Presentation is loading. Please wait.

Presentation is loading. Please wait.

Overview and Requirements

Similar presentations


Presentation on theme: "Overview and Requirements"— Presentation transcript:

1 Overview and Requirements
IT Asset Inventory Overview and Requirements Information Security and Privacy Office

2 IT Asset Inventory Training Aid
Instructions Review Inventory Requirements Complete Inventory Template (s) Implement Secure Disposal and Destruction Methods

3 IT Asset Inventory Policy References and Resources
EISP-8.1: Enterprise IT Asset Management Policy: fRecord.aspx%3fid%3d303287%26moduleId%3d65 EISS 8d.2: IT Asset Management Standards for Apple Macintosh Products: fRecord.aspx%3fid%3d220908%26moduleId%3d65 ISPR-8a.1: Enterprise Secure Media Destruction Procedures: fRecord.aspx%3fid%3d305740%26moduleId%3d65 Inventory Template

4 Inventory Tools for Unmanaged Devices
What is an Unmanaged Device? Devices which are not managed by Enterprise Research Infrastructure Services (ERIS) or Health Information Systems (HIS) No property control number (Partners or Brigham) There are many methods to track inventory as you will see on the next slide. Please use these tools or other tools you define, to identify your inventory. Follow through on the data gaps and expect efficiencies after initial data capture. Send questions to

5 Inventory Information Can Be Obtained Through;
Enrollment in Partners Enterprise Apple Support (PEAS) Purchase queries Insight Application Organized by Grant Fund PeopleSoft Query Organized by Cost Center E-Buy Barcodes and Scanner Option to use barcodes and scanner Check w/RISO and/or Research Administration Multiple departments could purchase and share scanner ($500) Scans populate Inventory Template Eases annual inventory going forward Database Capture Note: You may require more than one resource to comply with inventory capture

6 Inventory Template (Provided via E-Mail Attachment)
Complete columns A-I J-> can be used to capture anything else Spreadsheets will be collected and uploaded in bulk to Service Now Configuration Management Database (CMDB) for future automation and enhancements.

7 Enterprise Secure Media Destruction Procedures (ISPR-8a.1)
Partners HealthCare Warehouse Pick Up and Disposal: Partners IS will pick up to 8 items at a time. Label equipment clearly for disposal Arrange for a pick-up Leave items in agreed upon location Secure Media Destruction Bin Disposal: Remove item from inventory using your organization’s standard process. If you don’t know where your bin is, contact your ISO; reference bulletin Cellular phones, smart phones, laptops, tablets, PDAs, hard drives, external hard drives, flash drives and other items of this nature. Media is also included and encompasses CDs, USB drives, floppy disks, video-tapes, and cassette tapes.

8 Use The Enterprise Process And Tools To Meet Policy Requirements
USER WAREHOUSE DEGAUSSER DISPOSAL ENVIRONMENTAL INTEGITY BIN Once you have been authorized to dispose of media or device Arrange for warehouse pick up item or drop in bin Media or device will be disposed of securely

9 Additional References
Inventory Collection TBD Arrange for Warehouse Pick Up BWHC: Call Service Desk at Request a bin pick up or removal Contact Contact Information Security Officer Locate a secure media bin Review Secure Media Recycling Poster

10 Contact Us Questions? Information Security and Privacy Office (ISPO)
Christina Mazzone ( )


Download ppt "Overview and Requirements"

Similar presentations


Ads by Google