SlideShare a Scribd company logo
1 of 24
Best Practices:  I.T. Asset Collection  Presented by Shawn Stockman
About ONE PAK ,[object Object],[object Object]
What do you have to worry about?
Federal Regulations Require Secure Handling of Information Assets AKA “The Superfund Law”  Any company who’s PC is found in a landfill will pay.  CERCLA Act (1980)
Federal Regulations Require Secure Handling of Information Assets Requires “financial institutions” to protect their customers' data.  Title V of the Gramm-Leach-Bliley Act (1999)
Federal Regulations Require Secure Handling of Information Assets Requires public companies to ensure the security of assets and the information stored on them.  Sarbanes-Oxley Act (2002)
Requires health care providers to safeguard personal information.   Federal Regulations Require Secure Handling of Information Assets HIPPA
Affects government agencies and contractors with HIPPA-like standards around internal controls and asset tracking. Federal Regulations Require Secure Handling of Information Assets Federal Information Security Management Act of 2002 (FISMA)
Disposal, Safeguards, and Privacy rules require the proper disposal of consumers’ personal information. Federal Regulations Require Secure Handling of Information Assets FTC – FACTA (Disposal Rule, 2005)
I.T. Asset Collection and... ,[object Object],Risk
What are the risks & costs  of data breach? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating Risk  during I.T. Asset Collection Onsite packing Pickup Cross-docks & Hubs Delivery / Audit
It costs more to reduce risk RISK COST
Best Practices:  I.T. Asset Collection 1. Make sure the crew is qualified.  2. Make sure they record every asset—digitally if possible. 3. Compare the client’s asset list to the Logistics Provider’s. Onsite packing Pickup Cross-docks & Hubs Delivery / Audit
Best Practices:  I.T. Asset Collection 1. Make sure the same company that packs also picks up—with one touch to the customer. 2. Get Proof of Pickup. 3. Get the driver’s name and signature. 4. Know what you are signing before authorizing a release of the assets. Pickup Cross-docks & Hubs Delivery / Audit
Best Practices:  I.T. Asset Collection 1. Track your assets online. 2. Ask which cross-dock facilities. 3. Ask about security at each facility. 4. Request machine-wrapping of your pallets. Delivery / Audit Cross-docks & Hubs
Best Practices:  I.T. Asset Collection 1. Make sure EP documents the condition of assets before unloading. 2. Get a Proof of Delivery from the Logistics Provider. 3. Match the Proof of Delivery with the Proof of Pickup and the audit report. Delivery / Audit
[object Object],Best Practices:  I.T. Asset Collection
Document the Recovery Process Recycler/ Remarketer In Transit Certificate of Destruction Cross-docks & Hubs Certificate of Collection
Protect data before you ship ,[object Object],[object Object]
Packaging & Transport Options ,[object Object],[object Object],[object Object],[object Object]
Resources ,[object Object],The NAID Certification Program establishes standards for a secure destruction process including such areas as operational security, employee hiring and screening, the destruction process, responsible disposal and insurance.
Resources ,[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Automotive Glazing - Current & Future Technology Trends
Automotive Glazing  - Current & Future Technology TrendsAutomotive Glazing  - Current & Future Technology Trends
Automotive Glazing - Current & Future Technology TrendsRatna Chatterjee
 
Presentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto BasurasPresentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto Basurasguest0de26f4
 
Feed the Future Update April 2010
Feed the Future Update April 2010Feed the Future Update April 2010
Feed the Future Update April 2010jehill3
 
Contact Intensity Index
Contact Intensity IndexContact Intensity Index
Contact Intensity Indexjehill3
 
Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...
Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...
Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...Dottie Hodges
 
Ley 1480 de_2011_ley_del_consumidor
Ley 1480 de_2011_ley_del_consumidorLey 1480 de_2011_ley_del_consumidor
Ley 1480 de_2011_ley_del_consumidordanielvt
 
φε το βιβλίο που μου έκανε συντροφιά 3
φε το βιβλίο που μου έκανε συντροφιά 3φε το βιβλίο που μου έκανε συντροφιά 3
φε το βιβλίο που μου έκανε συντροφιά 3Ellh
 
MediaPost's Social Media Insider Summit '14 - Snackable Take Home Lessons
MediaPost's Social Media Insider Summit '14 - Snackable Take Home LessonsMediaPost's Social Media Insider Summit '14 - Snackable Take Home Lessons
MediaPost's Social Media Insider Summit '14 - Snackable Take Home LessonsMichoel Ogince
 
Facilitatie Militaire Muziek 10 04
Facilitatie Militaire Muziek 10 04Facilitatie Militaire Muziek 10 04
Facilitatie Militaire Muziek 10 04derkeimers
 
Knallen met Content & Basic SEO tips voor ondernemers
Knallen met Content & Basic SEO tips voor ondernemersKnallen met Content & Basic SEO tips voor ondernemers
Knallen met Content & Basic SEO tips voor ondernemersWieger Waardenburg
 
проба
пробапроба
пробаKOMBRIG
 
【营销咨询】20110117中粮我买网营销咨询项目最终方案书
【营销咨询】20110117中粮我买网营销咨询项目最终方案书【营销咨询】20110117中粮我买网营销咨询项目最终方案书
【营销咨询】20110117中粮我买网营销咨询项目最终方案书宇 华
 
Manitoulin 2014
Manitoulin 2014Manitoulin 2014
Manitoulin 2014jaccalder
 
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...jehill3
 
Cuestionarioautoestimadecoopersmith.doc
Cuestionarioautoestimadecoopersmith.docCuestionarioautoestimadecoopersmith.doc
Cuestionarioautoestimadecoopersmith.docsin empresa
 
Workshop on the pedagogical integration of icts
Workshop on the pedagogical integration of ictsWorkshop on the pedagogical integration of icts
Workshop on the pedagogical integration of ictsMbangwana
 

Viewers also liked (20)

Automotive Glazing - Current & Future Technology Trends
Automotive Glazing  - Current & Future Technology TrendsAutomotive Glazing  - Current & Future Technology Trends
Automotive Glazing - Current & Future Technology Trends
 
Presentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto BasurasPresentacion Plasma Proyecto Basuras
Presentacion Plasma Proyecto Basuras
 
Congress powerpoint
Congress powerpointCongress powerpoint
Congress powerpoint
 
Manual
ManualManual
Manual
 
Feed the Future Update April 2010
Feed the Future Update April 2010Feed the Future Update April 2010
Feed the Future Update April 2010
 
Contact Intensity Index
Contact Intensity IndexContact Intensity Index
Contact Intensity Index
 
Week 31
Week 31Week 31
Week 31
 
Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...
Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...
Architecting Your Site For Search Engine Performance: And We Ain't Talkin' Ju...
 
Ley 1480 de_2011_ley_del_consumidor
Ley 1480 de_2011_ley_del_consumidorLey 1480 de_2011_ley_del_consumidor
Ley 1480 de_2011_ley_del_consumidor
 
φε το βιβλίο που μου έκανε συντροφιά 3
φε το βιβλίο που μου έκανε συντροφιά 3φε το βιβλίο που μου έκανε συντροφιά 3
φε το βιβλίο που μου έκανε συντροφιά 3
 
2pahang
2pahang2pahang
2pahang
 
MediaPost's Social Media Insider Summit '14 - Snackable Take Home Lessons
MediaPost's Social Media Insider Summit '14 - Snackable Take Home LessonsMediaPost's Social Media Insider Summit '14 - Snackable Take Home Lessons
MediaPost's Social Media Insider Summit '14 - Snackable Take Home Lessons
 
Facilitatie Militaire Muziek 10 04
Facilitatie Militaire Muziek 10 04Facilitatie Militaire Muziek 10 04
Facilitatie Militaire Muziek 10 04
 
Knallen met Content & Basic SEO tips voor ondernemers
Knallen met Content & Basic SEO tips voor ondernemersKnallen met Content & Basic SEO tips voor ondernemers
Knallen met Content & Basic SEO tips voor ondernemers
 
проба
пробапроба
проба
 
【营销咨询】20110117中粮我买网营销咨询项目最终方案书
【营销咨询】20110117中粮我买网营销咨询项目最终方案书【营销咨询】20110117中粮我买网营销咨询项目最终方案书
【营销咨询】20110117中粮我买网营销咨询项目最终方案书
 
Manitoulin 2014
Manitoulin 2014Manitoulin 2014
Manitoulin 2014
 
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
Responding to Mental Health Needs of HIV-Positive Pediatric Patients in Resou...
 
Cuestionarioautoestimadecoopersmith.doc
Cuestionarioautoestimadecoopersmith.docCuestionarioautoestimadecoopersmith.doc
Cuestionarioautoestimadecoopersmith.doc
 
Workshop on the pedagogical integration of icts
Workshop on the pedagogical integration of ictsWorkshop on the pedagogical integration of icts
Workshop on the pedagogical integration of icts
 

Similar to 2009 IAITAM Conference - Stockman

Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptxReducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptxaj051804
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015Richard Wilson
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2KMb Unit, York University
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...
2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...
2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...Keith Atteck C.Tech. ERMm
 
Responsible Recycling To Reduce Your Risk of Liability
Responsible Recycling To Reduce Your Risk of LiabilityResponsible Recycling To Reduce Your Risk of Liability
Responsible Recycling To Reduce Your Risk of LiabilityMatthew Service
 
Regulatory Compliance in Colombia
Regulatory Compliance in ColombiaRegulatory Compliance in Colombia
Regulatory Compliance in ColombiaProColombia
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsIntelCollab.com
 
2014 upstate ny trade conference & expo.select advanced export issues.13jun14
2014 upstate ny trade conference & expo.select advanced export issues.13jun142014 upstate ny trade conference & expo.select advanced export issues.13jun14
2014 upstate ny trade conference & expo.select advanced export issues.13jun14Jon Yormick
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Rob Robinson
 
February 15-17, 2011 - ITAR Boot Camp Brochure
February 15-17, 2011 - ITAR Boot Camp BrochureFebruary 15-17, 2011 - ITAR Boot Camp Brochure
February 15-17, 2011 - ITAR Boot Camp BrochureJohn Priecko
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
DATA Working Group - Consumer Best Practices
DATA Working Group - Consumer Best PracticesDATA Working Group - Consumer Best Practices
DATA Working Group - Consumer Best PracticesDataSecretariat
 

Similar to 2009 IAITAM Conference - Stockman (20)

Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptxReducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
Reducing_Your_Risk_of_Liability_ Electronic_Recycling_Workshop_2016.pptx
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2Controlled goods presentation caura webinar 120419 v2
Controlled goods presentation caura webinar 120419 v2
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...
2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...
2010 IQPC - Turning Risks into Rewards Developing a Comprehensive Records and...
 
Responsible Recycling To Reduce Your Risk of Liability
Responsible Recycling To Reduce Your Risk of LiabilityResponsible Recycling To Reduce Your Risk of Liability
Responsible Recycling To Reduce Your Risk of Liability
 
Regulatory Compliance in Colombia
Regulatory Compliance in ColombiaRegulatory Compliance in Colombia
Regulatory Compliance in Colombia
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
 
ARCOAsvc
ARCOAsvcARCOAsvc
ARCOAsvc
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
KNOWN SHIPPER SECURITY PROGRAM
KNOWN SHIPPER SECURITY PROGRAMKNOWN SHIPPER SECURITY PROGRAM
KNOWN SHIPPER SECURITY PROGRAM
 
Import Export Data - siomex
Import Export Data - siomexImport Export Data - siomex
Import Export Data - siomex
 
2014 upstate ny trade conference & expo.select advanced export issues.13jun14
2014 upstate ny trade conference & expo.select advanced export issues.13jun142014 upstate ny trade conference & expo.select advanced export issues.13jun14
2014 upstate ny trade conference & expo.select advanced export issues.13jun14
 
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
Best Practices: Complex Discovery in Corporations and Law Firms | Ryan Baker ...
 
February 15-17, 2011 - ITAR Boot Camp Brochure
February 15-17, 2011 - ITAR Boot Camp BrochureFebruary 15-17, 2011 - ITAR Boot Camp Brochure
February 15-17, 2011 - ITAR Boot Camp Brochure
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
DATA Working Group - Consumer Best Practices
DATA Working Group - Consumer Best PracticesDATA Working Group - Consumer Best Practices
DATA Working Group - Consumer Best Practices
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

2009 IAITAM Conference - Stockman

  • 1. Best Practices: I.T. Asset Collection Presented by Shawn Stockman
  • 2.
  • 3. What do you have to worry about?
  • 4. Federal Regulations Require Secure Handling of Information Assets AKA “The Superfund Law” Any company who’s PC is found in a landfill will pay. CERCLA Act (1980)
  • 5. Federal Regulations Require Secure Handling of Information Assets Requires “financial institutions” to protect their customers' data. Title V of the Gramm-Leach-Bliley Act (1999)
  • 6. Federal Regulations Require Secure Handling of Information Assets Requires public companies to ensure the security of assets and the information stored on them. Sarbanes-Oxley Act (2002)
  • 7. Requires health care providers to safeguard personal information. Federal Regulations Require Secure Handling of Information Assets HIPPA
  • 8. Affects government agencies and contractors with HIPPA-like standards around internal controls and asset tracking. Federal Regulations Require Secure Handling of Information Assets Federal Information Security Management Act of 2002 (FISMA)
  • 9. Disposal, Safeguards, and Privacy rules require the proper disposal of consumers’ personal information. Federal Regulations Require Secure Handling of Information Assets FTC – FACTA (Disposal Rule, 2005)
  • 10.
  • 11.
  • 12. Mitigating Risk during I.T. Asset Collection Onsite packing Pickup Cross-docks & Hubs Delivery / Audit
  • 13. It costs more to reduce risk RISK COST
  • 14. Best Practices: I.T. Asset Collection 1. Make sure the crew is qualified. 2. Make sure they record every asset—digitally if possible. 3. Compare the client’s asset list to the Logistics Provider’s. Onsite packing Pickup Cross-docks & Hubs Delivery / Audit
  • 15. Best Practices: I.T. Asset Collection 1. Make sure the same company that packs also picks up—with one touch to the customer. 2. Get Proof of Pickup. 3. Get the driver’s name and signature. 4. Know what you are signing before authorizing a release of the assets. Pickup Cross-docks & Hubs Delivery / Audit
  • 16. Best Practices: I.T. Asset Collection 1. Track your assets online. 2. Ask which cross-dock facilities. 3. Ask about security at each facility. 4. Request machine-wrapping of your pallets. Delivery / Audit Cross-docks & Hubs
  • 17. Best Practices: I.T. Asset Collection 1. Make sure EP documents the condition of assets before unloading. 2. Get a Proof of Delivery from the Logistics Provider. 3. Match the Proof of Delivery with the Proof of Pickup and the audit report. Delivery / Audit
  • 18.
  • 19. Document the Recovery Process Recycler/ Remarketer In Transit Certificate of Destruction Cross-docks & Hubs Certificate of Collection
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.

Editor's Notes

  1. Swine Flu? Probably not. Where your old I.T. equipment winds up? What are the environmental and human impacts of your old assets? Who will notice if you slip up and your CRTs get shipped abroad? What kind of media attention do you want? And if you experience
  2. The US Environmental Protection Agency (EPA) began regulating e-waste as early as 1980 with the CERCLA Act, also known as “The SuperFund Law,” which held companies accountable for any toxic waste found in landfills. Now the EPA has adopted the position of “you make it, you take it” with electronics OEMs, making them responsible for what happens to the products they sell once they become obsolete. As a result, OEMs are now building this cost into their product pricing models for new products
  3. The Gramm-Leach-Bliley Act , for example, requires the FTC, along with several other regulatory agencies, to ensure that financial institutions protect the privacy of consumers’ personal financial information. But the FTC’s definition of financial institution includes any entity that may handle personal financial data, and includes credit reporting agencies, banks, credit card companies, auto dealerships and a range of retail establishments that accept consumer credit cards. [1] [1] Gramm-Leach-Bliley Act, (Title V, subtitle A, see 16 CFR Part 313)
  4. The Sarbanes-Oxley Act of 2002 requires public companies and their accounting firms to ensure the security of company information and the assets that store that information. The internal controls stipulated in the Act require managers of I.T. assets to perform risk assessment and to take precautions to prevent or detect fraud. [1] These precautions include taking steps to ensure the security of information storage assets like computers, hard drives and backup tapes [1] The Sarbanes-Oxley Act of 2002, Section 404: Assessment of internal control
  5. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) includes a Privacy Rule that requires any entity handling “protected health information” to take precautions to protect that data. The rule applies to health plans, health care clearinghouses, and to any health care provider or service firm which stores or transmits health information in electronic form, which includes insurance companies and entities that perform claims processing, data analysis, utilization review, and billing. legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation, or financial services. [1] [1] Health and Human Services Web site: www.hhs.gov/ocr/hipaa
  6. The Federal Information Security Management Act of 2002 (FISMA) was meant to bolster computer and network security within the Federal Government and affiliated parties (such as government contractors) by mandating yearly audits. FISMA imposes a mandatory set of processes that must be followed for all information systems used or operated by a US Government agency or by a contractor of a US Government agency; the mandated processes follow standards set by HIPAA and other federal regulations that require risk assessment, internal controls and asset tracking.
  7. One part of the Fair and Accurate Credit Transactions Act of 2003 (FACTA) is the Disposal Rule, which calls for the proper disposal of information found in consumer reports and records to protect against “unauthorized access to or use of the information.” Any business or individual who uses a consumer report for a business purpose is subject to the requirements of the Disposal Rule. Think this doesn’t apply to you? The Fair Credit Reporting Act defines the term consumer report to include information obtained from a consumer reporting company that is used – or expected to be used – in establishing a consumer’s eligibility for credit, employment, or insurance, among other purposes. Examples of consumer reports include credit reports, credit scores, reports businesses or individuals receive with information relating to employment background, check writing history, insurance claims, residential or tenant history, or medical history. Even if your company doesn’t service consumers, you all have employees, and all HR records are subject to this rule.
  8. Now many of these regulations around information privacy and data security have the greatest affect on public companies, financial institutions, health care organizations or even retail chains with customer information stored on the computers that they may be returning at the end of a lease, or remarketing during a technology refresh, or when they are shipped to a recycler or even given to a charity. But as I mentioned, the Safeguards Rule of the Gramm-Leach-Bliley Act requires financial institutions to develop an information security plan that describes how the company protects clients’ nonpublic personal information . This means that at end-of-lease, for example, if you arrange pickup and transportation of those assets back to your environmental partner’s facility, it becomes your responsibility to safeguard those assets. This is where compliance leads directly to risk management all the way through the logistics process at end-of-lease or end-of-life.
  9. PGP Corporation, a global leader in enterprise data protection, and the Ponemon Institute, a privacy and information management research firm, today announced results of the fourth annual U.S. Cost of a Data Breach Study . According to the study which examined 43 organizations across 17 different industry sectors... Data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007. Since the study’s inception in 2005, this cost component has grown by more than $64 on a per victim basis, nearly a 40% increase. Per incident costs in 2008 were $6.65M Third-party organizations accounted for more than 44 percent of all cases in the 2008 study and are also the most costly form of data breaches due to additional investigation and consulting fees. (LP’s would be considered a 3 rd part organization) More than 88% of all cases in this year’s study involved insider negligence.
  10. There are several points in the I.T. asset collection process that present opportunities for theft or loss, or “risk opportunities” The first risk opportunity occurs during the packing process onsite – can you trust the crew and the quality of their packing? How are they recording what they’re packing? The next point of risk occurs when the truck pulls away with the pickup – how do you prove what they took, who they are, and where they’re going? The first cross-dock represents another risk opportunity – can you be sure your assets are not sitting outside or left unsecured? The next cross-dock or hub represents a similar risk. Can you be sure your assets are not mixed or switched with someone else’s? The point of delivery, or final destination is the last risk opportunity – can you be sure that what is off-loaded is complete, and what is audited is accurate?
  11. As with most things, as soon as you try to reduce risk, you increase cost. And when you cut corners to reduce cost, you increase risk. On one end of these extremes is the cheap and easy way of having Joe’s Moving service come and pack up your client’s computers that have their customer data, patient data or financial data on the hard drives. They throw them on a pallet, shrink-wrap and take off. They don’t record any information about what they just took. They give those 3 pallets to Lowball Freight Company who runs it through 4 warehouses on the way to your environmental partner. At any point, any dock worker could take or swap any asset and it could be on eBay within 24 hours. How would you know? On the other end is to have the client pack up their own assets and have Brinks come and pick it up and their two armed guards drive it directly to your environmental partner. It’s extremely expensive, but very little risk. So let’s talk about the best practices—a way to try to get the best of both worlds without either exposing your organization to a lot of risk or costing your organization a fortune.
  12. First, Onsite Packing – Use a provider who can certify that their crew is trained on packing I.T. assets. Make sure they record what they are packing as it’s packed, preferably in digital format to avoid the mistakes of hand-written notes. Ideally, start with a list of the client’s asset tag numbers of the assets to be taken so the client can verify their list to that of the Logistics Provider’s onsite crew.
  13. Second, for the Pickup – 1. Make sure the same company that packs also picks up—with one touch to the customer. This gets closer to “one throat to choke” if things go wrong. The more parties involved in the process, the less secure it is. 2. Require a signed proof of pickup that documents how many of each asset type was picked up. 3. Make sure you have the driver’s name and signature on his company’s manifest so you know how to follow up if you need to. 4. Before you sign a release of the assets make sure at least the overall count by asset type matches your expectations.
  14. Next, in transit – Make sure you can track your assets online while they are in transit. Ask which cross-docks or facilities your assets will be passing through. Ask about the security in place at each facility—there should be security cameras, screened personnel only, locked doors at all times and freight should never sit outside unless in a locked truck. Request that your pallets of assets be machine wrapped at the earliest opportunity to minimize load-shifting and damage.
  15. Last, the final destination – can you be sure that what is off-loaded is complete, and what is audited is accurate? Make sure your environmental partner documents or photographs the condition of assets on the truck before they unload. Get a Proof of Delivery from the Logistics Provider. Make sure the Proof of Delivery matches the Proof of Pickup, and match the asset list from the pick up with audit report from the EP.
  16. Get a Certificate of Collection to document every asset, every pallet, and every arrival and departure along the way. The basic premise for best practices on the logistics side is to maximize visibility and accountability throughout the I.T. asset collection process.
  17. In order to cover your bases as far as accountability, start with the list of assets from your asset management system and match that to the proof of pickup; match that with the BOL from the LP. Find out about the security of the cross-docks your assets will pass through. Make sure your EP is properly certified. Make sure you can show a complete chain of custody in case there is a problem. And finally, match the certificate of collection with the certificate of destruction (or the audit from the leasing company or remarketer).
  18. Encrypting your data does reduce your liability in the case of data theft, but data erasure is even better, even if it’s a quick erase, knowing that you’ll get DOD standard erasure at the EP’s facility.
  19. There are a range of security options, all with varying costs and risks. Depending on the quantity of assets or hard drives, some options might be more feasible at a low cost per drive. Dedicated trucks are almost always among the more expense transport options, although among the safest. For higher quantities of drives, and if you have plenty of staff (with nothing else to do) who can remove them, onsite destruction might be an affordable option, but we’ve found you need at least a couple hundred to make this feasible. For low numbers of drives, you can remove the drives and ship them either unlocked by a secure transport like Fedex Critical or DunBar, or put them in a lockbox and ship them UPS Ground. It just depends on your budget and level of risk tolerance.
  20. Believe it or not, there is no standard for logistics companies to comply with in terms of security or accountability. So OnePak devised it’s own standards for logistics partners to live up to.