Secure Management and Disposal of Equipment Clause Samples

The 'Secure Management and Disposal of Equipment' clause sets requirements for how equipment that may contain sensitive data must be handled throughout its lifecycle. It typically mandates secure storage, tracking, and controlled access to devices such as computers, servers, or storage media, and outlines procedures for securely erasing or destroying data before equipment is reused, sold, or disposed of. This clause is essential for preventing unauthorized access to confidential information and mitigating the risk of data breaches when equipment is decommissioned.
Secure Management and Disposal of Equipment. Assets. The HTL Chief Technical Officer is responsible for the secure disposal of storage media and the disposal of all information processing equipment. Destruction of storage media and information processing equipment is undertaken to industry standards with the physical destruction of decommissioned or damaged hard disks storing Personal Data undertaken line with WEEE regulations through HTL’s approved contractor.

Related to Secure Management and Disposal of Equipment

  • Disposal of Property a) Prior to disposal of any property purchased with funds from this Contract or any predecessor Contract, Subrecipient must obtain approval from CDA for reportable property. Disposition, which includes sale, trade-in, discarding, or transfer to another agency may not occur until approval is received from CDA. Subrecipient shall email to County the electronic version of the Request to Dispose of Property (CDA 248). CDA will then instruct County on disposition of the property, and County will notify Subrecipient. Once approval for disposal has been received from CDA, and the County has reported to CDA the Property Survey Report’s (STD 152) Certification of Disposition, the item(s) shall be removed from Subrecipient’s inventory report. b) Subrecipient must remove all confidential, sensitive, or personal information from CDA property prior to disposal, including removal or destruction of data on computing devices with digital memory and storage capacity. This includes, but is not limited to magnetic tapes, flash drives, personal computers, personal digital assistants, cell or smart phones, multi-function printers, and laptops.