ࡱ> <>;] :bjbj++ 4I'bI'b*  lllll844444444$659Z44l44llI4Rll4482h3 03!^23_4043`990h3h3>9l3T444449 B 2: DoIT 02 03 - Disposal of Computer Equipment September 2, 2009 Archived version (Effective September 2, 2009 through February 1, 2018) Authority: CIO, Statewide Information Security Manual History: First issued 2003. Last revised September 2, 2009. Related Policies: DoIT 01-07 Additional References: Contact Information: Vice Chancellor for Information Technology and CIO, (910.521.6883) 1. Purpose 1.1 Proper disposal of 鶹P computer equipment is essential to ensure the security of the data contained on the equipment. The university is responsible for protecting data as defined under other university policies. 鶹P is also responsible for maintaining an accurate inventory of computer assets and this policy provides appropriate asset management of computing resources. 2. Policy 2.1 Before any 鶹P computer equipment may be reassigned to another individual, sold or is disposed of by any other method, the Division of Information Technology (DoIT) must certify the components ready for disposal or reassignment. There are two primary purposes for this certification: 1) improper disposal of electronic components poses a serious threat to the environment, and 2) the improper preparation of storage devices for disposal can lead to inadvertent disclosure of confidential business or personal information, which 鶹P may be required to keep confidential as a matter of law. 2.2 DoIT has procedures in place for the proper preparation and certification that computer equipment is ready for assignment to other personnel or other forms of disposal. Faculty, staff or departments wishing to assign a computer system to another person, surplus the equipment, or otherwise dispose of the equipment must obtain a certificate of readiness from DoIT. 3. Range of disciplinary sanctions 3.1 Persons in violation of this policy are subject to a full range of sanctions, including, but not limited to, the loss of computer or network access privileges, disciplinary action, and dismissal from 鶹. Any sanctions against employees will be imposed through procedures consistent with any applicable state regulations. Some violations may constitute criminal or civil offenses, as defined by local, state and federal laws and the university may prosecute any such violations to the full extent of the law.     +,t~   . / D     k o *+ľĦĦĦĆ{{{{sjhU h. hs6]h. h %h. 5CJ\h. h. 5CJh %h. 5CJ h. 5CJhh. 5CJ h5CJ hCJ h. CJh+h+6B*CJphhb6B*CJphh+6B*CJph hs6]CJh. hs6]CJ,, /  k *,-/023567  <gds6]dgds6]gds6] *gd. gd. gds6]+-.01346789: h. hs6]h+hvh+OJQJjhUh 789:gds6]21h:ps6]/ =!"#$%  !s 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ OJPJQJ_HmH nH sH tH J`J "*Normal dCJ_HaJmH sH tH DA D Default Paragraph FontRiR 0 Table Normal4 l4a (k ( 0No List \^\ b0 Normal (Web)ddd[$\$CJOJPJQJaJ** b pagetitle,, b storytitle6U !6 b0 Hyperlink >*B*phZ2Z b storytitle1ddd[$\$CJOJPJQJaJ*W A* b`Strong5\NRN O0 Balloon Text dCJOJQJaJJ/aJ O0Balloon Text CharCJOJQJaJ4@r4 v0Header !6/6 v0 Header CharCJaJ4 4 v0Footer !6/6 v0 Footer CharCJaJ.). v Page Number\O\ l) policy headerd<h5CJOJPJQJaJVOV ~G policy section headerPOP l) policy body d@CJOJPJQJaJHH 03policy body bold x5JJ l)policy body bullets F xPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w< :  +: 7: L# @0(  B S  ?* , - / 0 2 3 5 6 8 ; >F* , - / 0 2 3 5 6 8 ; 33+) ;  8yUTGu9)$2~4 e9D 7>l$2 0v                 3cYRH67&hQE67&YRHhQE. s6]ef2vn}GN,+g6b* , @: @UnknownG.[x Times New Roman5Symbol3. .[x Arial7.*{$ CalibriCLucida Grande?5 *Cx Courier New;WingdingsA$BCambria Math"htkh'^^!20& & C#HP ?,2xxur  Yoshi GuyTina R. Rodgers0         Oh+'0`   ( 4@HPX Yoshi GuyNormalTina R. Rodgers4Microsoft Office Word@[@v @03^ ՜.+,0 hp  鶹 Pembroke&   Title  !"#$%&'()*,-./012456789:=Root Entry F0F 03?1Table9WordDocument4SummaryInformation(+DocumentSummaryInformation83CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q