Home > Resource Center > Blog > Who is responsible for your IT risk management? 7 stakeholders to consider.
Who is responsible for your IT risk management? 7 stakeholders to consider.

Who is responsible for your IT risk management? 7 stakeholders to consider.

Posted in Blog

Glenn Laga

How do you build a comprehensive IT Risk Management program that includes the right internal stakeholders who can identify the equipment, systems and vendors that collect and store your company data?

Realistically, this breadth of knowledge is beyond the information technology department because it’s no longer the obvious devices:  computers, tablets, servers, hard drives and USB drives. Now it’s IoT-enabled equipment, outsourced services, kiosks, ordinary office equipment and the myriad of ad hoc memory retrofits and upgrades to existing equipment. 

And they all need a data destruction plan.

“30% of all data breaches come from not properly disposing of assets” 

Gartner Research

IT isn’t solely responsible for IT Risk Management

To gain that 360-degree view of data generation, accumulation, storage and dispersal, it may involve more than the usual suspects. Consider these departments and personnel that have knowledge of what is bought, in use, in storage, on loan or on the horizon:

1. Information Technology

The Chief Information Officer attends to all information and computer technologies. As such, the CIO and IT department focus on ensuring that computers, devices and machines improve business processes and function with little downtime and protection against malware and cyberattacks. 

IT departments are often in charge of IT asset refreshes working with VARs and purchasing departments. This trio of specialists should have ample documentation and software tools to track equipment purchasing, replacement parts like new hard drives and all associated serial numbers. 

IT also has the responsibility to securely unenroll any MDM (Mobile Device Management) that auto provisions, deploys and “locks” company computers so that hard drive erasure and hard drive shredding aren’t superfluous.

2. The Chief Finance Officer (CFO)

The primary role of the CFO is to establish budgets and assure the availability of funds for the purchase of equipment and fulfillment of services. A line item for data destruction, whether standard onsite hard drive shredding or a box program that includes remote hard drive erasure and then secure IT packing and shipping for remarketing, refurbishment, recycling or redeployment. Whether it’s laptop turnover, copier leases or a data center consolidation, data destruction is a budgetary line item across multiple departments. 

3. Purchasing and Receiving

The best way to know what is going out and needs data destruction is by starting with what is coming in. Every item, system, machine, device and vendor goes through procurement. This department is the primary source for recording all incoming serial numbers including replacement parts and upgrades to standardized or older equipment. 

And, what’s leaving and in-transit? Is there a secure IT logistics plan including full chain of custody planning? Are computers and smart devices shipped with live data? Or sitting in an unprotected, unsecured area (like a loading dock or a cardboard box in a cabinet) waiting for processing? 

4. Legal

Corporate attorneys are responsible for understanding the regulations and liabilities for data destruction pertaining to your industry. Ensuring that your company’s data destruction plan includes all devices and adheres to (or exceeds) minimum standards is the baseline. Collecting accurate and timely documentation of all serial numbers, data destruction from NAID AAA certified providers, chain of custody and recycling protects your company and brand from sloppy processes and procedures.

5. Equipment Planners and Facilities

Equipment and devices that are networked and IoT-enabled are potential liabilities when they reach end-of-life, stored or relocated. Educating these specialists or employees so that they can flag memory storage or sharing as an operational function creates a broader list of potential data destruction candidates while reducing risk of an accidental data breach. Don’t forget to consider offsite data-sharing machines and locations like kiosks, scanners, rental cars, registers and retail stores.

6. Data Center Managers and Technicians

Whether or not it’s part of IT or an outsourced service, data centers are an obvious center of data management, storage and backups involving racks and racks (or collective miles) of servers. Understanding server configuration (almost never standardized) including upgrades and expansions will absolutely contribute to a more accurate list of assets that need data destruction. Don’t forget backups. They’re essential as an emergency option but must be counted when suppliers or backup protocols change.

7. ESG Stewards, Sustainability and Recycling 

Count on these departments to be the guardians of ethical repurposing, donating and recycling. They’ll understand the importance of ensuring that personal and private data does not leave any facility and impact the efficacy and reputation of their environmental and community-based programming.

Successful IT Risk Management is an enterprise-wide effort

When all these professionals are purposefully involved in identifying anything “smart” with the goal of building a comprehensive data destruction process, the risk of a data breach, a compromising situation or an embarrassing mistake is far less likely. This group of aware stakeholders not only provides an all-inclusive, fully-covered plan for risk reduction but creates a foundation for increasing accuracy as data needs, data storage form factors and end-of-life processes change.

More learning resources 

We’re focused on helping customers seal off opportunities for malicious, unauthorized data breaches. 

Related articles

Don’t leave a shred of data behind. Sign up to receive data destruction news.
Talk to us about your needs and concerns. If you like forms, contact Guardian here. Or give us a call at 888-556-9473. We can give you helpful advice or refer you to a local ITAD or VAR.

Ready to get started?

Get a quote > Discuss your challenge >

5 ways to make Data Privacy Week 2023 a security win

How to make the most out of Data Privacy Day 2023 Is January 28th highlighted on your calendar? If not, it’s time to add the …

5 ways to make Data Privacy Week 2023 a security win Keep Reading >

Keep Reading >

Hard Drive Shredding and other onsite data destruction and IT logistics services during inclement weather

Bad weather happens. Whether your project site is subject to a hurricane, tornado, high winds, flooding, winter storm or extreme heat, Guardian has you covered. …

Hard Drive Shredding and other onsite data destruction and IT logistics services during inclement weather Keep Reading >

Keep Reading >

Video Tour:  Secure IT Packing and Logistics

Guardian’s IT Packing and Logistics services are all about getting your IT assets from A to B without any damages or loss in value. “Secure …

Video Tour:  Secure IT Packing and Logistics Keep Reading >

Keep Reading >

Stay in the know

Get relevant information right in your inbox

We do not sell or share your information with anyone

Previous Next
Close
Test Caption
Test Description goes like this