Mobilix
← Back to Blog
March 22, 2026 · Mobilix Team

Protecting IT Equipment During an Office Move: Chain of Custody and Handling

IT equipment represents the highest value-per-pound category in any office move. A single server rack can contain $100,000–$500,000 in hardware. A mishandled hard drive can contain $1 million in business-critical data. And unlike desks and chairs, IT equipment cannot simply be replaced with a purchase order — data recovery, system reconfiguration, and downtime costs can exceed the hardware value by orders of magnitude.

Yet in most office moves, IT equipment is handled by the same general labor crew that moves filing cabinets. This is a risk management failure.

The Actual Risks

Physical Damage

IT equipment is precision electronics housed in metal enclosures that are not designed for transport shock. The most common damage events:

  • Hard drive failure from impact. Traditional spinning-disk drives (still common in servers and NAS devices) are vulnerable to shock damage. A drop of 30 cm onto a hard surface while the drive is powered can cause a head crash that destroys the platters and all data. Even when powered off, drops from table height can damage the head assembly.
  • Bent or broken connectors. Server blades, switches, and rack-mounted equipment have rear-panel connectors that protrude and are easily bent or snapped during handling.
  • Cracked circuit boards. Flexing or impact can crack PCBs, causing intermittent failures that may not appear until days or weeks after the move.
  • Display damage. Monitors and all-in-one computers have screens that do not survive impacts that the rest of the unit would handle fine.

Data Loss

Beyond physical damage, the move process creates data loss risks:

  • Equipment powered down without proper shutdown procedures
  • Backup drives or media mixed with general contents and lost
  • Cable disconnection without documentation, leading to incorrect reconnection
  • Equipment stored in environments with temperature or humidity extremes during transit

Security

An office move is a data security event. Equipment is outside your controlled environment during transit:

  • Devices containing sensitive data are in a moving truck that may make multiple stops
  • Storage media (drives, USB devices, backup tapes) can be lost during packing and unpacking
  • Unauthorized access to equipment during transit (moving trucks are not secure facilities)

The Chain of Custody Protocol

Chain of custody for IT equipment during a move means that every device is tracked, documented, and accounted for from the moment it is disconnected at the old location until it is verified operational at the new location.

Step 1: Inventory Before Anything Is Touched

Create a complete inventory of all IT equipment to be moved:

  • Asset tag / serial number for every device
  • Category: Server, workstation, monitor, switch, router, UPS, NAS, printer, phone, other
  • Data classification: Does this device contain or store data? If yes, what classification level? (Public, internal, confidential, restricted)
  • Condition at pre-move: Functional, damaged, decommissioned
  • Special handling requirements: Weight, fragility, orientation requirements (some servers must remain upright), temperature sensitivity
  • Destination location: Exact position in the new space (room, rack position, desk number)

This inventory becomes the tracking document throughout the move. Nothing ships without being on the list. Nothing is received without being checked against the list.

Step 2: Data Protection Before Disconnect

Before any IT equipment is disconnected:

Full backup. Complete backup of all servers, NAS devices, and any workstations with local data. Verify backup integrity (test restore at least one critical dataset). Store backup media separately from the equipment being moved — if the moving truck is in an accident, you do not want your backups in the same truck as your servers.

Proper shutdown. Every device shut down using the correct procedure — not just powered off. Servers need clean shutdowns. Network equipment needs configuration saves before power-off. UPS units need to be discharged and shutdown per manufacturer procedure (some UPS batteries vent hydrogen when mishandled during transport).

Cable documentation. Before disconnecting a single cable, photograph every cable connection on every device. Front and back. Label both ends of every cable with a numbered tag. Create a cable map that documents which numbered cable connects which ports. This is the step most IT teams skip and most regret — reconnecting a server rack with 50+ unlabeled cables is a multi-day headache.

Step 3: Packing and Protection

IT equipment packing requirements are different from general office contents:

Servers and rack equipment:

  • Remove from racks before transport (racks are heavy, top-heavy, and roll-prone in trucks)
  • Original packaging is ideal but rarely available. Use anti-static bubble wrap and foam padding
  • Hard drives should be removed from servers and transported separately in padded, anti-static cases. This eliminates the highest-value damage risk.
  • Each server wrapped, padded, and placed in a dedicated moving crate — not stacked with other items
  • Label each crate with the asset tag, handling instructions ("FRAGILE — ELECTRONICS — THIS SIDE UP"), and destination rack position

Workstations (desktops):

  • Disconnect and pack each workstation as a unit with its peripherals
  • Monitors packed separately with screen protection (foam or cardboard face protector)
  • Mice, keyboards, and cables bagged and labeled with the workstation's asset tag
  • If workstations have traditional hard drives and data has not been backed up, transport drives separately

Network equipment (switches, routers, access points, firewalls):

  • Configuration backed up before disconnect
  • Pack in anti-static bags then padded containers
  • Small network equipment is high-value and easy to lose — dedicated container, not mixed with general IT

UPS units:

  • IMPORTANT: Some UPS units contain sealed lead-acid batteries that are classified as hazardous materials for transport. Check the unit specifications and comply with Transportation of Dangerous Goods (TDG) requirements.
  • Batteries should ideally be transported upright
  • Larger rack-mounted UPS units are extremely heavy (50–100+ kg) — specialized handling equipment required

Step 4: Transport

Separate transport for IT equipment. IT should not be on the same truck as furniture. Furniture shifts during transport. A 200 kg desk sliding into a server crate during a hard braking event is a catastrophe.

If separate transport is not possible, IT equipment should be:

  • Loaded last (unloaded first)
  • Strapped independently (not relying on surrounding items for stability)
  • Placed in a climate-appropriate area of the truck (not against exterior walls in extreme temperatures)

Driver instructions:

  • No stops between locations (direct transport)
  • Speed limits observed (shock damage increases with speed over bumps and potholes)
  • Climate control maintained if transporting temperature-sensitive equipment in extreme weather

Step 5: Setup and Verification at New Location

Receiving process:

  • Check every arriving item against the inventory list
  • Inspect for visible damage before unpacking (photograph any external damage to crates)
  • Unpack and inspect each device before installation
  • Report any damage immediately to the move coordinator (for insurance claim documentation)

Reconnection sequence:

  1. Network infrastructure first (switches, routers, firewalls, access points) — and test connectivity
  2. Servers and storage — reconnect per cable map, power on, verify all services
  3. Workstations — reconnect, power on, verify network connectivity and application access
  4. Printers and peripherals — reconnect and test
  5. Phone system — reconnect and test

Verification checklist for each device:

  • Powers on normally
  • No unusual sounds (clicking, grinding — indicates drive damage)
  • All network connections established
  • All stored data accessible
  • All applications functional
  • All peripheral devices recognized and operational

Step 6: Post-Move Data Verification

Within 48 hours of the move:

  • Verify full data integrity on all servers and storage systems
  • Run diagnostic checks on all server hard drives (SMART data showing no new errors)
  • Verify backup systems are operational and running scheduled backups at the new location
  • Test disaster recovery procedures (can you restore from the pre-move backup if needed?)
  • Confirm security systems are operational (firewalls, access controls, monitoring)

Insurance and Liability

Standard moving company cargo insurance covers items at declared value or per-pound rates. For IT equipment, per-pound coverage is absurdly inadequate — a 5 kg server worth $15,000 would be covered for $50 at typical per-pound rates.

Options:

  • Declared value coverage from the mover: Declare the actual value of each item. Coverage costs 1–3% of declared value. A $100,000 server room declaration costs $1,000–$3,000 in insurance premium.
  • Your own commercial property insurance: Check whether your policy covers property in transit. Many do, but with limitations. Confirm with your broker before the move.
  • Specialty IT transit insurance: Available from specialized insurers. Covers full replacement value plus data recovery costs. Cost varies by value and distance.

The cost of proper IT equipment handling — dedicated packing, separate transport, chain of custody documentation — typically adds $3,000–$8,000 to a 50-workstation office move. The cost of a single server failure: $50,000–$200,000 in hardware, data recovery, and downtime. There is no scenario where cutting corners on IT handling is the right economic decision.

Have a Move Coming Up? Let's Plan It.

Get a Free Quote
Get a Quote