Secure Equipment Repair Policy and Confidentiality Agreement

Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers, and other IT equipment.  This customizable policy, written by Erik Eckel and Mark W. Kaelin for TechRepublic Premium, ensures an organization maintains regulatory and best business practice security compliance while tracking systems when they are being repaired. Featured text from the …