Skip to content
arrow_back
search
ISM-1550 policy ASD Information Security Manual (ISM)

Develop and Maintain IT Equipment Disposal Procedures

Ensure IT equipment is disposed of properly by following established procedures.

record_voice_over

Plain language

Properly getting rid of old IT equipment is important because if you don't, sensitive information could end up in the wrong hands. Think of all the data stored on your phones, computers, and servers—without a secure disposal process, this information could be accessed by someone it shouldn't be, leading to privacy breaches and potential financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

IT equipment disposal processes, and supporting IT equipment disposal procedures, are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1550
priority_high

Why it matters

Improper disposal of IT equipment can expose residual data, causing data breaches, regulatory consequences and reputational damage.

settings

Operational notes

Maintain disposal procedures: track assets, sanitise media per approved methods, and keep records of destruction or certified wipe for each device.

Mapping detail

Mapping

Direction

Controls