2 hours 23 minutes
Hello and welcome back to I t. Security Policy Training here on Cyber Eri.
This is part of module for the disposal policy with myself. Troy Lemaire
Learning objective for this training will be in regard to technology, equipment disposal
as well as employees, purchase of disposed equipment and putting that information inside of a policy.
We go ahead and look at the actual policy that is provided by Sands. Is there one of their templates?
The overview talks about how certain pieces of information are gonna be on different type of storage media.
And to protect that data, you might have to use special tools
securely erased that data prior to it being disposed off.
If we look at the policy itself
when technology assets have reached the end of their useful life, they should be sent to, and you would put whatever is the team that's gonna be responsible for properly disposing of that equipment
in the next section says that that team is going to securely erase all storage mediums in accordance to occurred Industry best standards and those best standards can be found all over the Internet. If you look
all data including all files and license software shall be removed from the equipment.
No computer technology equipment maybe sold 10 individual other than through the process identified in the policy, which will get to a little bit later.
Computer equipment should be disposed of. These skips dumps landfills.
All electronic drives must have d gosta overwritten with a commercially available disclaiming program.
Computer equipment refers to desktops, laptops, tablets, no books, anything that would have a hard drive
and equipment disposal team. We'll place a sticker on equipment indicating the disc has been wiped
to let everybody know that in the date and the time of that, wiping
technology with equipment with non functioning memory will have to the memory. Are the device removed and be physically destroyed?
Now, looking at the next section of this policy to employees purchase of dispose equipment.
This is one of those sections that you may or may not want to put in there. You might have a
thing where you always sell it to a commercial provider or you don't want to let the employees by that because of the vast amount of people that you have working in your organization
on things like that. But if you do want to allow them place to purchase that equipment. This is where you would go ahead and modify it to kind of fit your need in this policy and within your own organisation.
Equipment which is working but reached its end of useful life
will be may made available for purchase by employees.
A lottery system will be used to determine who has the opportunity to purchase the equipment.
All equipment purchase must go through the lottery process.
Finance and information technology will determine an appropriate costs for each item.
All purchases are final. No warranty or support will be provided. And that's their important cause. Once they take that piece of equipment home that needs to be theirs. And just because they bought it from the company does not mean that they could come back and ask for the help desk or whoever is the I T support team. For any type of assistance on that, they would have to go provide Go find somebody to provide that assistance outside of the company
equipment not in working order. Our remaining from the lobby process will be donated are disposed. According to current environmental guidelines,
Technology has contacted with several organizations to donate a properly dispose of outdated technology costs.
Roger Leaving the premises all equipped must be removed from the information technology inventory system.
Today's brief lectured. We covered the disposal policy
in regards to technology, equipment disposal and employees. Purchase of disposed equipment
disposal policy recap Question. Erase all storage mediums in accordance with current industry
and that would be best practices.
Another recap question the finance and information technology.
We'll determine a or an blank costs for each item,
and that would be inappropriate cost.
Looking forward in our next lecture as part of the server policy section, we're gonna look at activity review policy.
Russians Clarification Always you can reach my side. Very message. User name at Troy Lemaire and thank you for attending this training on cyber Eri.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered