The items should be discussed between departmental administration (Dean, Director, Administrator) and the Systems Administrator (UCS, Computing Manager) to determine if there is a need to consider these as possible deficiencies and implement additional security processes, policies or improvements based on the Asset Inventory and Risk Analysis.