-->Skip to main content
As mentioned in the 2016 and 2015 Cascade ITAD Benchmarking Survey, having a comprehensive and up-to-date IT Security Policy is an essential component in developing an effective IT Asset Management strategy. Here's some additional information to help in your policy development.
What's the scope of your policy?In our client survey, Cascade asked respondents to list what aspects of IT asset disposition their policies address. See this graphic for their responses from the 2015 survey.
How does your organization compare? It is a good idea to see if each of these issues is included in your policy - typically they are necessary and helpful to guide your program. See the graphic to the right for the complete list of what's included in other organizations' IT Security Policies.
Cascade put together a sample IT Asset Disposition Security policy you can use as a guide. Of course, policies are developed to serve the unique interests of the organization, so be sure to customize it as you need. To get your free editable Word template, please complete this short registration form..