Asset Management Policy
Asset Management Policy
Asset Management Policy
1.0 Overview
Assets that cost less than Rs. _________ and do not contain data that should
not be specifically tracked. These include components such as video or sound
cards. However, all assets that store data should be tracked regardless of cost.
Examples include:
Hard Drives
Temporary storage drives
Tapes - including system backup data.
Although not specifically tracked, other storage devices such as CD ROM
disks and floppy disks are covered by this policy for disposal and secure
storage purposes (see Section 3.3 below).
3.3 Small Memory Devices
Small memory storage assets will not be tracked by location but by the
trustee. These assets include:
Floppy disks
CD ROM disks
Memory sticks
Trustees (employee/ personnel given access to the asset) of the devices must
sign for receipt of the devices in their possession. All employees must also
agree to handle memory sticks, floppy disks, and CD ROM disks in a
responsible manner and follow the following guidelines:
A. Asset Transfer Checklist – When an asset listed on the Asset Types list is
transferred to a new location or trustee, the IT Asset Transfer Checklist
must be completed by the trustee of the item and approved by an
authorized representative of the organization. The trustee is the person in
whose care the item resides. If the item is a workstation, then the trustee is
the most common use of the workstation. For other equipment, the trustee
is the primary person responsible for maintenance or supervision of the
equipment.
The trustee must fill out the Asset Transfer Checklist form and indicate
whether the asset is a new asset, moving to a new location, being
transferred to a new trustee, or being disposed of. The following
information must be included:
Asset Type
ID number
Asset Name
Current Location
Current Trustee
New Location
New Trustee
Locations of Sensitive Data
Once the trustee fills out and signs the Asset Transfer Checklist form, it must
be signed by an authorized representative.
B. Data entry - After the Asset Transfer Checklist has been completed, it will
be submitted to the asset tracking database manager. The asset tracking
database manager will ensure that the information on the form is entered
into the asset tracking database within one week.
Asset purchase
Asset relocation
Change of asset trustee - including when an employee resigns or is
terminated
Asset disposal, including:
Asset returned to manufacturer or reseller due to warranty return
Asset disposal is a special case since all sensitive data must be removed
during or prior to disposal. The manager of the user of the asset should
determine the level of sensitivity of the data stored on the device. The data
erasure requirements for the device are based upon the sensitivity of the data
as determined during the data assessment process:
Floppy disk
Memory stick
CD ROM disk
Storage tape
Hard drive.
RAM memory
ROM memory or ROM memory devices.
This policy defines the types of data that may be stored on removable media,
whether that media may be removed from a physically-secure facility, and
under what conditions such removal would be permitted.
Floppy disk
Memory stick
CD ROM disk
Storage tape
Memory Sticks
B. Sensitive - Data may only be removed from secure areas with the
permission of a director level or higher level of management. Approvals
are effective on a one-time bases only.
C. Confidential - The data may only be removed from secure areas with the
permission of a Vice President or higher level of management. Procedures
for maintaining data security while in transit and at the new destination of
the media must be documented.
D. Secret - The data may only be removed from secure areas with the
permission of the President or a higher level of management. Procedures
for maintaining data security while in transit and at the new destination of
the media must be documented
E. Top Secret - The data may never be removed from secure areas.
10.0 Enforcement
Because data security and resource protection are critical to the organization,
employees that do not adhere to the foregoing policy may be subject to
disciplinary action - up to and including termination of employment. Any
employee who becomes aware of any violation of this policy is required to
report such violation to their supervisor or other another authorized
representative of the organization.
11.0 Employee Training and Acknowledgment of Policy
Purpose / Use:
ASSET REQUEST
Date Needed:
Asset
ID Asset Description Location Owner Phone
Number
Approved:
Finance/Admin: Date: