Sometimes, employees need to be “let go.” Usually an uncomfortable situation, certain measures should be taken in order to secure company data and intellectual property. While a manager and staff typically know when this is going to occur, sometimes such a situation happens suddenly. In either case, keep this 12- Point Checklist for Network Security Protocol in a desktop folder for easy retrieval.
While all items should be completed in the following checklist, some are grouped together and should occur as simultaneously as possible. If you need a partner on this important task, we are here to help.
12-Point Checklist for Network Security Protocol for Employee Termination
- Create an offboarding checklist for all employees
- Reset Passwords for the network, social media accounts, and entrance to physical office
- Disable access to company emails and forward emails to the new employee or manager
- Terminate access to voicemail and change outgoing message to direct callers to different staff
- Backup all data
- Communicate termination with the company (to prevent any accidental access to sensitive information)
- Block access to any shared accounts (messaging apps, cloud services, calendars, etc)
- Remove any third-party accounts
- Collect physical keys or any access cards/codes to facilities
- Retrieve, wipe, & update any company devices
- Track termination procedure steps and employee actions, to ensure accuracy and any unusual activity
- Conduct departure interview
Clients typically contact us in advance for such procedures and on our end, network-related tasks can be accomplished precisely with scheduled timing. Intellectual property is the lifeblood of a company and we are here to help you protect yours. Contact us to discuss this important matter further.
Additional Reading:
Working While on the Road: 13 Efficient Ways to Keep Your Work and Personal Data Safe