What’s the first policy you’ll create and enforce in your ITAM program?

Prog Home v3 Forums CAMP SPT What’s the first policy you’ll create and enforce in your ITAM program?

Viewing 15 posts - 46 through 60 (of 80 total)
  • Author
    Posts
  • #60678
    Eddy Muleme
    Participant

    Acquisition & Inventory Policies

    #60686
    Darnell Sadler
    Participant

    New Aquisition

    #60983
    Alexia Elford
    Participant

    personal accountability

    #61053
    Ann Martin
    Participant

    Tracking all inventory.

    #61181
    Jay Finucane
    Participant

    We already have policies, I work in Hardware asset management, we have an overall ITAM policy that covers our assets from the moment we purchase them to the moment they leave site with a disposal company

    #61246
    James Hott
    Participant

    SBOM library and implementation- obtain SBOM on all new software, retro actively obtain SBOM on all current software. build the library in the “too; and maintain it.

    #61333
    Adriene Pickett
    Participant

    Mobile Device Policy

    #61370
    Charles Pellicane
    Participant

    We already have them all created.

    #61501
    Namrata Parikh
    Participant

    Creating and enforcing the first policy in an IT Asset Management (ITAM) program is crucial for laying the foundation for effective asset management. Here are a few key policies that are commonly recommended as the first step:

    Asset Inventory Policy: This policy defines how assets are identified, recorded, and tracked. It includes guidelines on what information needs to be captured for each asset, such as asset type, serial number, location, and user assignment.

    Procurement Policy: This policy outlines the process for acquiring new IT assets, including approval workflows, vendor selection criteria, and budget considerations.

    Usage Policy: This policy defines how IT assets should be used by employees, including acceptable use, security requirements, and user responsibilities.

    Maintenance and Support Policy: This policy ensures that all IT assets are regularly maintained and supported, including guidelines for software updates, hardware maintenance, and support procedures.

    Disposal Policy: This policy outlines the process for disposing of IT assets, ensuring that data is securely wiped and environmental regulations are followed.

    #61616
    Akshay Mehra
    Participant

    Compliance policy and get byy in from stakeholders to track and manage it effectively.

    #61635
    Usheda Jackson
    Participant

    Request and Procurement

    #61774
    Mohd Uzair
    Participant

    centralized procurement and contract management

    #61976
    Amy Yeung
    Participant

    Inventory management policy.

    #62048
    Nirisha Chalapati
    Participant

    Docmentation of the process

    #62077
    Noah Yalla
    Participant

    “request and approval policy” for end user devices – this will cover request of IT asset, what happens if the device gets stolen or faulty under the user’s care, its maintenance and disposal. the end user has to agree on the terms and conditions as part of his or her request

Viewing 15 posts - 46 through 60 (of 80 total)
  • You must be logged in to reply to this topic.