Asset Policy
Asset Policy
Asset Policy
General Description
Policy Summary:
Trinity University is committed to a secure information technology environment in support
of its mission[1]. Within this Policy, the terms “Trinity University” & “Trinity” may be used
interchangeably.
This policy provides a framework for managing the receiving, intake, distribution, and
recovery of technology goods and encompasses the processing requirements.
The Asset Management Policy is aligned and complements the University BUSO-0031
Purchasing Policy and Procedures, the ITS-0044 Technology Acquisition Procedure, the
FACS-0002 Central Receiving Policy and other related procedures.
[1] https://www.trinity.edu/about/mission-values
Purpose:
The purpose of this policy is to define standards, procedures, and restrictions for the
management of technology assets such as all IT hardware, software, and computer-related
components purchased with University funds. This policy is designed to provide Trinity
with a documented and formalized process regarding technology asset management done
by the University.
Additionally, compliance with the stated policy and supporting procedures helps ensure the
confidentiality, integrity, and availability (CIA) of the University system components.
Scope:
This policy applies to all full-time and part-time employees and to the purchase of all
equipment issued by the University regardless of University funding sources. The scope of
this policy includes, but is not limited to, the following technology resources:
Exceptions:
In few instances, Trinity systems may require to be exempted from the Asset Management
Processes due to possible technical difficulties or third-party contractual obligations. Any
such exceptions to the current policy must be documented and approved via the Trinity’s
Exceptions Management Process.
Policy Content
Roles and Responsibilities
All hardware, software, or components purchased with University funds are the property of
Trinity University. This also includes all items purchased using any requestor’s Department
P-Card and any other Department P-Card, including ITS.
A personal computer may contain a data storage device on which personal, confidential, and
legally protected information is stored. To prevent unauthorized access to sensitive data,
identity theft, and liability, the University is committed to ensuring that devices on personal
computers are properly recycled and stored data is unrecoverable.
All computer equipment purchases must be coordinated with the Information Technology
Services or ITS before any purchases are made.
All requests should go through the [email protected] email if asking for the purchase
of new equipment.
Warehouse; rather, it involves several key steps that must be done right to
ensure the right items and correct quantity are being delivered and stored
correctly. There are 4 major steps that had to be followed to ensure
appropriate receiving of technology goods:
1. Ensure proper documentation and approvals are complete and in
order:
1. Before inventory is delivered, the ITS Business Affairs
organization have gathered the complete documentation,
approved by all parties, and have sent all the documentation
electronically to the Procurement Office.
1. Full technology acquisition / purchasing process is
described in the ITS-0044 Technology Acquisition
procedure.
2. Receive and unload stock:
1. TU Central Receiving Warehouse staff meets the shipper at a
loading dock and unload the necessary cargo. The ITS
Receiving staff should also be standing by to bring their
questions or concerns regarding the shipment with the delivery
driver and TU Central Receiving personnel.
3. Count and Confirm inventory:
1. As the cargo is being unloaded, the TU Central Receiving
Warehouse staff checks the contents of each delivery,
including the quantity, the integrity of seals, the product codes /
SKUs, and the overall condition of the cargo to ensure that
what’s in the boxes matches what is listed on the receiving
sheet and is expected to arrive.
2. TU Central Receiving Warehouse staff counts boxes or pallets,
rather than individual items.
1. It is the responsibility of the ITS receiving personnel to
ensure that what is being received is what was ordered.
4. Organizing and Storing products:
1. Once all inventory is unloaded and inspected, the final step in
the warehouse receiving process is organizing and storing new
inventory in the warehouse.
• Controls for physically securing all media (including but not limited to
computers, removable electronic media, paper receipts, paper reports, and
faxes) are to be in place for protecting University data.
• Media backups are to be stored in a secure location, preferably an off-site
facility, such as an alternate or backup site, or a commercial storage facility.
Review the location’s security at least annually.
• All media is to be appropriately classified so the sensitivity of the data can
be.
• All media is to be sent by secured courier or other delivery method, so that it
can be accurately tracked.
• Management is to approve any and all media that is moved from a secured
area (including when media is distributed to individuals).
• Strict control is to be maintained over the storage and accessibility of media.
• Inventory logs of all media are to be maintained, with media inventory
procedures undertaken at least annually.
The procedures for ensuring these controls and safeguards are in place
require one to routinely request a tour of the facility and to ask for any
compliance audits conducted on the offsite location by a third-party auditor.
Additionally, any hardcopy and electronic media kept in a storage repository
will be protected by encryption for media containing data information, thus
allowing only authorized personnel to decrypt media as needed.
Data backup process is described in the ITS-0038 Backup Strategy
Procedure.
• Public Information
• Protected Information
• Restricted Information
Specifically, only the authorized personnel may send, retrieve, and receive
media from the offsite location and from other entities such as third-party
vendors, clients, or governmental bodies (local, federal, and state). The
procedure for gaining permission to send, retrieve and receive media calls
for one to submit a request to be added to the media distribution list, which
will be reviewed by management or personnel authorized to grant this
approval.
Baseline activity
The ITS Business Affairs Unit works with TSS and the other ITS Technology
Managers to:
Once the ITS Business Affairs Unit completes the purchase of the software
license, the Supplier / Manufacturer will send the software installation
instructions package to them and they will proceed to submit it to the ITS
Manager of Technical Support & Client Services, within the original ticket
created, for appropriate action and next steps.
The ITS Manager of Technical Support & Client Services is responsible to
register the software license and managed-software information into the
KACE Asset Management Module, as described in the ITS-0037 Asset
Receiving Procedure – Receiving new Software License into KACE system.
The ITS Manager of Technical Support & Client Services will also:
The ITS Business Affairs Unit, at least once a year, will request the ITS TSS
organization, through their Client Experience Director, to perform a software
licensing physical inventory. To perform a physical inventory count of the
software licenses, the ITS Business Affairs Unit will get a list of software
license information to check the software licenses against the list.
1. ITS TSS will export a list of software license information from KACE /
K1000.
a. Create a list of software license information for physical
inventory count.
b. Export the software license information including the License
number, Last Tracked Date, License Name, Total Licenses,
and License Type.
1. University ITS users will not have admin or super user privileges.
Exceptions will be approved in advanced by the University CIO after
justified by the user’s organization.
2. ITS will provide an alternate plan in mind for maintaining
stakeholders’ productivity, where the Stakeholder will contact the ITS
Technical Support Services team – Client Experience. All requests
should go through the [email protected] email.
Asset Rationalization
By doing so, ITS ensures scale, vitality, and adaptability of its IT landscape. The
benefits from assets rationalization are many.
ITS Business Affairs Unit will define the Metrics and Key Performance Indicators, to
monitor suppliers’ performance based on spending, products/services availability,
and participation on University business. This information will help the CIO
recommend reducing the technology supplier’s landscape and be able to reduce
costs through effective negotiations. Will also help consolidating services or
technology acquisition through limited number of Suppliers.
Asset Categorization
An important element while doing Asset rationalization is having the assets divided
into categories. It is expected from the team of technicians responsible to enter the
assets in KACE to follow the established and agreed asset’s categories defined in
the system.
Assets are categorized and the fields for each type are build out in KACE to follow
the format as described on the ITS-0037 Asset Receiving Procedure. The following
categories were defined in KACE including the models approved by ITS or in use
(when applies) and the asset field description;
3. Docking Station
4. Monitors
5. Network Equipment
6. Peripherals
7. UPS
8. Tablet models
Hardware Replacement
Equipment replaced during any period shall be based on a minimum annual review
of the asset management program and hardware replenishment schedule,
hardware inventory, and fixed asset budget schedules.
Computers
Computers that are part of the ITS computer replacement cycle will be replaced
with a new standard computer 5 years from its Purchase date. Standard model /
brand as well as its configuration will be defined and approved by the ITS
Organization. Refer to the ITS-0008 Technology Acquisition Policy for more
information.
Performance Evaluation
Consequences of Policy Violation:
Any behavior in violation of this policy is cause for disciplinary action and violations of this
policy may result in, but are not limited to, any or all the following:
Violations will be adjudicated, as appropriate, by the CIO, the Office of the Dean of
Students, the Office of Housing and Residential Life, and/or the Human Resources Office.
Term: Definition:
Format phones, mobile computing devices, networking equipment and various others
Media in Hardcopy media are physical representations of information. Paper printouts,
Hardcopy printer and facsimile ribbons, drums and platens are all examples of hardcopy
Format media
Non-Public Non-Public Information includes both Protected and Restricted Information.
Information
OPEX Operating Expenditure
Packing or Proof of delivery from vendor
Delivery Slip
Performance Based upon the specific needs. Total ownership cost for operating and
Specification maintaining the product should be included as an element of the specification.
Protected Protected information includes all private data, records, documents, or files
Information that contain information that is not to be shared publicly but also not
restricted legally and might be provided upon reasonable request as long as
the Data Owner is consulted about its responsible use and approves its release.
Employees must wipe Trinity data from their phones (personal or Trinity-
issued) when they are no longer actively using that data for their current
Trinity role, e.g., when they leave the University, switch devices, give their
phones away, turn in phones to Verizon/AT&T, etc. If a phone (personal or
Trinity-issued) that contains Trinity data (including email) is lost or stolen, the
owner must immediately notify the Helpdesk so that the device can be
remotely wiped if university-owned or wiped by an employee if personally
owned. Department Chairs or equivalent officers are responsible for ensuring
that local units abide by this policy.
Public Information that the University has made available or published for the explicit
Information use of the general public with no restrictions on access, use, or disclosure
under University policy or contract, or local, national, or international statute,
regulation, or law.
Purchase Acquiring a commodity in exchange of money or other valuable consideration.
The basic types of purchases that can be made may include but are not limited
to:
Term: Definition:
• The direct purchase of commodity or service that is available from only
one source.
• Contracts used to obtain commodities or specific professional,
technical, or other specialized services throughout the year.
Purchase Order Form, generated by the Procurement unit that documents the purchase
agreement or contract.
Quotation An official document received from vendors that includes prices, availability of
requested goods, payment, and delivery terms.
Requestor or Person that is requesting the contracting or purchase of a commodity
Requesting
Party
Restricted Sensitive information that must be safeguarded at the highest priority levels in
Information order to protect the privacy of individuals and the security and integrity of
University systems. This information must be limited to authorized University
faculty, staff, students, or others with a legitimate need. This information may
not be transferred without mandatory security precautions or made vulnerable
to unauthorized access, use, or disclosure. Restricted information is
categorized as such due to legal protection or privilege, University policy,
contract obligation, or important privacy considerations. Restricted
Information includes but is not limited to “Sensitive Personal Information” as
defined by Texas S.B. 122 § 48.002.2 (Identity Theft Enforcement & Protection
Act).
Specification A concise statement explaining the type of product or service, the quality level,
special requirements in design, performance, delivery, and usage.
Specifications must not be restrictive (locking in a specific vendor and limiting
competition) or be vague (allowing a vendor to provide a lower than
acceptable quality level product or service).
Vendor Any supplier who has business with Trinity University.
Related Documents
Related Content:
The ITS Asset Management Policy is aligned with ISO 20400 Sustainable Procurement
Guidance and with applicable laws and regulations.
Revision Management
Revision History Log:
Revision #: Date: Recorded By:
v2.0 4/27/2022 11:29 AM Ben Lim
v1.0 2/1/2022 1:16 PM Dan Carson