The disposal log referenced from Records Disposal & Certificates of Destruction → Records. Every disposal action from any of the trigger sources listed in Records Disposal → Triggers is logged here.
Operational mirror: the day-to-day data-entry surface lives in a Vanta-mirrored SharePoint sheet maintained by the CISO’s office; this page is the authoritative summary referenced from the policy. The CISO performs a quarterly reconciliation between the two.

Schema

Each disposal entry captures:
FieldNotes
Disposal IDSequential identifier (DSP-YYYY-NNNN).
DateDate the disposal action completed.
TriggerRetention period reached / contract termination / DSR deletion / device retirement / system decommission.
Item(s) destroyedDescription, classification, and serial numbers (where applicable).
MethodPer Records Disposal → Methods.
Vendor (if any)Name of approved vendor; None for in-house actions.
RequestorName + role.
Asset Owner approvalName + date.
CISO sign-offName + date.
Certificate of Destruction (COD)Link to attached COD; N/A for in-house actions.
NotesCross-reference to the originating ticket (DSR, offboarding, decommission).

Active log

Disposal IDDateTriggerItemsMethodVendorRequestorAsset OwnerCISO sign-offCOD
No disposal actions logged yet.

Quarterly review

The CISO performs a quarterly review of this log to confirm:
  • Every triggered disposal in the quarter is logged.
  • Every entry has Asset Owner approval and CISO sign-off.
  • Every vendor-handled entry has an attached COD.
  • Methods used align with the data classification.
Findings are recorded in the General Counsel’s quarterly compliance summary.

Cross-references

Version history

VersionDateDescriptionAuthorApproved by
1.0May 8, 2026Initial versionCameron WolfeIshan Jadhwani