GDPR asset managementYou may know about GDPR compliance and how it could affect your organization. You may even have GDPR preparations underway, but have you stopped to consider how GDPR compliance could impact your current lifecycle planning and asset management practices? We’ve discussed the importance of properly tracking and managing your IT assets, but now under the GDPR it could become a necessity for IT professionals responsible for IT asset management (ITAM).

What is the GDPR?

The GDPR is a new piece of data protection legislation introduced in April 2016 by the European Union and will replace the current EU Data Protection Directive 95/46/EC. The law is set to take full effect May 25, 2018 bringing a slew of new policies and practices to be reviewed. This is no different for ITAM managers. The GDPR focuses heavily on processes that protect consumer data. With rules about how a data breach must be handled. A vigilant ITAM strategy can minimize the risk of a data breach and save your company from a costly fine.


If you’re like many companies you may understand the importance of ITAM, but struggle with getting started. Here are three ways asset management can help you when it comes to being GDPR compliant.

Knowing what IT assets you own

This may seem like a no-brainer, but you’d be surprised how many IT leaders don’t know exactly what hardware and software assets are being used in their organization. This is where an ITAM platform comes in handy. Having the knowledge of 100% of your environment gives you the ability to identify any gaps or oversights when it comes to equipment and software assets. You may have some knowledge as to what hardware and software you have, but if you only know where half of the assets are, then the other half pose the largest threat to your data security strategy.

Who has access to what

Working in any IT function means preparing for the worst and ultimately, reducing or preventing it. The best way to do this is to have a full record of not only what assets you have deployed, but also who has access to it. IT managers should have a way to account for who has access to various assets and data. This not only helps prevent a data breach, but in the event that a breach does occur, you have an idea of where to start investigating.

Note: Consider chain of custody practices when decommissioning hardware assets to ensure that data security standards are being met.

How are the devices protected

Consider encrypting portable devices to ensure that all sensitive data is protected. A great deal of data breaches come from negligence. Encryption can help your organization protect important data in the event that a laptop or cell phone is misplaced, lost, or stolen.

Are You Prepared?

GDPR compliance will affect a large portion of companies, and ITAM is just one portion of IT that will need to be addressed and optimized to comply with GDPR standards. For more information on how to prepare for GDPR, exactly what the GDPR is, and more follow the Reliant Blog. To get started tracking all your hardware assets, sign up for our IT asset management portal.