Frequently Asked Question
Created: by – SyedNoor
Approved by – SundaresanC
Date- 12/07/2022
I. PURPOSE
This policy is designed to protect the organizational resources on the network by establishing a policy and procedure for asset control. These policies will help prevent the loss of data or organizational assets and will reduce risk of losing data due to poor planning
. Describe the actions taken for proper acquisition, installation, handling, tracking, and disposal of Information Technology (IT) assets to meet defined requirements for:
• Ensuring adherence to Sulekha.com standard.
• Ensuring consistency throughout the company
• Conforming to or complying with customer, legal, and regulatory requirements.
II. SCOPE
This procedure applies to all IT assets.
III. DEFINTIONS
“Information Technology (IT) Asset” refers to any computer hardware, software, Information Technology-based Company information, related documentation, licenses, contracts or other agreements, etc. In this context, “asset” and “Information Technology (IT) Asset” are understood to be the same.
IV. ASSETS TRACKED
This section defines what IT assets should be tracked and to what extent they should be tracked, categorized below are the types of assets subject to tracking.
1. Computer systems -Laptops and desktops
2. Printers, Copiers, Fax Machines, Multifunction Machines
3. Handheld devices
4. Networking Equipment: Switches, Routers, Firewalls, Servers
5. Desk Phones
6. Misc. Hardware etc. (Mobile, Datacards, SIM)
V. POLICY
- IT Asset will be allotted to the personnel through online portal method and will be take the acknowledgement
- Respected personnel has to accept the EULA while taking possession in the online portal
- He will solely responsible for the given IT asset.
- User should be bear the cost if any physical damages happen to the assets.
- User will be receive a mail form IT asset Management once allot the IT assets
- Personnel shall use the IT Asset Requisition Form is the confirmation of received assets.
- IT Support shall update the IT Asset Inventory Database.
- All asset purchase details and allotment/asset returns/replacement/inter location transfer everything will happens from IT asset Management.
E.IT ASSET VERIFICATION
IT Support shall conduct a periodic assessment of IT Assets to verify their status (i.e., in use/not in use). If an asset is not being used or is not being used as specified (for example, the IT Asset Inventory Database and IT Network Map are not in agreement), IT Support shall take corrective action, which may include:
• Taking the asset out of service • Initiating an incident report. (SIM and Datacards)
VI. POLICY COMPLIANCE
The IT Department will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.
B. NON-COMPLIANCE
Any employee found to have violated this policy may be subject to disciplinary action according to the HR policy.