Skip to content


IT Asset Management – We have effective process in place…don’t we?

IAITAM best practice

When we think about how technology has changed, it is concerning that so many people do not fully appreciate how much personal and confidential information is stored on ‘losable’ assets; I’m sure many of us have clicked on the ‘save password’ option more than once on our phones for convenience. On laptops we save important documents to our C Drives to work on remotely because the main server is slower than we are willing to put up with.

But what happens if the hard drive is damaged or our phone is lost/stolen? Particularly if our role is in the public sector and this information may be called upon for future reference or even for, evidence.

Disastrous consequences can befall government and private organizations when key assets or data is destroyed or lost. Everyone screams conspiracy or stupidity particularly for sensitive or vital data; however could these IT Asset Management faux pas simply result from grossly inefficient IT Asset Disposition processes?

So, why is IT Asset Disposition a vital part of IT Asset Management important?

Today IT Asset Disposition is more than just another waste stream an organization is accountable for. There are now multiple options available to organizations. Equipment reuse, software redeployment and resale provide savings opportunities and possibly pay for or afford a positive cash flow for the ITAD process.

With these opportunities and savings there are inherent risks associated with mishandled, lost or stolen assets caused by improper oversight.  IT Asset Managers must ensure any private data is properly removed using software which meets government data erasure standards or accredited IT disposal contractors and that this process is properly documented for audit purposes.

At any step during the ITAD process, errors can and do occur and organizations can be subject to fines, penalties and public disgrace.  It is vital that IT Asset Managers and their teams understand how to mitigate the risks associated with improper disposal of IT assets and determine the appropriate path for their organization and the options available.

How IAITAM can help?

The concept of IAITAM started as far back as 1998 when a group of software and hardware asset managers began meeting to discuss the need for a centralized organization devoted to expanding and codifying information and knowledge within the IT Hardware & Software Asset Management fields.

 

IAITAM’s mission is to be the principle resource for comprehensive IT Asset Management best practices worldwide including IT Asset Disposition. IAITAM enables practitioners and industry professionals to achieve continuous success through ongoing education, certifications and networking as well as providing information pathways for knowledge enrichment and professional growth. IAITAM has appointed APMG-International to manage the accreditation of training organizations that choose to offer training for one or more of the following IAITAM certifications:

  • ITAM Foundations
  • Certified Hardware Asset Management Professional (CHAMP)
  • Certified Software Asset Management (CSAM)
  • Certification in IT Asset Disposition (CITAD)
  • Certified Mobile Asset Manager (CMAM)
  • Certified IT Asset Manager (CITAM)

Advanced training programs and certification has been developed to build formal expertise and to gain the professional recognition necessary to function effectively within the IT Asset field and be relevant to a global community.

As a final thought I ask this, can you truly say that your cyber security policies are effective and up to date without fully knowing the number, type and location of all your IT assets and then disposing of them properly?

Posted in Cyber Security.

Tagged with , , , .