Time
2 hours 23 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello and welcome back to I t. Security Policy Training here on Cyber Eri.
00:05
This is part of module for the disposal policy with myself. Troy Lemaire
00:10
Learning objective for this training will be in regard to technology, equipment disposal
00:15
as well as employees, purchase of disposed equipment and putting that information inside of a policy.
00:22
We go ahead and look at the actual policy that is provided by Sands. Is there one of their templates?
00:28
The overview talks about how certain pieces of information are gonna be on different type of storage media.
00:34
And to protect that data, you might have to use special tools
00:38
securely erased that data prior to it being disposed off.
00:45
If we look at the policy itself
00:47
when technology assets have reached the end of their useful life, they should be sent to, and you would put whatever is the team that's gonna be responsible for properly disposing of that equipment
00:59
in the next section says that that team is going to securely erase all storage mediums in accordance to occurred Industry best standards and those best standards can be found all over the Internet. If you look
01:11
all data including all files and license software shall be removed from the equipment.
01:15
No computer technology equipment maybe sold 10 individual other than through the process identified in the policy, which will get to a little bit later.
01:23
Computer equipment should be disposed of. These skips dumps landfills.
01:29
All electronic drives must have d gosta overwritten with a commercially available disclaiming program.
01:36
Computer equipment refers to desktops, laptops, tablets, no books, anything that would have a hard drive
01:42
and equipment disposal team. We'll place a sticker on equipment indicating the disc has been wiped
01:48
to let everybody know that in the date and the time of that, wiping
01:53
technology with equipment with non functioning memory will have to the memory. Are the device removed and be physically destroyed?
02:00
Now, looking at the next section of this policy to employees purchase of dispose equipment.
02:06
This is one of those sections that you may or may not want to put in there. You might have a
02:09
thing where you always sell it to a commercial provider or you don't want to let the employees by that because of the vast amount of people that you have working in your organization
02:19
on things like that. But if you do want to allow them place to purchase that equipment. This is where you would go ahead and modify it to kind of fit your need in this policy and within your own organisation.
02:30
Equipment which is working but reached its end of useful life
02:32
will be may made available for purchase by employees.
02:37
A lottery system will be used to determine who has the opportunity to purchase the equipment.
02:40
All equipment purchase must go through the lottery process.
02:45
Finance and information technology will determine an appropriate costs for each item.
02:50
All purchases are final. No warranty or support will be provided. And that's their important cause. Once they take that piece of equipment home that needs to be theirs. And just because they bought it from the company does not mean that they could come back and ask for the help desk or whoever is the I T support team. For any type of assistance on that, they would have to go provide Go find somebody to provide that assistance outside of the company
03:10
equipment not in working order. Our remaining from the lobby process will be donated are disposed. According to current environmental guidelines,
03:17
Technology has contacted with several organizations to donate a properly dispose of outdated technology costs.
03:23
Roger Leaving the premises all equipped must be removed from the information technology inventory system.
03:35
Today's brief lectured. We covered the disposal policy
03:38
in regards to technology, equipment disposal and employees. Purchase of disposed equipment
03:46
disposal policy recap Question. Erase all storage mediums in accordance with current industry
03:52
blank blank
03:53
and that would be best practices.
03:58
Another recap question the finance and information technology.
04:00
We'll determine a or an blank costs for each item,
04:06
and that would be inappropriate cost.
04:11
Looking forward in our next lecture as part of the server policy section, we're gonna look at activity review policy.
04:18
Russians Clarification Always you can reach my side. Very message. User name at Troy Lemaire and thank you for attending this training on cyber Eri.

Up Next

Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
IT Security Officer at Acadian Ambulance
Instructor