Sample Hardware And Electronic Media
Disposal Policy Template

Contents

{COMPANY-NAME} owned surplus hardware, obsolete machines, and any equipment beyond reasonable repair or reuse, including media, are covered by this policy.

Where assets have not reached end of life, it is desirable to take advantage of residual value through reselling, auctioning, donating, or reassignment to a less critical function. This policy will establish and define standards, procedures, and restrictions for the disposition of non-leased IT equipment and media in a legal, cost-effective manner.

{COMPANY-NAME}’s surplus or obsolete IT assets and resources (i.e. desktop computers, servers, etc.) must be discarded according to legal requirements and environmental regulations through the appropriate external agents and {COMPANY-NAME}’s upgrade guidelines.

All disposition procedures for retired IT assets must adhere to company approved methods.

Free Security Policy Templates

Get a step ahead of your cybersecurity goals with our comprehensive templates.

IT Security Policy Templates

Definitions

  • Beyond reasonable repair: Refers to any and all equipment whose condition requires fixing or refurbishing that is likely to cost as much or more than total replacement.
  • Chain of Custody (CoC): Refers to the chronological documentation of the custody, transportation, or storage of evidence to show it has not been tampered with prior to destruction.
  • Disposition: Refers to the reselling, reassignment, recycling, donating, or disposal of IT equipment through responsible, ethical, and environmentally sound means.
  • Non-leased: Refers to any and all IT assets that are the sole property of {COMPANY-NAME}, that is, equipment not rented, leased, or borrowed from a third-party supplier or partner company.
  • Obsolete: Refers to any and all equipment that no longer meets requisite functionality.
  • Surplus: Refers to hardware that has been replaced by upgraded equipment or is superfluous to existing requirements.

Overview

Hardware and electronic media disposition is necessary at {COMPANY-NAME} to ensure the proper disposition of all non-leased {COMPANY-NAME} IT hardware and media capable of storing member information. Improper disposition can lead to potentially devastating fines and lawsuits, as well as possible irreparable brand damage.

Policy Details

Coordinated by {COMPANY-NAME}’s IT Department. The IT Department is responsible for backing up data from IT assets slated for disposition (if applicable) and removing company tags and/or identifying labels. IT is responsible for selecting and approving external agents for hardware sanitization, reselling, recycling, or destruction of the equipment.

IT is also responsible for the chain of custody in acquiring credible documentation from contracted third parties that verify adequate disposition and disposal that adhere to legal requirements and environmental regulations.

It is the responsibility of any employee of {COMPANY-NAME}’s IT Department, with the appropriate authority, to ensure that IT assets are disposed of according to the methods in the Hardware and Electronic Media Disposal Procedure.

It is imperative that all dispositions are done appropriately, responsibly, and according to IT lifecycle standards, as well as with {COMPANY-NAME}’s resource planning in mind. Hardware asset types and electronic media that require secure disposal include, but are not limited to, the following:

  • Computers (desktops and laptops)
  • Printers
  • Handheld devices
  • Servers
  • Networking devices (hubs, switches, bridges, and routers)
  • Floppy disks
  • Backup tapes
  • CDs and DVDs
  • Zip drives
  • Hard drives / Flash memory
  • Other portable storage device

Article by

Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.
Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.

Share This Page

Our Editorial Process

Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.

Categories

.

The Breach Report

Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.

Related Templates

Acceptable Use of Information Systems

An acceptable use policy outlines the use of computer equipment. Inappropriate use exposes the company to risks including virus attacks, compromise of network systems and services, and legal issues.

This policy defines the requirement for reporting and responding to incidents related to the company’s information systems and operations

A penetration testing policy provides guidance for managing a penetration testing program and performing penetration testing activities with the goal of improving defensive IT security

The purpose of an internet usage policy is to establish the rules for the use of company Internet for access to the Internet or the Intranet.

The company must prioritize its assets and protect the most critical ones first; however, it is important to ensure patching takes place on all machines.