Here is a sample checklist for a business with less than a 50 computer network that will offboard an employee without compromising the computers, files, and network:
- Inform the employee: Notify the employee of the offboarding process and discuss their transition.
- Gather equipment: Collect all company-owned equipment from the employee, including laptops, smartphones, and other devices.
- Disable access: Disable the employee’s access to company email, network, and other sensitive systems immediately.
- Backup data: Ensure that all important data and files owned by the employee are backed up and saved on the company’s servers or cloud services.
- Reset passwords: Reset all passwords that the employee had access to, including system and email passwords.
- Notify IT team: Notify the IT team of the employee’s departure and any access permissions that need to be revoked.
- Remove accounts: Remove the employee’s accounts from all systems, applications, and software tools used by the company.
- Check for file access: Check if the employee had access to any confidential or sensitive files, and ensure that access is disabled.
- Verify backups: Verify that all data and files owned by the employee are backed up and saved on the company’s servers or cloud services.
- Check for any pending tasks: Check for any pending tasks assigned to the employee and reassign them to other team members.
- Conduct a security audit: Conduct a security audit of the company’s systems and networks to ensure that there are no unauthorized access points or security vulnerabilities.
- Ensure confidentiality: Ensure that the employee is aware of their confidentiality obligations and has returned all company documents, files, and data before departing.
By following this checklist, a business can ensure that an employee’s departure is handled in a professional and secure manner, without compromising the company’s network, computers, and files.