Purpose
To provide ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û with guidance to develop and implement the appropriate activities with regards to the acquisition, and eventual disposition or information technology assets, ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û system components, and third-party services.
Policy
¼«ËÙÁùºÏ²Ê¿ª½±½á¹û exercises due diligence and due care when engaging in the acquisition of information technology assets, including but not limited to, ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û system components, hardware, software, and third-party services. ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û recognizes that information technology assets have a limited useful lifespan and will designate appropriate End-of-Life (EoL) for information technology assets.
Summary
¼«ËÙÁùºÏ²Ê¿ª½±½á¹û requires that systems acquired for use in the ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û meet all Federal and State laws in addition to meeting security requirements. The acquisition begins with acceptable configuration provided by ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û to meet acceptable security standards as well as being appropriate for delivering the designated service, documentation that is distributed appropriately and a responsible end of life, disposed of in accordance with ¼«ËÙÁùºÏ²Ê¿ª½±½á¹û policy and replaced.