Legacy data tapes may be outdated, but they still hold sensitive data. Follow NIST 800-88: degauss, destroy, and document to stay secure, compliant, and environmentally responsible.
Jeff Datkuliak
Foundational Documentation for Disposition Services: 2nd edition, Verify, Audit & Document!
Strong ITAD requires more than process—it needs controlling docs like certificates, audits, and logistics records to prove compliance, protect data, and support sustainability goals.
Windows 11 and Device Management
Even after wiping and inventorying devices, modern MDM tools can keep them tied to your environment—posing security, compliance, and brand risks. True decommissioning requires full digital decoupling.
Security, Compliance & Sustainability…ITs Always about the Data!
In this insightful session, Jeff Datkuliak from ARCOA will explore the critical intersection of security, compliance, and sustainability in IT asset management. As Data Security and Compliance concerns continue to escalate, it’s essential to implement strategies that protect data, meet compliance standards, and promote responsible IT asset disposition.
Foundational Documentation for Disposition Services: First, Define and Control
Ensure ITAD success and security with key controlling documents: MSAs, SOWs, quotes, and certifications—all essential to align vendors with ITAM goals and reduce compliance and sustainability risks.
Security, Compliance & Sustainability
Join us for our final Wednesday Webinar before we return on May 14th! In this insightful session, Jeff Datkuliak from ARCOA will explore the critical intersection of security, compliance, and sustainability in IT asset management. As organizations face increasing regulatory demands and rising environmental concerns, it’s essential to implement strategies that protect data, meet compliance standards, and promote responsible IT asset disposition.
Asset Tracking Intersects With Cybersecurity
A potential TP-Link router ban underscores the importance of asset tracking in ITAM. Standardized tagging and inventory control enable organizations to identify assets, assess risks, and enhance security.
Hoteling and What is the Impact On Your ITAM Program
Hoteling’s flexible workspaces benefit ITAM through space optimization and sustainability but pose challenges in security, support, and employee adaptation. Strategic planning and collaboration are essential for successful implementation.
Battery Fires – What’s the Risk to Me?
Battery fires are one of the highest safety risks associated electronics recycling and are an import facet of your ITAM program procedures. Batteries, particularly, Lithium-ion batteries, have become an increasing concern in recent years.
How ITAM Intersects with Cybersecurity
You Can’t Secure What Don’t Know You Have! How a documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security.
I will discuss some of IAITAM’s 12 KPA’s (Key Process Areas) of a mature ITAM process and how hardware management impacts data breach, brand protection, value recovery and environmental risks. We will lay some groundwork for defining policies and procedures for managing asset inventory while in your possession as well as policies for managing your risks as assets move out of our control.