SlideShare a Scribd company logo
1 of 36
Physical Inventory - Beyond
Scanning and Checking the Box
By Marla Williams, CPPM
President, Integrated Asset Management, Inc.
President, Federal Center Chapter
Today we will cover:
• Best Practices and ASTM Standards related to
physical inventories
• Types of Inventories and Frequency
• Types of Assets – Capitalized, Accountable or
Controlled and Sensitive Items
• Automated Identification Techniques – linear
bar codes, RFID, UID
• Trends towards Inventory by Exception and
how you can begin to transition
• Basic Metrics and Investigation of Losses
• Ideas for Improving your processes
What is a Best Practice?
a technique or methodology
that, through experience and
research, has reliably led to a
desired or optimum result
Where do I find best practices for
property?
• ASTM International, a Voluntary Consensus
Standards Development Organization
– Wide base of users
– Vote to
• Develop
• Amend
• Maintain
ASTM Committee E53
• NPMA and ASTM formed E53 in June, 2000.
• Develops criteria for the management and
administration of durable and movable assets,
including:
– Performance standards
– Practices
– Metrics
– Methods of effectiveness
• Currently 25 Standards have been developed
E2132-01(2007) Standard Practice for
Physical Inventory of Durable,
Moveable Property
• Visit the ASTM.com web site to join.
• Basic Individual Membership with on-line access
to the current standards for $75.00 per year.
• Sign up for Volume 4.12
• Participate in E53 Committee
Other Sources for Best Practices
• Join NPMA
• Attend your local Chapter’s Monthly Meetings
• Join the NPMA Special Interest Group (SIG)
– Property Inventory Management SIG
• Never miss the National Education Seminar
What is a Physical Inventory?
• Verify that your records match the actual
physical conditions
• Includes:
– Identifying property that is not currently in the
system
– Identifying assets that are no longer needed by
the organization.
Types of Inventories
• Inventory by Exception (Cyclical)
• Statistical Sampling
• Wall to Wall
Inventory by Exception
• Every time item is touched, it counts as
“inventoried”
– Receiving, Transfers, Repairs, Retirements
• Inventory Period Specified
– Every year or two years
• Items not “touched” are inventoried at
the end of the period
Statistical Sampling
• Based upon the laws of probability
• A small portion of the assets are inventoried and
the results are used to assess the entire inventory
– If results are favorable, you assume that the balance
of your assets are accurate.
– If results are unfavorable, a 100% inventory may be
required.
• The smaller the sample,
the higher the risk.
Wall to Wall Inventory
• Most common type of inventory
• Requires:
– All locations are visited
– All items are inventoried
• Most expensive type
What is inventoried?
• Capital Assets
• Accountable or Controlled Assets
–Sensitive Assets
Capital Assets
• Useful Life of Over One Year (sometimes two)
• Acquisition Cost Greater Than Threshold
– $500, $5,000, or $300,000 or higher, depending on
size of organization (see financial statement
definition)
• Definitions, Additions and Changes Reported on
Financial Statement
• Ultimate responsibility of the Chief Financial
Officer.
Accountable/Controlled or
Sensitive Assets
• Items that may be vulnerable to theft
• Computers or PDA’s with personal or sensitive
information
• Hazardous material
• Weapons
ASTM Standards
• ASTM E2608 Standard – Physical Inventory of
Durable, Moveable Property provides
Equipment Control Matrix
• ASTM E2131 Standard – Reporting Loss,
Damage or Destruction of Tangible Property
provides acceptable LDD rates
ASTM Equipment Control Level 1
• Continuous Control
– 0% Acceptable LDD Rate
• Highest Standard of Sensitivity
• Consequences of loss of control is a societal
safety/security impact
• Examples
– Firearms (duty or training)
– Munitions or Explosives
– Destructive Devices
18
ASTM Equipment Control Level 2
• Control While Mobile
– 0.5% Acceptable LDD Rate
• Moderate Standard of Sensitivity
• Consequences of loss of control is a personal
safety/security impact
• Examples might include:
– Vehicles
– Secure Communications, Radios
– Stun Guns, Tasers
19
ASTM Equipment Control Level 3
• Control by Event (e.g. Receive, Maintain, Transfer, Dispose)
– 1% Acceptable LDD Rate
• Minimal Standard of Sensitivity
• Consequences of loss of control is operational safety/security
impact
• Examples:
– Software (Compliance, Inadvertent Piracy, Fines, Bad Press)
– Desktop/Laptops and Equipment with Retainable Memory not
encrypted like PDA, Blackberry, Cameras, Thumb Drives?
– Portable, Easily Converted to Private-use and/or High Potential for
Theft like Tools, Satellite Phones, Televisions, VCR/DVD, Projectors,
Small Office Machines
20
ASTM Equipment Control Level 4
• Containment
– 3% Acceptable LDD Rate
• Consequences of loss of control is a compliance
safety/security impact
• Example:
– End of Life Control for monitors, copiers, fax, scanner,
printer and other peripherals where improper
disposal could result in hazardous materials being
released into the environment.
21
ASTM Equipment Control Level 5
• No Tracking
• Non-Accountable
• Consequences of loss of control is not
discernible, which is characterized by having
no visible or recognizable impact on the
organization.
• Example:
– Stapler, Desktop Calculator
22
Who Should Do the Inventory?
• Inventory is an audit
• Needs to be performed by individuals who
have no vested interest in the outcome.
• Use:
– third party vendor
– headquarters personnel
– teams from another location
What Tools Should You Use?
• Over 1,000 assets, should justify automated
inventory tools:
– Commercial Off-the-Shelf (COTS) Single Workstation
System with one HandHeld Computer <$10,000
– COTS Web-based and Multiple Workstation System
over a network with two HandHeld Computers
$20,000-$25,000
– Oracle or SQL-based system with customized screens
and interfaces to suit your specific needs $250,000+
Handheld Computers
• Old handhelds had proprietary operating
systems and limited memory
• New handhelds are portable computers
running Windows Mobile or CE operating
systems:
– Can read RFID, UID codes or bar codes
– Allow multiple configurations or prompts
– Run multiple applications (e.g. work orders,
preventative maintenance, etc.)
Automated Identification
• Linear Bar Codes
– Most common and affordable
• UID
– DOD Program for Equipment over $5,000
– 2d matrix codes and/or linear bar codes assign unique
identification numbers to serialized equipment
– Purchase Information is sent to a
National Registry
– Benefit to non-DOD. . .
Automated Identification
• RFID
– Tags can be passive (wait to be
scanned) or active (send constantly)
– Inventory with Handhelds
or Fixed Station Scanners
– Fixed Scanning at Loading Dock, Entrances, and Hallways makes
collection automatic but can be expensive
– Consider for server rooms or areas that contain sensitive or hazardous
materials that move
– Not a “real” security measure unless hidden inside equipment
– Cost Effective for High Volume Supply Chain Management Applications
like Wal Mart. . . Not common for asset management yet. . .
Trends
• To reduce costs, consider moving towards
Inventory by Exception Techniques:
– Use IT’s existing auto-discovery technology to
inventory network equipment and help desk
systems to record movement
– Use state inspection certificates or fleet
management fueling data to inventory vehicles
Trends
• Look at other existing systems and interfaces
that could supplement inventory data:
– Work Orders used by Facilities or Maintenance
staff
– Human Resource systems that track new hires,
department information, contact data and
terminations
Get creative!!
• Strategies for Laptops, PDA’s, Cellphones
– Create “Missed You” Flyer for inventory team to
leave when employee not present
– Host doughnut stations at elevator banks – got to
bring your equipment in to get a doughnut.
– Create Mail In Packages (Hand Receipts) for
Remote users
Basic Metrics
• Measure annual overage or loss rates by overall
number(count) and dollar value
• Also make these calculations for each
Organization or Department – share the
information, recognize leaders who care!
• Also calculate these values by category of
equipment
• Compare new information to previous
losses/gains for trend
Investigate
Generally, if your loss rate is in excess of 3%
(refer to ASTM Standards) or you have an
Organization with losses in excess of that rate,
further investigation is required.
Independent Review
• Form a temporary committee
• At least three people without responsibility for
property under review
• May individually or collectively examine property
and/or records.
• Determine the circumstances of a specific instance
involving, loss, damage, destruction or similar matters
• Results may indicate failure to observe procedures,
discrepancies, premature or excessive wear or requests
for early disposal
Possible Improvements
• Too many assets not tagged:
– Consider requiring assets to be tagged and identified in
your property system before contractors are paid.
– Consider centralized receiving
– Look at credit card purchases and monthly reconciliations
• IT assets missing:
– Consider putting scanners in the hands of IT Technicians
and provide asset data to their Help Desk system.
– Consider linking to auto-discovery tools
• Key to Success
– Get those assets tagged and identified when they arrive. . .
Now its up to you!
You can just rely on the physical inventory
to maintain accuracy and continue to get
the same results, or worse,
or
you can look at the physical inventory as an
opportunity to make improvements in the
property management process
Questions?
Marla Williams, CPPM
President
Integrated Asset Management, Inc.
marla@weinventoryassets.com
(800) 731-9569
Severna Park, Maryland
President, Federal Center Chapter

More Related Content

What's hot

2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsSam Bowne
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentSam Bowne
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
CNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3d: Operational Risk ManagementCNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3d: Operational Risk ManagementSam Bowne
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleSam Bowne
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramSam Bowne
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architectureKarthikeyan Dhayalan
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26jemtallon
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleSam Bowne
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)Sam Bowne
 
Cissp business continuity planning
Cissp business continuity planning   Cissp business continuity planning
Cissp business continuity planning N N
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 

What's hot (20)

2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 
CISSP Chapter 1 BCP
CISSP Chapter 1 BCPCISSP Chapter 1 BCP
CISSP Chapter 1 BCP
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
CNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3d: Operational Risk ManagementCNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3d: Operational Risk Management
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
 
Rm 11-1
Rm 11-1Rm 11-1
Rm 11-1
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
 
Cissp business continuity planning
Cissp business continuity planning   Cissp business continuity planning
Cissp business continuity planning
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 

Similar to Physical Inventory - Beyond Scanning and Checking the Box

Strategic information system
Strategic information system Strategic information system
Strategic information system Megha_pareek
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technologynerdsonsite
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxSandeep Bhatia
 
Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Net at Work
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
Types_of_Access_Controlsggggggggggggggggg
Types_of_Access_ControlsgggggggggggggggggTypes_of_Access_Controlsggggggggggggggggg
Types_of_Access_ControlsgggggggggggggggggSaurabh846965
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdfNehemiah27
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdfKritiChoudhary9
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2Manish Kumar
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 

Similar to Physical Inventory - Beyond Scanning and Checking the Box (20)

Strategic information system
Strategic information system Strategic information system
Strategic information system
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
 
Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Types_of_Access_Controlsggggggggggggggggg
Types_of_Access_ControlsgggggggggggggggggTypes_of_Access_Controlsggggggggggggggggg
Types_of_Access_Controlsggggggggggggggggg
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
TESCO Meter Manager Overview
TESCO Meter Manager OverviewTESCO Meter Manager Overview
TESCO Meter Manager Overview
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 

Physical Inventory - Beyond Scanning and Checking the Box

  • 1. Physical Inventory - Beyond Scanning and Checking the Box By Marla Williams, CPPM President, Integrated Asset Management, Inc. President, Federal Center Chapter
  • 2. Today we will cover: • Best Practices and ASTM Standards related to physical inventories • Types of Inventories and Frequency • Types of Assets – Capitalized, Accountable or Controlled and Sensitive Items
  • 3. • Automated Identification Techniques – linear bar codes, RFID, UID • Trends towards Inventory by Exception and how you can begin to transition • Basic Metrics and Investigation of Losses • Ideas for Improving your processes
  • 4. What is a Best Practice? a technique or methodology that, through experience and research, has reliably led to a desired or optimum result
  • 5. Where do I find best practices for property? • ASTM International, a Voluntary Consensus Standards Development Organization – Wide base of users – Vote to • Develop • Amend • Maintain
  • 6. ASTM Committee E53 • NPMA and ASTM formed E53 in June, 2000. • Develops criteria for the management and administration of durable and movable assets, including: – Performance standards – Practices – Metrics – Methods of effectiveness • Currently 25 Standards have been developed
  • 7. E2132-01(2007) Standard Practice for Physical Inventory of Durable, Moveable Property • Visit the ASTM.com web site to join. • Basic Individual Membership with on-line access to the current standards for $75.00 per year. • Sign up for Volume 4.12 • Participate in E53 Committee
  • 8. Other Sources for Best Practices • Join NPMA • Attend your local Chapter’s Monthly Meetings • Join the NPMA Special Interest Group (SIG) – Property Inventory Management SIG • Never miss the National Education Seminar
  • 9. What is a Physical Inventory? • Verify that your records match the actual physical conditions • Includes: – Identifying property that is not currently in the system – Identifying assets that are no longer needed by the organization.
  • 10. Types of Inventories • Inventory by Exception (Cyclical) • Statistical Sampling • Wall to Wall
  • 11. Inventory by Exception • Every time item is touched, it counts as “inventoried” – Receiving, Transfers, Repairs, Retirements • Inventory Period Specified – Every year or two years • Items not “touched” are inventoried at the end of the period
  • 12. Statistical Sampling • Based upon the laws of probability • A small portion of the assets are inventoried and the results are used to assess the entire inventory – If results are favorable, you assume that the balance of your assets are accurate. – If results are unfavorable, a 100% inventory may be required. • The smaller the sample, the higher the risk.
  • 13. Wall to Wall Inventory • Most common type of inventory • Requires: – All locations are visited – All items are inventoried • Most expensive type
  • 14. What is inventoried? • Capital Assets • Accountable or Controlled Assets –Sensitive Assets
  • 15. Capital Assets • Useful Life of Over One Year (sometimes two) • Acquisition Cost Greater Than Threshold – $500, $5,000, or $300,000 or higher, depending on size of organization (see financial statement definition) • Definitions, Additions and Changes Reported on Financial Statement • Ultimate responsibility of the Chief Financial Officer.
  • 16. Accountable/Controlled or Sensitive Assets • Items that may be vulnerable to theft • Computers or PDA’s with personal or sensitive information • Hazardous material • Weapons
  • 17. ASTM Standards • ASTM E2608 Standard – Physical Inventory of Durable, Moveable Property provides Equipment Control Matrix • ASTM E2131 Standard – Reporting Loss, Damage or Destruction of Tangible Property provides acceptable LDD rates
  • 18. ASTM Equipment Control Level 1 • Continuous Control – 0% Acceptable LDD Rate • Highest Standard of Sensitivity • Consequences of loss of control is a societal safety/security impact • Examples – Firearms (duty or training) – Munitions or Explosives – Destructive Devices 18
  • 19. ASTM Equipment Control Level 2 • Control While Mobile – 0.5% Acceptable LDD Rate • Moderate Standard of Sensitivity • Consequences of loss of control is a personal safety/security impact • Examples might include: – Vehicles – Secure Communications, Radios – Stun Guns, Tasers 19
  • 20. ASTM Equipment Control Level 3 • Control by Event (e.g. Receive, Maintain, Transfer, Dispose) – 1% Acceptable LDD Rate • Minimal Standard of Sensitivity • Consequences of loss of control is operational safety/security impact • Examples: – Software (Compliance, Inadvertent Piracy, Fines, Bad Press) – Desktop/Laptops and Equipment with Retainable Memory not encrypted like PDA, Blackberry, Cameras, Thumb Drives? – Portable, Easily Converted to Private-use and/or High Potential for Theft like Tools, Satellite Phones, Televisions, VCR/DVD, Projectors, Small Office Machines 20
  • 21. ASTM Equipment Control Level 4 • Containment – 3% Acceptable LDD Rate • Consequences of loss of control is a compliance safety/security impact • Example: – End of Life Control for monitors, copiers, fax, scanner, printer and other peripherals where improper disposal could result in hazardous materials being released into the environment. 21
  • 22. ASTM Equipment Control Level 5 • No Tracking • Non-Accountable • Consequences of loss of control is not discernible, which is characterized by having no visible or recognizable impact on the organization. • Example: – Stapler, Desktop Calculator 22
  • 23. Who Should Do the Inventory? • Inventory is an audit • Needs to be performed by individuals who have no vested interest in the outcome. • Use: – third party vendor – headquarters personnel – teams from another location
  • 24. What Tools Should You Use? • Over 1,000 assets, should justify automated inventory tools: – Commercial Off-the-Shelf (COTS) Single Workstation System with one HandHeld Computer <$10,000 – COTS Web-based and Multiple Workstation System over a network with two HandHeld Computers $20,000-$25,000 – Oracle or SQL-based system with customized screens and interfaces to suit your specific needs $250,000+
  • 25. Handheld Computers • Old handhelds had proprietary operating systems and limited memory • New handhelds are portable computers running Windows Mobile or CE operating systems: – Can read RFID, UID codes or bar codes – Allow multiple configurations or prompts – Run multiple applications (e.g. work orders, preventative maintenance, etc.)
  • 26. Automated Identification • Linear Bar Codes – Most common and affordable • UID – DOD Program for Equipment over $5,000 – 2d matrix codes and/or linear bar codes assign unique identification numbers to serialized equipment – Purchase Information is sent to a National Registry – Benefit to non-DOD. . .
  • 27. Automated Identification • RFID – Tags can be passive (wait to be scanned) or active (send constantly) – Inventory with Handhelds or Fixed Station Scanners – Fixed Scanning at Loading Dock, Entrances, and Hallways makes collection automatic but can be expensive – Consider for server rooms or areas that contain sensitive or hazardous materials that move – Not a “real” security measure unless hidden inside equipment – Cost Effective for High Volume Supply Chain Management Applications like Wal Mart. . . Not common for asset management yet. . .
  • 28. Trends • To reduce costs, consider moving towards Inventory by Exception Techniques: – Use IT’s existing auto-discovery technology to inventory network equipment and help desk systems to record movement – Use state inspection certificates or fleet management fueling data to inventory vehicles
  • 29. Trends • Look at other existing systems and interfaces that could supplement inventory data: – Work Orders used by Facilities or Maintenance staff – Human Resource systems that track new hires, department information, contact data and terminations
  • 30. Get creative!! • Strategies for Laptops, PDA’s, Cellphones – Create “Missed You” Flyer for inventory team to leave when employee not present – Host doughnut stations at elevator banks – got to bring your equipment in to get a doughnut. – Create Mail In Packages (Hand Receipts) for Remote users
  • 31. Basic Metrics • Measure annual overage or loss rates by overall number(count) and dollar value • Also make these calculations for each Organization or Department – share the information, recognize leaders who care! • Also calculate these values by category of equipment • Compare new information to previous losses/gains for trend
  • 32. Investigate Generally, if your loss rate is in excess of 3% (refer to ASTM Standards) or you have an Organization with losses in excess of that rate, further investigation is required.
  • 33. Independent Review • Form a temporary committee • At least three people without responsibility for property under review • May individually or collectively examine property and/or records. • Determine the circumstances of a specific instance involving, loss, damage, destruction or similar matters • Results may indicate failure to observe procedures, discrepancies, premature or excessive wear or requests for early disposal
  • 34. Possible Improvements • Too many assets not tagged: – Consider requiring assets to be tagged and identified in your property system before contractors are paid. – Consider centralized receiving – Look at credit card purchases and monthly reconciliations • IT assets missing: – Consider putting scanners in the hands of IT Technicians and provide asset data to their Help Desk system. – Consider linking to auto-discovery tools • Key to Success – Get those assets tagged and identified when they arrive. . .
  • 35. Now its up to you! You can just rely on the physical inventory to maintain accuracy and continue to get the same results, or worse, or you can look at the physical inventory as an opportunity to make improvements in the property management process
  • 36. Questions? Marla Williams, CPPM President Integrated Asset Management, Inc. marla@weinventoryassets.com (800) 731-9569 Severna Park, Maryland President, Federal Center Chapter

Editor's Notes

  1. Although we can’t cover everything . . .
  2. Many organizations use a physical inventory to update their property records once a year. They do not investigate losses, improve processes or track trends. This is not a best practice. According to ASTM Standards:
  3. According to the ASTM Standard, there are three types of inventories:
  4. The hottest trend in physical inventories is Inventory by Exception (called Cyclical Inventory in the ASTM Standard). Many companies are using auto discovery tools used by their IT Departments to manage computers and software to update their asset records and reduce the costs of an annual inventory. Others use Fuel Logs maintained by their Fleet Departments and Work Orders used by Facilities Department. A good property manager will research the systems currently in use by their organization and look for additional opportunities to update their asset records.
  5. To save costs, we borrow a technique from the accounting side of the house, to monitor your records, conduct regular statistical samplings to “test” your processes and systems. Consider testing various departments, agencies or types of equipment separately, based on your processes and controls. If accuracy is high, you may be able to postpone a full scale inventory for another year. . .
  6. If you know you have problems with your processes or systems, a traditional wall-to-wall inventory may be the best solution. I recommend that you take a systematic approach, use floor plans and inventory floor-by-floor and room-by-room to be sure you have inventoried every room and storage area. Do 5-10% random audits of the areas inventoried, as you go. Don’t wait until the inventory is complete to find you have a problem with one of your inventory takers or your third party inventory company.
  7. Ask the audience, “What is your organization’s threshold for Capital Assets? Many universities and municipalities use a threshold of $5,000 for Capital Assets due to regulations about how grants from the federal government must be recognized. Department of Defense, generally, uses $5,000, however there are many rules and regulations impacting what is recognized and what is not. Federal agencies and private organizations can set their threshold at any level however, generally accepted accounting principles look for approximately 80% of the organizations total assets to be recognized on their financial statements.
  8. Although Capital Assets are required to be controlled, many organizations struggle with determining the proper level of control for assets that do not meet the Capitalization Threshold. These assets are “sensitive” and loss of control may impact the society, organization, individuals, if proper control is not maintained. ASTM E2608 provides an excellent tool or determining the level of control required and ASTM E2131 provides acceptable loss rates for various types of assets. A discussion of each category follows:
  9. Most discussions about the level of control and acceptable loss rates center around Level 3 and Level 4. Ask your audience, “What types of assets does your organization control?” “Do you know if your organization controls software?”
  10. Be sure you are aware of new federal regulations government federal agencies and their disposal of IT equipment. Also federal and state EPA regulations governing the disposal of electronics and hazardous materials – you might be surprised to learn that many states have rules governing disposal and recycling of electronics equipment too.
  11. Don’t send the Custodial Officer who is responsible for the property year round, to verify its existence. Even the most ethical person may assume that the items on the property record must be there because they are on the list. . . Ask your audience, “Has anyone in this room had this experience?” Your Custodial Officer gives themselves a 100% accurate inventory every year or maybe they turnaround their inventory in a day, when it takes everyone else weeks to complete? If you do, I guarantee that they are doing nothing more than reviewing the list and checking off the items they believe to be there. . . I once met a wonderful lady who had taken the bar codes off of each item and kept them in a binder so that she could scan them every year when they sent her the reader. Another guy at a remote office opened up a drawer filled with bar code labels and the paperwork he got from headquarters for us to scan. . .
  12. The new handhelds are like computers and can run multiple applications. This is another case where understanding your organization’s other systems could come in handy. It may be that the handhelds your Fleet Department has or your IT Department is using, could run your Property Inventory application. . . Or, perhaps you can make that a requirement on your RFP so that the handhelds you are buying for one application, can be shared by two. . .
  13. Non-DOD organizations can benefit from this program because many of the larger manufacturer can provide asset management data, similar to the data provided to the UID registry for import directly into your property management system – allowing receiving on the loading dock to be faster and more accurate. . . Because the information is unique, UID marking can also be used for Non-DOD organizations to identify and track assets from cradle to grave without the need to apply their own bar code label.
  14. Label prices have come down but fixed station scanners throughout the facility is very expensive. If portable handheld computers are used, they are not that much more effective than handhelds with linear bar codes. Ask your audience, “How many of you in the audience use RFID?”
  15. Posting information about leaders who care about property can also help motivate those who do not make property tracking a priority. It will definitely get the attention of the Chief Financial Officer in your organization.
  16. I am also happy to share another more detailed presentation on how to conduct a physical inventory. . .