Description
Given the information security implications of the loss or theft of equipment containing sensitive personal or commercial information, this process is one of the most important hardware asset management processes.
The primary owner of this process is Information Security, and for most organisations the protection of sensitive data stored on equipment is the priority for this process.