{"id":56,"date":"2015-12-11T15:22:37","date_gmt":"2015-12-11T15:22:37","guid":{"rendered":"http:\/\/it-toolkits.org\/blog\/?p=56"},"modified":"2016-07-11T09:33:18","modified_gmt":"2016-07-11T09:33:18","slug":"protecting-business-interests-with-policies-for-it-asset-management","status":"publish","type":"post","link":"https:\/\/it-toolkits.org\/Blog\/protecting-business-interests-with-policies-for-it-asset-management.html","title":{"rendered":"Protecting Business Interests With Policies for IT Asset Management"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_Asset1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-132\" src=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_Asset1.jpg\" alt=\"IT-Toolkits_Asset\" width=\"950\" height=\"350\" srcset=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_Asset1.jpg 950w, https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_Asset1-300x111.jpg 300w\" sizes=\"(max-width: 950px) 100vw, 950px\" \/><\/a><\/p>\n<p><em>Where is that laptop?\u00a0 Who has that printer?\u00a0 Do we have sufficient software licenses for every user?<\/em>\u00a0 These are the types of questions <em>IT asset management<\/em> is meant to answer.\u00a0 As an operational practice, IT asset management serves multiple purposes, as reflected in the list below:<\/p>\n<ol>\n<li>Asset management practices are used to minimize the risk that investments made in technology (hardware, software and training) will be lost due to theft, destruction or other damage.<\/li>\n<li>Asset management practices are used to ensure that technology assets are properly allocated to end-users to optimize usage and workplace productivity.<\/li>\n<li>Asset management practices are used to simplify technical support and maintenance requirements.<\/li>\n<li>Asset management practices are used to lower IT &#8220;cost of ownership&#8221; and maximize IT ROI.<\/li>\n<li>Asset management practices are used to ensure that software licensing is in full compliance, minimizing the risk of legal and regulatory problems.<\/li>\n<li>Asset management practices are used to support &#8220;sister&#8221; policies for disaster recovery, email usage, data security, and technology standards.<\/li>\n<\/ol>\n<h3>The Role of Asset Management Policy<\/h3>\n<p>Asset management practices define the actions to be taken to protect and preserve technology assets &#8211; from physical locks on equipment to inventory tags. In conjunction, <em>policy<\/em> provides the &#8220;<strong><em>asset management mindset<\/em><\/strong>&#8220;. This <em>mindset<\/em> acknowledges that&#8221;<em>technology assets are important to us and we take them seriously enough to put up with protective controls<\/em>&#8220;. To realize all of the intended benefits, this <em>mindset<\/em> must be integrated into daily operations and the corporate culture &#8212; <strong>and this is achieved through adopted policy<\/strong>.<\/p>\n<p>Once approved, asset management policies provide the governing authority to implement all aspects of the\u00a0<em>asset management program<\/em>.\u00a0 While policy terms and specifics will vary according to organizational needs, the most effective policies are designed around (13) key components, as listed below:<\/p>\n<ol>\n<li><strong>Asset Standards. <\/strong>To identify the specific hardware and software products (assets) to be used and supported.<\/li>\n<li><strong>Configuration Standards<\/strong>. To identify how standardized hardware and software assets are to be configured.<\/li>\n<li><strong>Variance Process.<\/strong> To establish the criteria and means by which product and configuration standards can (and should) be waived.<\/li>\n<li><strong>Support of &#8220;Non- Standard&#8221; Assets.<\/strong> To establish the services that will IT provide for non-standard products and configurations.<\/li>\n<li><strong>BOYD\u00a0Guidelines<\/strong>. To establish the means for supporting &#8220;Bring Your Own&#8221; devices (tablets, phones, notebooks, laptops).<\/li>\n<li><strong>Asset Procurement Guidelines.<\/strong> To identify the policies and procedures relating to the acquisition, procurement and\/or rental of technology assets.<\/li>\n<li><strong>Security Guidelines. <\/strong>\u00a0To identify how physical and logical security will be provided for hardware and software assets (locks, passwords, virus protection, etc.).<\/li>\n<li><strong>Software Licensing Guidelines.\u00a0 <\/strong>To keep track of asset licensing, ensuring compliance with all relevant agreements, laws and regulations.<\/li>\n<li><strong>Technical Support and Maintenance Practices.<\/strong> To identify the processes to be followed for asset related technical support, repair, service dispatch, preventative maintenance, and problem escalation.<\/li>\n<li><strong>Configuration Management Guidelines.<\/strong> To identify related practices for asset configuration management and change control to ensure consistent, updated configuration and timely updates as may be required.<\/li>\n<li><strong>Asset Inventory Practices.<\/strong> To keep track of the location and assignment of all allocated technology assets (hardware and software), including related record keeping.<\/li>\n<li><strong>Asset M.A.C. Practices.<\/strong> To govern requests and activities relating to physical moves, adds and changes (M.A.C.) with regard to allocated hardware and software assets.<\/li>\n<li><strong>Asset Disposal Guidelines.<\/strong> To identify the processes to be followed when hardware and software assets are no longer in use and disposal is appropriate (which can include a donation program).<\/li>\n<\/ol>\n<h3>Your Top 10 Policy Planning Questions<\/h3>\n<p>As discussed, once they are documented, established (and approved), asset management policies provide the means to &#8220;institutionalize&#8221; underlying objectives. Policy is a tool by which related practices are implemented and executed, laying out the &#8220;what, how and why&#8221; of IT asset management.\u00a0 Not only does policy provide the means for governance, it also provides the basis for related planning and decision making.\u00a0 To realize all of these goals and benefits, policy planning must address the following &#8220;top 10&#8221; planning questions:<\/p>\n<ol>\n<li>What are your primary asset management goals?<\/li>\n<li>What are the likely benefits to be realized from the standardized management of IT assets?<\/li>\n<li>What are the negative aspects and\/or risks associated with IT asset management?<\/li>\n<li>Is executive management support required to plan and implement these practices?<\/li>\n<li>If executive management support is required, are you likely to get it?<\/li>\n<li>How would any chosen policies and procedures be implemented and executed?<\/li>\n<li>Do you have the resources to plan, implement, and execute any chosen policies and procedures?<\/li>\n<li>What are the likely costs associated with managing information technology assets?<\/li>\n<li>What are the likely objections to adopted asset management practices and how can they be addressed?<\/li>\n<li>What are the consequences of inaction with regard to managing IT assets?<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Where is that laptop?\u00a0 Who has that printer?\u00a0 Do we have sufficient software licenses for every user?\u00a0 These are the<\/p>\n","protected":false},"author":1,"featured_media":132,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-56","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-policy-development"],"_links":{"self":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts\/56"}],"collection":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":0,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/media\/132"}],"wp:attachment":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}