18 Oct 2022

67

Asset Management Policy

Format: APA

Academic level: College

Paper type: Research Paper

Words: 819

Pages: 3

Downloads: 0

This document was mainly designed for the purposes of protecting and safeguarding organizational resources, maintaining accurate records of the organizations physical and logical assets as well as establishing the policies and procedures required for asset control. The policies set forth in this document will help in the preventing the loss of physical organizational assets, software or data.

This policy is designed to:

lay out all the necessary requirements that are needed to ensure that information systems are used within their contractual and defined limits.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

protect the organization from the risks associated with poor and improper management of IT systems.

establish the procurement and management processes of IT assets and systems.

ensure that all the IT assets and systems are registered within the IT departments management systems.

ensure that all organizational assets are maintainable, compatible, correctly licensed and supported within the organization structure.

Scope 

The policies outlined in this document apply to all the computer information systems and assets that are purchased by or on behalf of the organization. This includes:

All computer information systems

Individual pieces of computerized systems and equipment

Software products used by the organization.

Any equipment owned by the organization or personal that is connected to or used with the infrastructure implemented by the organization

This policy applies to all individuals (employees, stakeholders, partners, contactors, suppliers and customers) who intend to procure or use IT assets and systems by or on behalf of the organization.

Delegation of the IT Asset Management Authority 

The IT director shall be responsible for the administration and enforcement of this policy.

The IT director may devolve the authority for the function of asset management.

Heads of branches may delegate the asset management function to a member of their staff.

Each person delegated with the authority if asset management will have to partake the Asset Certification Course within 180 days of being assigned their responsibilities.

Guiding Statements 

All IT systems and hardware will be purchased in harmony with organizational procurement protocols.

The IT department shall be responsible for providing support and maintenance either directly or through a third party.

In the event that a refresh budget has been allocated, the oldest equipment shall be prioritized. The hardware refresh process may also include equipment whose life cycle had not expired.

All hardware assets that are whose life cycle is considered to have expired should be withdrawn and not reallocated into service.

With regards to the issue or installation of new IT hardware, all relevant equipment details will be recorded in the organization’s IT asset register.

Guiding Principles 

Safeguard the integrity and accuracy of all financial and administrative recording of the organization’s assets.

Safeguard all IT assets, software and information systems procured.

Promote due care in the management of all procures assets.

Safeguard organizational interests in the disposal of assets.

Assets Tracked 

Computer Systems – Laptops and Desktops

Networking Equipment – Routers, Switches, Firewalls, Servers

Copiers, Fax Machines, Printers

Handheld Devices

VoIP desk phones

Miscellaneous hardware

IT Asset Management Policy 

It is within the scope of the IT department to define the standards on how IT assets shall be managed and ensure that they conform with organizational, federal, and agency mandates and procedures. This policy establishes the guiding business principals and rules for managing IT resources throughout their lifecycles.

The organization shall:

Provide training and empower the employees to attend the relevant trainings in Software Asset Management (SAM) and Software License Management) to help strengthen the understanding of both legal and compliance requirements. This also includes the needed guidelines and expectation in the protection of intellectual property rights.

Regularly conduct assessments on IT asset inventories and their usage for the purposes of establishing controls to ensure the maximum use of installed software, IT equipment and services for the benefit of the organization.

Maintain and track IT asset data by tracking equipment from their point of purchase, to usage, disposal and requirements as well as the data collected at integration points with ITSM.

Analyze the usage and any other relevant data that the organization has for the purposes of making cost effective decisions and inform the IT department for resource planning, budgeting and future acquisitions.

Right-size the number of devices (desktops, laptops and mobile phones) issued out to the employees by IT that is consistent with the regulations as stipulated in the Telework Enhancement Act of 2010.

Strive to develop, maintain and promote knowledge sharing sessions to end users on this policy and the IT Asset Management (ITAM) processes and procedures, as well as how they integrate with other policies and process that are in harmony with the management of IT services and assets.

Be responsible for building centralized ITAM services and processes that around the following lifecycle stages: (I) Planning and budgeting; (II) Purchase; (III) Deployment; (IV)Management; (IV) Disposal.

Safeguard the planning and budgeting phase on the acquisition of IT asset and make sure that they are associated with the compromised system being disposed or replaced.

Purchase and implement an IT asset tracking and management tool for both internal and external workers that supports the core lifecycle processes as well as the integration of other solutions.

Monitor the performance and usage of all IT assets and systems by developing compliance reports and key performance indicators. Factors to be considered include:

the number of software licenses being used relative to the total number of licenses that were purchased and deployed.

the number of software assets that are maintained as per the contract.

References 

Omar, S. (2019). Developing Cybersecurity Programs and Policies . Pearson Education 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Asset Management Policy.
https://studybounty.com/asset-management-policy-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 437

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 112

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration