University of Liverpool: IT Asset Disposal Policy
University of Liverpool: IT Asset Disposal Policy
University of Liverpool
IT Asset Disposal Policy
Page 1 of 10
CSD Information Security Open Active 1.2
Contents
1. Introduction ............................................................................................................................... 3
2. Principles .................................................................................................................................... 3
3. Objectives of This Policy ............................................................................................................. 3
4. Action Implementation .............................................................................................................. 3
5. Background ................................................................................................................................ 3
6. University Disposal/Destruction of Physical Media ................................................................... 4
7. Identification of IT Equipment Assets ........................................................................................ 4
Asset Tags.............................................................................................................................. 4
8. Scope of Destruction .................................................................................................................. 4
9. University Disposal Criteria ........................................................................................................ 5
Removal / Reformatting of Storage Disks ............................................................................. 5
Software/Sanitisation/Destruction ....................................................................................... 5
CSD IT Asset Disposal Scheme .............................................................................................. 5
Reuse and redistribution of IT Equipment ............................................................................ 5
Certification and Audit .......................................................................................................... 5
Asset Inventory ..................................................................................................................... 5
IT Disposal Services ............................................................................................................... 6
10. Data Backup ............................................................................................................................... 6
11. Physical Security ......................................................................................................................... 6
12. IT Asset Disposal Process ........................................................................................................... 7
IT Asset Roles and Responsibilities ....................................................................................... 8
Requestor .............................................................................................................................. 8
CSD/Information Security/Approved Third Party ................................................................. 8
Facilities Management (Multiple No of Devices/Heavy Load/Remote Campus) ................. 8
13. Approved Third Party Supplier/Service Provider (Licensed) ...................................................... 8
14. Decommissioning and Core Network Infrastructure Changes ................................................... 8
15. CSD Service Desk Contact Details and Service Times................................................................. 8
16. Legal obligations and University policies ................................................................................... 8
17. Compliance and Monitoring ...................................................................................................... 9
Appendix A – University ISMS Reference ........................................................................... 10
Page 2 of 10
CSD Information Security Open Active 1.2
1. Introduction
Information and IT equipment are vital assets to any organisation, and this is especially so in the
University which is a knowledge-driven organisation. Virtually all of our activities involve creating or
handling information in one form or another via the IT equipment we use. The IT Asset Disposal
Policy and its associated policies are concerned with managing the secure disposal of IT equipment
assets which are owned by the University and are no longer required.
2. Principles
This policy defines the roles and responsibilities of staff in ensuring the secure disposal of University
IT equipment.
All staff/student(s) of the University who use information assets have a responsibility to
handle them appropriately and in accordance with their classification
University information assets should be made available to all who have a legitimate need for
them
The integrity of information assets must be maintained at all times. Information assets that
are used in conjunction with the IT asset must also be accurate, complete, timely and
consistent with other related information and events.
4. Action Implementation
Procedures will be put in place to ensure effective use of the University IT Asset Disposal Policy.
These procedures include:
• Clear identification of University information assets and protection in line with the asset
classification scheme.
• Implementation of procedures for the disposal of University IT assets.
• Ensuring that disposal procedures are adhered to.
• Provision of certification and audit trail for asset disposal.
5. Background
University information assets which are sensitive or valuable must be protected at all times.
Consideration must be given to how the assets are handled during day-to-day activities; how they
are protected outside normal working hours; and how they are protected when accessed either on
or off campus. It is also crucial that this consideration is extended to the disposal of equipment on
which sensitive or valuable data has been accessed, processed or stored.
All information must be classified by those who own or are responsible for them. For more
information, refer to the Information Asset Classification Policy.
Page 3 of 10
CSD Information Security Open Active 1.2
For all other asset types such as, but not limited to:
CDs
Floppy discs
Video tapes
X-Rays
Microfiche records
Paper-based and hardcopy documents
Tel: 0151 794 5675 (Internal) or Email: [email protected] for more information.
PCs
Laptops
Mobile phones
Multi-Functional Devices - printers/scanners
Servers
USB memory sticks and external hard drives
Asset Tags
Staff/student(s) should be aware of the origin of the IT equipment being used to fulfil University
business activities. All IT equipment which has been purchased via a University account must have
an asset tag assigned to it. Where practical, the asset tag will be physically visible on the equipment
stipulating that it is the property of the University of Liverpool.
In the event that you are unsure of the origins, responsibility and ownership of IT systems or
equipment, contact the CSD Service Desk.
8. Scope of Destruction
Staff/student(s) of the University must follow the approved destruction methods to ensure
unauthorised exposure to University’s information assets is minimised. Equipment that stores
sensitive data, which is no longer needed or has reached “end of life”, must be securely deleted and
sensitive data deemed unreadable and unrecoverable before:
Page 4 of 10
CSD Information Security Open Active 1.2
Such equipment must be securely wiped or removed by CSD or an authorised delegate only and in
accordance with the University disposal criteria (see section 9). CSD will undertake or manage the
work to ensure the risk of unauthorised access to sensitive data is minimised.
Similarly, formatting the whole hard disk or storage device may not prevent the recovery of
redundant data as it is possible for disks to be “unformatted”.
Software/Sanitisation/Destruction
Any IT assets leaving University premises must comply with licences and copyright law. CSD must
ensure that all University licensed software or operating systems are removed.
Any sanitisation or wiping undertaken by or on behalf of the University must meet the following
minimum standards:
Asset Inventory
Details must be recorded and updated within the CSD Inventory database to ensure the University
has an up-to-date record of active IT assets.
Page 5 of 10
CSD Information Security Open Active 1.2
IT Disposal Services
CSD Disposal Services
Individual Requests
PC Scheme
(*End of Warranty Disposal) Single Device(s)/On Campus Multiple No of Devices/Heavy Load
items/Remote Campus
The scheduled service should IT Assets will be removed/disposed Significant numbers and bulk IT
be considered as the main of within an agreed timeframe with assets (in the same location) may be
channel for pickup/disposal CSD and the requestor. required to be removed due to:
throughout the University. Repurpose of
Typical Individual requests consist of: building/room
CSD will pick up and remove IT/Network upgrade and
the existing device via the PC Single PC/laptop devices redundant kit
Scheme and replace it with a that are no longer required Completion of
new PC once the warranty of for day to day use academic/professional
the existing PC has expired. Single PC/laptop devices contracted Works
that can be recycled/re- Heavy Load Items consist of:
For more information on the PC used throughout the Multiple Servers
Scheme and the warranties of University Multiple PC Base Units
IT assets please refer to CSD PC Single PC/laptop devices Multiple Monitors
Scheme web pages in the first that are required to be MFD Printer
instance. securely deleted prior to re- Remote Campus consists of any UoL
use e.g. new starter or for location outside of City Centre
regulatory purposes Campus.
There are no additional charges for these services There may be additional charges
for these services
Urgent (immediate disposal)
IT devices that have been used for sensitive work and/or cannot be protected from external threats or
miscellaneous tampering on a day to day basis.
Non-Urgent (scheduled disposal)
IT devices that have NOT been used for sensitive work and CAN be protected from external threats or
miscellaneous tampering on a day to day basis.
CSD Physical Review
Upon receiving the initial urgent disposal request, CSD will arrange with the requestor to physically review the
IT assets prior to collection/disposal.
All individual requests must be made by completing the IT Disposal Request Form.
Once the system is in CSD’s possession, all data will be securely sanitised and made unrecoverable.
CSD will not be responsible for saving or removing any residual data.
For more information on securing IT equipment and devices please refer to the Workspace and IT
Equipment Security Policy.
Page 6 of 10
CSD Information Security Open Active 1.2
IT Disposal PC Scheme
Request Form
PC Scheme Pickup
(End of Warranty)
Mandatory
Identifiers
Warranty
Update to
User
Urgent/
Multiple/Remote Single/Multiple
Scheduled
New PC
Required
Single
Y
Multiple/Heavy
CSD Physical Urgent/
Load Request to
Review Scheduled
([email protected])
DTP/Purchasing
Notification to Notification to
Requestor of Requestor of
Pickup Pickup Notification to
Requestor of
Pickup/Setup
FM Roles and Responsibilities
Notification of
Out of CSD Pickup/Setup
FM IT Pickup arrival and transfer CSD Storage
Warranty PC Schedule
of IT assets
Y Y
Pre-Arranged N
Secure CSD Visitors
Y N Disposal
deletion? Process
Schedule
Secure
PC Reused/ MWS Asset
Deletion/
re-assigned Inventory List
Destruction
to University Update
Certification
Page 7 of 10
CSD Information Security Open Active 1.2
Requestor
All IT disposal requests must be requested via an IT Disposal Request Form is completed and
submitted to CSD.
All mandatory fields must be completed prior to submission. Failure to supply the relevant
information may defer or delay collection/disposal.
CSD will only carry out the secure disposal of the IT assets detailed within the initial request. Any
additional IT assets will require a separate request.
All Urgent disposal requests will be physically reviewed, picked up and stored within CSD
storage and disposed of in a secure manner within an agreed timescale
All Scheduled disposal requests will be picked up and disposed of in a secure manner within
an agreed timescale
Certification of secure disposal will be obtained
The redistribution or disposal of IT assets will be recorded in the asset inventory database
It is imperative that a formal contract, due diligence and security review of the third party supplier is
undertaken at least on an annual basis to ensure University requirements are satisfied. Please refer
to the IT Procurement and Third Party Security Policy and Information Security Review Policy for
more information.
Page 8 of 10
CSD Information Security Open Active 1.2
Authorised members of the University may monitor the use and management of information assets
to ensure effective use and to detect unauthorised use of information assets.
Page 9 of 10
CSD Information Security Open Active 1.2
Page 10 of 10