Like so many other types of IT management policies, including data security and email, asset management policies are used to protect business assets and interests. Technology devices and software are certainly assets -- and they are certainly expensive, valuable and worthy of "protection" -- from failure, loss, destruction, theft, damage and related harm. Read on to learn the role that policy plays in protecting these assets and related business interests.
Where is that laptop? Who has that printer? Do we have sufficient software licenses for every user? These are the types of questions IT asset management is meant to answer. As an operational practice, IT asset management serves multiple purposes, as reflected in the list below:
- Asset management practices are used to minimize the risk that investments made in technology (hardware, software and training) will be lost due to theft, destruction or other damage.
- Asset management practices are used to ensure that technology assets are properly allocated to end-users to optimize usage and workplace productivity.
- Asset management practices are used to simplify technical support and maintenance requirements.
- Asset management practices are used to lower IT "cost of ownership" and maximize IT ROI.
- Asset management practices are used to ensure that software licensing is in full compliance, minimizing the risk of legal and regulatory problems.
- Asset management practices are used to support "sister" policies for disaster recovery, email usage, data security, and technology standards.
The Role of Asset Management Policy
Asset management practices define the actions to be taken to protect and preserve technology assets - from physical locks on equipment to inventory tags. In conjunction, policy provides the "asset management mindset". This mindset acknowledges that"technology assets are important to us and we take them seriously enough to put up with protective controls". To realize all of the intended benefits, this mindset must be integrated into daily operations and the corporate culture -- and this is achieved through adopted policy.
Once approved, asset management policies provide the governing authority to implement all aspects of the asset management program. While policy terms and specifics will vary according to organizational needs, the most effective policies are designed around (13) key components, as listed below:
- Asset Standards. To identify the specific hardware and software products (assets) to be used and supported.
- Configuration Standards. To identify how standardized hardware and software assets are to be configured.
- Variance Process. To establish the criteria and means by which product and configuration standards can (and should) be waived.
- Support of "Non- Standard" Assets. To establish the services that will IT provide for non-standard products and configurations.
- BYOD Guidelines. To establish the means for supporting "Bring Your Own" devices (tablets, phones, notebooks, laptops).
- Asset Procurement Guidelines. To identify the policies and procedures relating to the acquisition, procurement and/or rental of technology assets.
- Security Guidelines. To identify how physical and logical security will be provided for hardware and software assets (locks, passwords, virus protection, etc.).
- Software Licensing Guidelines. To keep track of asset licensing, ensuring compliance with all relevant agreements, laws and regulations.
- Technical Support and Maintenance Practices. To identify the processes to be followed for asset related technical support, repair, service dispatch, preventative maintenance, and problem escalation.
- Configuration Management Guidelines. To identify related practices for asset configuration management and change control to ensure consistent, updated configuration and timely updates as may be required.
- Asset Inventory Practices. To keep track of the location and assignment of all allocated technology assets (hardware and software), including related recordkeeping.
- Asset M.A.C. Practices. To govern requests and activities relating to physical moves, adds and changes (M.A.C.) with regard to allocated hardware and software assets.
- Asset Disposal Guidelines. To identify the processes to be followed when hardware and software assets are no longer in use and disposal is appropriate (which can include a donation program).
Learn to Fast Track
When it comes to managing, you need more than one approach to be consistently successful. The way you manage when surrounding conditions are good, is not the way you manage when time is running short, resources are stretched thin and people aren't working together. That's what fast tracking is for - and we can teach you how it's done. Learn More
Your Top 10 Policy Planning Questions
As discussed, once they are documented, established (and approved), asset management policies provide the means to "institutionalize" underlying objectives. Policy is a tool by which related practices are implemented and executed, laying out the "what, how and why" of IT asset management. Not only does policy provide the means for governance, it also provides the basis for related planning and decision making. To realize all of these goals and benefits, policy planning must address the following "top 10" planning questions:
- What are your primary asset management goals?
- What are the likely benefits to be realized from the standardized management of IT assets?
- What are the negative aspects and/or risks associated with IT asset management?
- Is executive management support required to plan and implement these practices?
- If executive management support is required, are you likely to get it?
- How would any chosen policies and procedures be implemented and executed?
- Do you have the resources to plan, implement, and execute any chosen policies and procedures?
- What are the likely costs associated with managing information technology assets?
- What are the likely objections to adopted asset management practices and how can they be addressed?
- What are the consequences of inaction with regard to managing IT assets?
THE IT SERVICE STRATEGY TOOLKIT
If you're looking for a fast, easy way to achieve IT service success, you'll find it inside the IT Service Strategy Toolkit. This unique, informative online course gives you everything you need to become an IT management leader and service planning expert. Here's what you'll learn:
The I.T. Service Strategy Toolkit is an easy, engaging online course, containing over 50+ education components, teaching you how to use the multi-stage 'Service Strategy Process' to organize the I.T. service function and deliver value-added I.T. services.
Topics covered include developing the IT mission, organizing the IT service department, planning IT management policies, managing the IT/end-user service relationship, performing the IT service review, and more.
Techniques covered include 'Define, Align and Approve', the 'Manage by Process Framework', the IT/End User Partnership, Proactive Problem Management and more.
Download the tools and templates to produce the I.T. Vision Statement and multiple Service Review deliverables.
Build and improve strategic planning skills, as you learn time-saving techniques to become a more productive IT manager or service professional.
Course enrollment provides lifetime access to all components, with all future updates and additions included.
Source: Unless noted otherwise, all content is created by and/or for ITtoolkit.com
ITtoolkit.com staff writers have experience working for some of the largest corporations, in various positions including marketing, systems engineering, help desk support, web and application development, and IT management.
ITtoolkit.com is part of Right Track Associates, proprietors and publishers of multiple web sites including ITtoolkit.com, Fast Track Manage, HOA Board List and more. We started ITtoolkit.com in 2001 and have continued to grow our web site portfolio, Toolkit products, and related data services. To learn more, visit us at Right Track Associates.