Verify your IT asset end-of-life data security using our gap analysis checklist