0% found this document useful (0 votes)
22 views

Hardware

The document discusses asset management policies and procedures for controlling hardware procurement, tracking, and reporting. It recommends reviewing policies to ensure they encompass procedures for approving procurement, using asset tags and databases to track equipment, maintaining an up-to-date inventory with equipment details, and having procedures for moving and disposing of unused hardware securely.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Hardware

The document discusses asset management policies and procedures for controlling hardware procurement, tracking, and reporting. It recommends reviewing policies to ensure they encompass procedures for approving procurement, using asset tags and databases to track equipment, maintaining an up-to-date inventory with equipment details, and having procedures for moving and disposing of unused hardware securely.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Hardware

50

Is there an organization policy for upgrading the hardware

based on technology changes?

51

Is there an effective preventive maintenance program in

place for all significant equipment?

52

Is equipment downtime kept within reasonable limits

(say

<5%)

53

Is a reasonable effort made to acquire data centre and

networking hardware that is compatible with the existing

environment?

54

Is anyone in the IT organization responsible for

identifying potentially unnecessary equipment and taking

appropriate action?
55

Is a formal inventory of all IT hardware available?

56 Are there procedures to update documentation

whenever

Changes made in the hardware?

18. Review and evaluate policies and procedures for controlling

the procurement and movement of hardware.

Asset management is the controlling, tracking, and reporting of organizational assets to

facilitate accounting for the assets. Without effective asset management, the company

will be subject to the increased expense of duplicate equipment in situations where

equipment is available but unaccounted for. The company will also be subject to unnecessary lease
expenses if leased equipment is not adequately tracked and returned on

time.

Similarly, without adequate asset management, end-of-life equipment conditions

may not be noted, resulting in increased risk of

hardware

failure.

Additionally, theft of

equipment that is not tracked likely


would go unnoticed. In the context of this step, the

assets being referred to are computer

hardware, such as

desktops,

laptops,

servers, and

so

on.

How

Review and evaluate the company’s asset management policies and procedures, and

ensure that they encompass the following:

• Asset procurement process Ensure that this process requires appropriate

approvals prior to the purchase of hardware.

• Asset tracking Ensure that the company is using asset tags and has an asset

management database.

• Current inventory of all equipment Ensure that an inventory contains the

asset number and location of all hardware, along with information about

the equipment’s warranty status, lease expiration, and overall lifecycle (that

is, when it is no longer eligible for vendor support). Ensure that an effective

mechanism is in place for keeping this inventory up to date. A sample of asset

tags also should be inspected visibly and tied back to the inventory.

• Asset move and disposal procedures Ensure that unused equipment is

stored in a secure manner. Also ensure that data are erased properly from

equipment prior to its disposal.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy