Skip to content
arrow_back
search
ISM-1217 policy ASD Information Security Manual (ISM)

Remove Identifying Labels from IT Equipment Before Disposal

Before throwing away IT equipment, remove any labels that show ownership or use.

record_voice_over

Plain language

This control is about making sure you remove any labels on IT equipment, like computers or phones, before getting rid of them. These labels can contain sensitive information about who owned the equipment or what it was used for. If you don't do this, someone could potentially trace back sensitive information, which could lead to privacy breaches or data leaks.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Labels and markings indicating the owner, sensitivity, classification or any other marking that can associate IT equipment with its prior use are removed prior to its disposal.
policy ASD Information Security Manual (ISM) ISM-1217
priority_high

Why it matters

Failure to remove labels can expose sensitive ownership or usage data, risking privacy breaches and unintended information disclosure.

settings

Operational notes

Before disposal, remove or obscure all asset tags and classification markings; also remove adhesive residue to prevent traceability.

Mapping detail

Mapping

Direction

Controls