Skip to content
arrow_back
search
ISM-1599 policy ASD Information Security Manual (ISM)

Proper Handling of Sensitive IT Equipment

Ensure IT equipment is handled based on how sensitive or classified it is.

record_voice_over

Plain language

This control is about making sure that the way we handle IT equipment matches how sensitive or classified the information on it is. It's important because mishandling such equipment could lead to leaking sensitive data or compromising important systems, which can cause financial damage and hurt your organisation's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

IT equipment is handled in a manner suitable for its sensitivity or classification.
policy ASD Information Security Manual (ISM) ISM-1599
priority_high

Why it matters

Improper handling of sensitive IT equipment can expose stored data or classified material during transport, storage or disposal, causing a breach.

settings

Operational notes

Define and regularly test procedures for labelling, secure transport, controlled storage and sanitised disposal of sensitive IT equipment, with chain-of-custody.

Mapping detail

Mapping

Direction

Controls