Professional Documents
Culture Documents
ACPL-ISMS-C5.9 Inventory of Information and Other Associated Assets Policy
ACPL-ISMS-C5.9 Inventory of Information and Other Associated Assets Policy
assets Policy
Document ID ACPL-ISMS-C5.9
Document Classification Internal
Issue Date (effective from) 01.12.2023
Version No 1.0
Latest Review Date 01.12.2023
1. Control statement:
An inventory of information and other associated assets, including owners, should be developed and
maintained.
2. Purpose:
To identify the organization’s information and other associated assets in order to preserve their
information security and assign appropriate ownership.
3. Scope:
This covers all the information assets and other associated assets available in the organization
including cloud information.
4. Procedure:
Inventory of assets:
1. The inventory of the information assets and other associated assets have been determined
and maintained by keeping the importance of information security in mind. Ref. No. XXXXX.
2. All assets in the inventory will be reviewed at least once in a year for updating for the addition,
deletion and category change (if any)
3. The location of the assets has been identified in the asset inventory register.
4. A single list of asset inventory has been prepared and made available to the concerned
department/individual
5. Each asset has been identified with the classification of the assets.
6. The ownership, custodian and the user has been identified in the inventory of assets.
7. The owner of the assets has the following responsibilities pertaining to the Assets he / she
own:
The asset owner is responsible for the proper management of an asset over the whole asset life
cycle, ensuring that:
Doc ID: ACPL-ISMS-C5.9 Version 1.0 Last Rev. Date: 01.12.2023 Page 2 of 3
This document is confidential and must not be shared or copied without written permission from
Aethereus Consulting. Please return or destroy upon request.
Inventory of information and other associated assets Policy
7. Information and other associated assets, when deleted or disposed, are handled in a secure manner
and removed from the inventory;
8. Identification and management of risks associated with their asset(s);
9. Owner has to support personnel who have the roles and responsibilities of managing their information.
5. Reference
6. Revision History
Doc ID: ACPL-ISMS-C5.9 Version 1.0 Last Rev. Date: 01.12.2023 Page 3 of 3
This document is confidential and must not be shared or copied without written permission from
Aethereus Consulting. Please return or destroy upon request.