IT Asset Inventory Validation
IT asset inventory validation is one of the key ingredients for IT asset management success. Accurate data establishes that there is inventory control and is the starting point for secure IT disposal. The best starting place to establish inventory control of e-waste is at the point of pickup.
IT asset disposal is often collected on an ad hoc basis. In many cases, asset identification and reconciliation with accounting records doesn’t occur onsite because of the lack of manpower and space. Assets containing data are often mixed with other IT assets, which creates a potentially serious data security control problem.
Our onsite IT asset inventory validation services are designed to establish essential chain of possession records. This creates an inventory control mechanism by organizing, packaging and manifesting asset control groups. While onsite, we will remove data bearing media such as hard drives and solid state storage from your IT assets. Our team will identify the units that the drives were removed from and the serial numbers of the drives removed. The drives will be packaged separately in secure manifested containers, ready for transfer or destruction.
We can provide both on and off site NIST approved data destruction. Our vehicles are specially designed as both secure GPS tracked transport vehicles as well as high volume electronic shredding vehicles.
As a US EPA and NJ DEP licensed electronic shredding business and a NAID AAA certified secure data destruction business we have the unique ability to provide both a legally valid environmental compliance certificate as well as legally recognized data destruction certification for your IT Asset disposal projects.
The IT Asset Inventory Process
- A preprinted barcode label is attached to the device and the barcode information is appended to your asset inventory record. At this point the barcode label becomes the “chain of possession” identifier. The purpose of using a preprinted barcode label is to eliminate any possible confusion associated with the multiple manufacture barcode labels found on IT devices. It also identifies the asset as belonging to a particular disposal project.
- The barcode labeled devices are immediately placed in secure containers that protect against unauthorized removal of the equipment from the disposal process.
- Next, container manifests are created. At this point the assets are ready for the sanitization process, or straight to recycling if they do not contain data.
Two important benefits of establishing onsite serial number inventory control
- The reconciliation of the physical IT asset inventory to your financial fixed asset inventory records.
- The establishment of the IT asset inventory disposal manifest, which constitutes the start of your “chain of possession” disposal documentation.
Our onsite technicians have been specifically trained and have years of experience dealing with a wide range of client site requirements.
This training and experience allows us to perform the inventory validation function in a highly efficient manner resulting in accurate records and timely completion of the project.
Once the disposal inventory has been established, we initiate our “Safe Harbor” secure data destruction process for any devices that store data.
Testimonials
100% of our client quality control surveys rate both our pre-project and
post-project communications as “Excellent”
92% of our new client quality control surveys have been returned marked “exceeded expectations”.
Our Mission is Protecting our Clients from Environmental and Data Security Liabilities
with Secure, Auditable and Compliant Recycling and Data Destruction Services.