Battery fires are one of the highest safety risks associated electronics recycling and are an import facet of your ITAM program procedures. Batteries, particularly, Lithium-ion batteries, have become an increasing concern in recent years.
Jeff Datkuliak
How ITAM Intersects with Cybersecurity
You Can’t Secure What Don’t Know You Have! How a documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security.
I will discuss some of IAITAM’s 12 KPA’s (Key Process Areas) of a mature ITAM process and how hardware management impacts data breach, brand protection, value recovery and environmental risks. We will lay some groundwork for defining policies and procedures for managing asset inventory while in your possession as well as policies for managing your risks as assets move out of our control.
How ITAD Drives Sustainability and Reduces E-Waste
The article highlights the growing problem of electronic waste, which reached 62 million metric tons in 2022, and emphasizes the role of IT Asset Disposition (ITAD) in promoting sustainability.
It’s Always About the Data!
This article reviews different hard drive configurations and the need for appropriate data destruction methods, such as erasure, degaussing, or shredding, to ensure data security compliance. It stresses the importance of regularly assessing ITAD vendor practices and internal policies to keep pace with evolving storage technologies.
How does Hardware Asset Management Support Cybersecurity?
I have noticed recently the increase in discussions with industry professionals and the awareness of the impact of a documented ITAM process as it relates to Cyber Security Practices….. Duhhhh, About Time!!!!! As Dr. Barb says, you can’t secure what you don’t know you have! Hardware management is a core competency of ITAM.
Sustainability: How Does Your Disposition Vendor’s Certifications Impact Your Environmental Footprint
Global e-Waste is growing exponentially every year!
Have you wondered how your disposition process is contributing to reducing this global burden and what does your ITAD vendor’s certifications e-Stewards and R2 mean to you?
What to Manage and Where is My Data?
Does your ITAM program encompass all the areas where Data can reside? We will discuss overlooked asset classes, hardware and storage configurations that are often overlooked.
Managing Security Risks with Documented ITAM
You can’t secure what you don’t know you have! A documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security.