Contacts & Dates:
UNIVERSITY STANDARD STATEMENT
This standard establishes what details must be included about an IT Asset in the Central IT Asset Inventory.
REASON FOR STANDARD
A Central IT Asset Inventory is a digital register of IT Asset details and is a foundational element that helps empower the security program by providing a holistic view of the entire IT environment. You can鈥檛 secure what you don鈥檛 know about.
To ensure accurate and proper inventory, security, use, and disposal, all University-Owned IT Assets will be recorded in a centralized database. This database will contain information required to properly identify and secure these assets throughout their lifecycle.
The Office of Cybersecurity will review this standard biennially with feedback collected from representatives across VU to understand new concerns and dynamic requirements to best serve the VU community and adhere to VU Information Security Principles listed in the Information Security Policy.
SCOPE AND AUDIENCE
This standard applies to the entire 天美传媒官网 community including, but not limited to, faculty, staff, students, contractors, post-doctoral fellows, temporary employees, and volunteers (collectively called 鈥淰U Community Members鈥). All University-Owned IT Assets used to collect, transmit, process, store, or host institutional data are in-scope for this policy.听
DEFINITIONS
STANDARD
University-Owned IT Asset details must be recorded in the Central IT Asset Inventory. Entries and updates must be made when it is procured, deployed, gifted, reassigned, transferred, lost, stolen, retired, or disposed. Required fields are listed in Table 1.
There are and will be various methods for collecting and documenting the required information below. It is the ultimate responsibility of the IT Asset Owner to ensure this occurs.
Table 1. Central IT Asset Inventory: Required Fields
| Hardware | Software |
| Purchase/Acquisition Date | Purchase/Acquisition Date |
| IT Asset Type (e.g., desktop, laptop, server, network appliance, etc.) |
Software Product Name |
| Make, model, description, serial number | Manufacturer Name |
| Asset Name | Version Number |
| IP Address | Data Classification |
| MAC Address | Disaster Recovery Tier |
| Physical Location | Assigned IT Asset Owner |
| Operating System version | Assigned IT Asset Steward |
| Data Classification | Assigned End User |
| Disaster Recovery Tier | Date of Last Inventory |
| Assigned IT Asset Owner | |
| Assigned IT Asset Steward | |
| Assigned End User | |
| Date of Last Inventory |
EXCEPTIONS
On a rare occasion, a security policy exception may be considered depending on the impact to the university mission and security risk(s) introduced. Exception requests must be submitted to the VU Chief Information Security Officer for evaluation and risk assessment. The CISO, or a delegate, will grant or deny the request based on the level of risk.听听听
ENFORCEMENT
Any VU community member that violates this policy may be subject to disciplinary action up to and including termination. The Chief Information Security Officer will refer violations to university units (e.g., Student Accountability Office, Human Resources, and Deans) as appropriate. Violations may also constitute a violation of state or federal law and individuals shall be accountable as applicable.听
FORMS AND TOOLS
FREQUENTLY ASKED QUESTIONS
HISTORY
| Review Date | Summary of Changes |
| September 2023 | Update the effective date |
| February 2025 | Update the effective date, revised the FAQs, and added a review cadence |