divided and stored anonymously, identified only by a barcode, across various points within the facility. While unauthorized access to the facility is extremely unlikely, it would be impossible to identify which boxes belong to the same company.<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-772f147 elementor-widget elementor-widget-heading\" data-id=\"772f147\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Improves File Access<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-787a3c1 elementor-widget elementor-widget-text-editor\" data-id=\"787a3c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Searching for a document archive can be overwhelming, especially when colleagues and clients need quick access to critical information. For example, imagine a patient\u2019s medical history is unavailable before a surgery\u2014this could lead to serious complications.\nStoring documents with a document custody company ensures that files are always accessible when needed. Each document is coded and tracked within an inventory management database, making retrieval fast and efficient.<\/p><p>Having access to a secure online portal makes it easy to view the external inventory and request documents at any time. Many providers even offer the option to deliver physical documents directly to the client's premises or scan and send them digitally, ensuring quick and efficient access to important records.\u00a0<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ad4b34 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8ad4b34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cfb91b6 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"cfb91b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7819f1b elementor-widget elementor-widget-text-editor\" data-id=\"7819f1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Document custody also helps protect the company\u2019s privacy and confidential information. By securely storing and managing documents, businesses can prevent sensitive information from falling into the wrong hands, reducing the risk of legal and financial issues.<\/p><p>Para hacer la custodia documental correctamente, se deben seguir algunos pasos importantes:<\/p><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30ec961 elementor-widget elementor-widget-eael-feature-list\" data-id=\"30ec961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-30ec961\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-67bc5ce\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-lock\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 256A128 128 0 1 0 96 128a128 128 0 0 0 128 128zm96 64a63.08 63.08 0 0 1 8.1-30.5c-4.8-.5-9.5-1.5-14.5-1.5h-16.7a174.08 174.08 0 0 1-145.8 0h-16.7A134.43 134.43 0 0 0 0 422.4V464a48 48 0 0 0 48 48h280.9a63.54 63.54 0 0 1-8.9-32zm288-32h-32v-80a80 80 0 0 0-160 0v80h-32a32 32 0 0 0-32 32v160a32 32 0 0 0 32 32h224a32 32 0 0 0 32-32V320a32 32 0 0 0-32-32zM496 432a32 32 0 1 1 32-32 32 32 0 0 1-32 32zm32-144h-64v-80a32 32 0 0 1 64 0z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">1. Identify Important Documents<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Determine which documents are critical for your business and must be preserved. These may include contracts, receipts, financial reports, and important correspondence.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-0bb7200\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-edit\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 256c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm89.6 32h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h274.9c-2.4-6.8-3.4-14-2.6-21.3l6.8-60.9 1.2-11.1 7.9-7.9 77.3-77.3c-24.5-27.7-60-45.5-99.9-45.5zm45.3 145.3l-6.8 61c-1.1 10.2 7.5 18.8 17.6 17.6l60.9-6.8 137.9-137.9-71.7-71.7-137.9 137.8zM633 268.9L595.1 231c-9.3-9.3-24.5-9.3-33.8 0l-37.8 37.8-4.1 4.1 71.8 71.7 41.8-41.8c9.3-9.4 9.3-24.5 0-33.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">2. Organize the Documents<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Arrange the documents into files or folders based on relevance and date. This will make it easier to locate and retrieve them when needed.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-9183a1b\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-shield\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M622.3 271.1l-115.2-45c-4.1-1.6-12.6-3.7-22.2 0l-115.2 45c-10.7 4.2-17.7 14-17.7 24.9 0 111.6 68.7 188.8 132.9 213.9 9.6 3.7 18 1.6 22.2 0C558.4 489.9 640 420.5 640 296c0-10.9-7-20.7-17.7-24.9zM496 462.4V273.3l95.5 37.3c-5.6 87.1-60.9 135.4-95.5 151.8zM224 256c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm96 40c0-2.5.8-4.8 1.1-7.2-2.5-.1-4.9-.8-7.5-.8h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h352c6.8 0 13.3-1.5 19.2-4-54-42.9-99.2-116.7-99.2-212z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">3. Secure Storage <\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Ensure that documents are stored in a safe location and that only authorized personnel can access them. Storage areas should be protected from physical damage, such as floods or fires.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-1a0c82f\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">4. Access Control<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Restrict access to documents to maintain privacy and security. Only designated personnel should be allowed to handle sensitive information.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-328b8cd\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-check\" viewbox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 256c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm89.6 32h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48v-41.6c0-74.2-60.2-134.4-134.4-134.4zm323-128.4l-27.8-28.1c-4.6-4.7-12.1-4.7-16.8-.1l-104.8 104-45.5-45.8c-4.6-4.7-12.1-4.7-16.8-.1l-28.1 27.9c-4.7 4.6-4.7 12.1-.1 16.8l81.7 82.3c4.6 4.7 12.1 4.7 16.8.1l141.3-140.2c4.6-4.7 4.7-12.2.1-16.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">5. Secure Destruction<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">For documents that are no longer needed, ensure they are disposed of securely to prevent any risk of exposing confidential data.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c1b5dd elementor-widget elementor-widget-heading\" data-id=\"3c1b5dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What Happens During the Document Custody Process? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2737ec2 elementor-widget elementor-widget-text-editor\" data-id=\"2737ec2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The process includes various control and review mechanisms to ensure compliance with defined strategies and achieve documented objectives. Key aspects include:<\/p><ul><li>Storage and Handling:<\/li><li>Identification Based on Codes and References<\/li><li>Preservation and Protection Conditions<\/li><li>Optimized System and Interface for Access<\/li><\/ul><p>Key Identifications in the Process:<\/p><ul><li>Condition of the Files<\/li><li>Preservation Periods<\/li><li>Final Disposition<\/li><\/ul><p><!-- notionvc: ec362098-b46b-4afd-8640-45ac9c6de762 --><\/p><p><!-- notionvc: ce0c0eae-c42b-46f0-8984-cf6ddccc3bcd --><\/p><p><!-- notionvc: 69be6ae1-2ef5-4380-b570-1c2534847c28 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4758bf elementor-widget elementor-widget-eael-cta-box\" data-id=\"e4758bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-cta-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"eael-call-to-action cta-icon-flex bg-lite cta-preset-1\">\n\t    <div class=\"icon\">\n\t\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fas-bullhorn\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M576 240c0-23.63-12.95-44.04-32-55.12V32.01C544 23.26 537.02 0 512 0c-7.12 0-14.19 2.38-19.98 7.02l-85.03 68.03C364.28 109.19 310.66 128 256 128H64c-35.35 0-64 28.65-64 64v96c0 35.35 28.65 64 64 64h33.7c-1.39 10.48-2.18 21.14-2.18 32 0 39.77 9.26 77.35 25.56 110.94 5.19 10.69 16.52 17.06 28.4 17.06h74.28c26.05 0 41.69-29.84 25.9-50.56-16.4-21.52-26.15-48.36-26.15-77.44 0-11.11 1.62-21.79 4.41-32H256c54.66 0 108.28 18.81 150.98 52.95l85.03 68.03a32.023 32.023 0 0 0 19.98 7.02c24.92 0 32-22.78 32-32V295.13C563.05 284.04 576 263.63 576 240zm-96 141.42l-33.05-26.44C392.95 311.78 325.12 288 256 288v-96c69.12 0 136.95-23.78 190.95-66.98L480 98.58v282.84z\"><\/path><\/svg>\t    <\/div>\n\t    <div class=\"content\">\n            <h2 class=\"title eael-cta-heading\">Transform your business today!<\/h2><p><span class=\"notion-enable-hover\">Act now! It is essential for every modern company that wants to achieve greater productivity and efficiency in its management processes!<\/span><br \/><!-- notionvc: ce091acc-8b3d-4cfb-a8f3-05fa8229b3ee --><\/p><p><!-- notionvc: ce091acc-8b3d-4cfb-a8f3-05fa8229b3ee --><\/p>\t    <\/div>\n\t    <div class=\"action\">\n            <a href=\"https:\/\/protechingenieria.com\/en\/asesoria\/\" target=\"_blank\" class=\"cta-button cta-preset-1\">Contact Us<\/a>\t    <\/div>\n\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>La mayor\u00eda de las empresas que se plantean recurrir a servicios de custodia documental externa lo hacen por, al menos, una de estas dos razones: 1. Tienen problemas de espacio Para continuar archivando ejemplares f\u00edsicos de la documentaci\u00f3n que producen: el espacio que ocupan con dicha documentaci\u00f3n es costoso o lo requieren para otras labores m\u00e1s productivas. 2. Ninguna persona asume la responsabilidad de administrar la documentaci\u00f3n archivada lo que conlleva una serie de tareas variadas: archivo de documentaci\u00f3n, b\u00fasqueda, extracci\u00f3n para consulta, control de qui\u00e9n posee qu\u00e9 y durante cu\u00e1nto tiempo, seguridad de la documentaci\u00f3n archivada, retorno e inserci\u00f3n de la documentaci\u00f3n a su archivador o caja, expurgo de documentos, supervisi\u00f3n del tiempo de conservaci\u00f3n, eliminaci\u00f3n confidencial, etc. Saber m\u00e1s \u00bfPor qu\u00e9 es necesario la custodia documental? 1. Ahorro de costes de almacenamiento En ciertas situaciones, hay archivos de documentaci\u00f3n que deben ser guardados de manera indefinida, pero esto no implica que se deba invertir una fortuna en el almacenaje de dichos documentos. Un servicio de custodia de documentos externo es considerablemente m\u00e1s econ\u00f3mico que guardarlos en las oficinas propias, considerando el costo por metro cuadrado. El preciado espacio laboral que se libera puede emplearse para producir ingresos. Los servicios de almacenamiento documental generalmente cobran por cada unidad almacenada que puede ser la caja o recipiente donde se guardan documentos o archivadores, o tambi\u00e9n puede ser directamente el archivador. En ciertos escenarios, si lo que se requiere guardar son expedientes o historiales cl\u00ednicos, la unidad de facturaci\u00f3n puede ser los metros de documentos guardados. En cualquier situaci\u00f3n, si la documentaci\u00f3n archivada est\u00e1 en las oficinas mismas, se abonar\u00e1 por el espacio total destinado al archivo de documentaci\u00f3n, mientras que si la documentaci\u00f3n archivada est\u00e1 en un servicio de custodia documental externo, solo se abonar\u00e1 por las unidades de facturaci\u00f3n empleadas. El ahorro puede ser significativo, considerando que la documentaci\u00f3n externalizada probablemente estar\u00e1 en un \u00e1rea donde el costo por metro cuadrado es considerablemente inferior al de la ubicaci\u00f3n donde se ubican las oficinas de la empresa. 2. Mejora la seguridad del acceso a la documentaci\u00f3n La administraci\u00f3n de archivos de documentaci\u00f3n privada necesita de un sistema de seguridad que garantice la protecci\u00f3n e identificaci\u00f3n de accesos, c\u00e1maras de vigilancia, etc., elementos que un negocio convencional no suele incorporar en su registro. La utilizaci\u00f3n de un servicio de custodia documental externalizada confiere la responsabilidad de la seguridad al proveedor de dicho servicio que, si ha sido adecuadamente escogido, poseer\u00e1 los saberes, experiencia y recursos requeridos para proteger toda la documentaci\u00f3n confidencial de la empresa. La empresa no solo garantizar\u00e1 la protecci\u00f3n del acceso a la documentaci\u00f3n, sino que tambi\u00e9n administrar\u00e1 la rastreabilidad de la documentaci\u00f3n que se solicita para identificar qui\u00e9n la solicit\u00f3 y desde cu\u00e1ndo la posee. Adem\u00e1s, podr\u00e1 sugerir la eliminaci\u00f3n privada de documentaci\u00f3n confidencial anticuada. 3. Mejora la seguridad f\u00edsica de la documentaci\u00f3n Las instalaciones de una empresa de la custodia y archivo de documentaci\u00f3n poseen las medidas de seguridad m\u00e1s estrictas para asegurar la protecci\u00f3n f\u00edsica de los documentos. En contraposici\u00f3n al almacenamiento interno, la custodia de documentos en un centro dise\u00f1ado espec\u00edficamente brinda una protecci\u00f3n inigualable frente a hurtos, incendios, inundaciones y cat\u00e1strofes naturales. Cada documento se guarda en un sistema de estanter\u00edas de alta densidad y se resguarda con la m\u00e1s reciente tecnolog\u00eda de detecci\u00f3n y extinci\u00f3n de incendios. El sistema de seguridad se compone de varias capas, que incluyen supervisi\u00f3n tanto externa como interna, regulaci\u00f3n de accesos, que restringe y documenta cualquier entrada, control de desplazamiento dentro de la instalaci\u00f3n, y medidas de protecci\u00f3n contra inundaciones, entre otros. En vez de asignarle un solo espacio de almacenamiento a todo el archivo de documentaci\u00f3n el inventario de documentos se divide y se guarda de manera an\u00f3nima, identificada solo por un c\u00f3digo de barras, en diversos puntos de la instalaci\u00f3n. Si es extremadamente improbable que alguien sin autorizaci\u00f3n tenga acceso a la instalaci\u00f3n, resultar\u00eda imposible reconocer las cajas que pertenecen a la misma compa\u00f1\u00eda. 4. Mejora el acceso a los archivos La b\u00fasqueda de un archivo de documentaci\u00f3n puede resultar agobiante, en particular cuando existen colegas y clientes que requieren r\u00e1pidamente obtener dicha informaci\u00f3n. Consideremos que la historia cl\u00ednica de un paciente que requiere operaci\u00f3n, por ejemplo, no est\u00e1 disponible. La conservaci\u00f3n de documentos en una compa\u00f1\u00eda de custodia de documentos asegura que los archivos se encuentren accesibles cuando se requieren, dado que cada documento se codifica y se le sigue dentro de una base de datos de administraci\u00f3n de inventarios. La disponibilidad de un portal seguro para consultar documentaci\u00f3n en l\u00ednea facilita la visualizaci\u00f3n del inventario externo y la solicitud de los archivos en cualquier instante. Numerosos proveedores incluso brindan la opci\u00f3n de entregar la documentaci\u00f3n en persona en las instalaciones del cliente, o de ser escaneada y enviada de forma digital.\u00a0 La custodia documental tambi\u00e9n ayuda a proteger la privacidad y la informaci\u00f3n confidencial de la empresa. Al almacenar y proteger el archivo de documentaci\u00f3n, se puede evitar que la informaci\u00f3n caiga en manos equivocadas, lo que puede resultar en problemas legales y financieros. Para hacer la custodia documental correctamente, se deben seguir algunos pasos importantes: 1. Identificar los documentos importantes Establezca qu\u00e9 documentos son relevantes para su negocio y qu\u00e9 documentos deben ser preservados. Los documentos relevantes pueden abarcar acuerdos, recibos, informes financieros y correspondencia relevante. 2. Organizar los documentos Organiza los documentos en archivos o carpetas seg\u00fan su relevancia y fecha. Esto simplificar\u00e1 la localizaci\u00f3n y recuperaci\u00f3n de los documentos si se requieren. 3. Almacenamiento seguro: Garantice que los documentos se guarden en un sitio seguro y que \u00fanicamente el personal autorizado pueda acceder a ellos. Es necesario almacenar los documentos en un lugar que est\u00e9 resguardado frente a da\u00f1os f\u00edsicos, como inundaciones o incendios. 4. Control de acceso Es fundamental restringir el acceso a los documentos para asegurar la privacidad y protecci\u00f3n de la informaci\u00f3n. Garantice que \u00fanicamente el personal autorizado pueda acceder a los documentos de relevancia. 5. Destrucci\u00f3n segura En caso de documentos que ya no son<\/p>","protected":false},"author":5,"featured_media":11095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-11086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-custodia","category-gestion-documental"],"_links":{"self":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts\/11086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/comments?post=11086"}],"version-history":[{"count":38,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts\/11086\/revisions"}],"predecessor-version":[{"id":11147,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/posts\/11086\/revisions\/11147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/media\/11095"}],"wp:attachment":[{"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/media?parent=11086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/categories?post=11086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protechingenieria.com\/en\/wp-json\/wp\/v2\/tags?post=11086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}