Skip to content
arrow_back
search
ISM-1741 policy ASD Information Security Manual (ISM)

Implement IT Equipment Destruction Procedures

Create and maintain processes for safely destroying IT equipment.

record_voice_over

Plain language

Implementing IT equipment destruction procedures means setting up a clear and safe way to permanently get rid of old computers, servers, or other technology. This is important because if you just throw away or sell old equipment without proper destruction, sensitive information could be retrieved by the wrong people, leading to data breaches or privacy violations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

IT equipment destruction processes, and supporting IT equipment destruction procedures, are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1741
priority_high

Why it matters

Without documented equipment destruction procedures, retired devices may retain recoverable data, causing data breaches, compliance failures, financial loss and reputational damage.

settings

Operational notes

Maintain documented destruction steps (sanitisation/shredding), chain-of-custody records and certificates of destruction; periodically verify vendors and sample-check destroyed assets.

Mapping detail

Mapping

Direction

Controls