Asset Management Policy V3.0
Asset Management Policy V3.0
Asset Management Policy V3.0
-Confidential-
All information contained in this document is proprietary and intended solely for use by
1
Document Control
Document Publication History
Authorized Signatory
2
Table of Contents
1. PURPOSE......................................................................................................................................4
2. SCOPE............................................................................................................................................4
3. POLICY ..........................................................................................................................................4
3
1. Purpose
The purpose of the IT Asset Management Policy is to protect the company against loss
and prevent security incidents, to reduce the company’s risk profile to external and
internal pressures, to state commitment to legal compliance and to lower cost and
improve productivity through more efficient and effective IT Asset Management. IT
Asset Management is a foundational policy which helps support other IT Operations and
Information Security policies. The policy ensures that information systems, applications
and components on or accessed from JSPL network, and owned by JSPL or hosting JSPL
data, are effectively documented and tracked throughout their life-cycle.
2. Scope
This policy applies to all employees/users and affiliates operating within the company’s
network environment or utilising Information Resources. It covers the data networks,
LAN servers and personal computers (stand-alone or network-enabled), located at JSPL
offices and JSPL production locations, where these systems are under the jurisdiction
and/or ownership of JSPL, and any personal computers, laptops, mobile device and or
servers authorised to access the JSPL data networks. No employees/users are exempt
from this policy.
3. Policy
JSPL requires that all IT Assets must be documented and tracked from the day they enter
our network or environment, until after they have been decommissioned.
3.1 Asset Planning
Certain activities or events may trigger acquisition and/or disposition of IT Assets, such
as:
• Scheduled asset acquisitions, conducted in accordance with the capacity management
plan or obsolescence needs.
• Receiving an IT Asset Requisition/Disposal Form due to an unplanned event(theft,
damage etc.).
3.2 Asset Acquisition
• JSPL IT Location HOD’s shall request new or replacement of IT Assets through NFA.
• If a purchase or lease agreement exists for the kind of asset being requested, that asset
shall be ordered from the existing vendor, pursuant to the terms of the agreement.
• If such an agreement does not exist, IT Support may recommend entering into one.
3.3 Asset Inspection, Acceptance and Distribution
• Physical assets shall be received by the JSPL stores department and forwarded to IT
Department.
• IT shall inspect and test assets for performance and capability prior to acceptance, if
possible.
• Purchase Department shall contact the vendor for replacement of the nonconforming
asset and dispose of the nonconforming asset in accordance with any purchase
agreement in place.
4
• All assets must have an ID number. Either an internal tracking number will be assigned
when the asset is acquired or the use of Manufacturer ID numbers.
• An asset tracking database shall be created to track assets. It will include all information
on the Asset Transfer Checklist table and the date of the asset change.
• When an asset is acquired, an asset ID will be assigned for the asset and its information
shall be entered in the asset tracking database.
• Only IT personnel shall distribute and install IT Assets.
• In the case of assets designed for use by individuals, installation shall be scheduled
primarily for the user’s convenience.
• Upon installing hardware, IT Support shall give each item a unique Asset ID. IT shall
update the IT Asset Inventory Database after installing assets.
5
• IT can install Endpoint device management software, as required, on any Endpoint
connected to the JSPL network in order to manage JSPL policy, legal, and commercial
compliance requirements.
• The removing or disabling of Endpoint device management software without prior
approval of IT is considered a breach of this policy.
• IT will audit JSPL owned Endpoint devices on the JSPL Domain as required, and has the
ability to install updates to software on these devices to address software vulnerabilities
or licensing issues with IT managed software.
4.4 Authentication
Endpoint devices containing JSPL information assets that are not publicly available, or
devices which attach to JSPL network, must be secured as appropriate by a network.
6
5. Policy Compliance
• Compliance Measurement
The Information security team will verify compliance to this policy through various
methods, including but not limited to, periodic walk-through, business tool reports,
internal and external audits, and feedback to the policy owner.
• Exceptions
Any exception to the policy must be approved by the Information Security Committee
in advance.
• Non-compliance
An employee found to have violated this policy may be subject to disciplinary action,
up to and including termination of employment.