Used to request permission to remove parts from an existing piece of inventory Assumes that the original equipment is being removed from the departmental.

Slides:



Advertisements
Similar presentations
Data Management Tools David Wallom. YOUR DATA DOES NOT BELONG TO YOU! IT BELONGS TO YOUR EMPLOYING INSTITUTION!
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Parts of a Computer.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
St. Hugh Catholic School Student iPad Use Liability Agreement.
Review Questions Business 205
ASU Fixed Assets Departmental Training. Purpose of This Session Requirement of the business process compliance standards Provide Information for new employees.
Certificate of Property Disposal (CPD) A Certificate of Property Disposal is a web based form that is filled out and submitted by the agency property manager,
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Property Management Overview
 Importance of property management.  Understand your financial liability for fixed assets.  Recognize all employees have responsibilities for equipment,
Purpose of Inventory Control To tag all university assets over $5000 ◦ Useful life of 2 or more years ◦ Non-capital assets To conduct annual departmental.
Annual Verification of Moveable Equipment Inventory 2015.
Removal of Assets Inventory Request for Removal (IRR) Inventory Services The University of Texas at Austin.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
Property Control Asset Forms
EQUIPMENT TRACKING AND FABRICATION NCURA Region III 2008 Spring Meeting May 13, 2008 May 13, 2008.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Instructional Materials and Student Records 4309 Warrior Drive, Bldg. C McAllen, TX
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
How to Dispose of District Equipment
Proposed Process Update Equipment Inventory Office March 22, 2012 EQUIPMENT TRANSFERS.
1.1 System Performance Security Module 1 Version 5.
Property Control Asset Forms Property Control Website URL:
With Windows 7 Introductory© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Windows 7 Introductory Chapter 2 Managing Libraries Folders, Files.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Drowning in a Sea of Paper Document Archiving With Technology Presented by Arthur J. Staerk AccuScan
Curriculum Forms Guidelines and Information Curriculum Proposals for publication in the Calendar, deadline is March 31, 2015.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Property Inventory 101 Property Inventory1May 2011.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
EXPENDITURES Topic 7.1. TERMINAL OBJECTIVES 20.0COMPLETE and PROCESS all documentation required to transfer material afloat. 21.0COMPLETE and PROCESS.
COMPUTER LAB RULES AND REGULATION
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Dept. of Contracts & Property Presented by: Property Office
1 2 CFR Part 200: – Property Standards Jason Guilbeault, Senior Consultant.
Ellis Woodruff Manager of Grants, Fixed Assets & Capital Christopher Newport Hall Room
CAPITAL ASSET MANAGEMENT. 1. When are you required to capitalize an asset? 1. Only when the item purchased is greater than $75, Anytime the item.
CERTIFICATION PROGRAM INTRODUCTION & OVERVIEW PROPERTY SERVICES & SURPLUS PROPERTY.
Computer Ethics, Viruses, and Copyrights
District and Club Qualification
Procedures and Guidelines 2017/2018 School Year
Equipment Inventory Management
PREPARING AND REQUESTING PROPERTY REMOVAL
Handling Personal Data
Data Protection Act.
Annual Verification of Moveable Equipment Inventory
Computer Ethics, Viruses, and Copyrights
File Stream and Team Drives
Certificate of Property Disposal (CPD)
Curriculum Forms Guidelines and Information
Computer Ethics, Viruses, and Copyrights
Asset Management Overview of Asset Management function and procedures
Computer Ethics, Viruses, and Copyrights
DGCA Breakfast Briefing
East Carolina University Department of Materials Management
Title I Equipment Inventory Requirements
Welcome to the 2019 Property Control Inventory Update
District and Club Qualification
Curriculum Forms Guidelines and Information
Solutions to Secure File Deletion
G061 - Network Security.
Property Control Asset Forms
Topics.
Presentation transcript:

Used to request permission to remove parts from an existing piece of inventory Assumes that the original equipment is being removed from the departmental inventory After removal of all usable parts, remaining “shell” should be transferred to Surplus with copy of approved cannibalization form attached Leaving unusable equipment on departmental inventory exposes UTSA to potential loss that would be reported at original cost

Removal/Transfer of Hard Drive Be cognizant of risks associated with data remaining on cannibalized hard drive Unless being used in same department, software licenses on cannibalized hard drives should be removed or hard drive should be wiped using available software packages (not just deleted) Departments are responsible for data on their equipment, regardless of whether actively in use or stored. Computers sent to Surplus have hard drives drilled prior to transfer from UTSA

No cost to departments to turn in obsolete equipment Removes capital and controlled items from your departmental list of inventory Protects department from lost or stolen equipment left in closets, storage rooms, etc. Check-box asks if any parts have been cannibalized, primarily to determine condition of equipment for potential reuse at UTSA or sale at auction

No guarantee of future funds for this purpose If funds are made available, replacements will be based on following criteria: Between X & Y number of years old One computer surplused for each new computer received All parts intact (bootable) Been on UTSA network during last 60 days Holding onto unused equipment is risky, as same responsibility for loss exists Take advantage of Surplus process - reduce time spent on annual inventory and reduce risk of loss