GettyImages-928080898.jpg

The moment current employees become ex-employees they become a potential security threat. Depending on the circumstances of the separation, most simply move on without incident. Operative word: most. To safeguard against the fraction of those who may try to extract revenge, HR and IT can pair-up for effective incident prevention:

  1. Before or during the termination meeting, revoke the soon-to-be former employee’s computer, network and data access privileges, including any remote dial-in credentials.
  2. Take possession of all company-issued key cards, computers and mobile devices, and wipe or remove the person’s email account.
  3. Remove their name from generic (“all company”) and specialized email distribution lists.
  4. Change the individual’s telephone voicemail password and delete their outgoing message.
  5. Issue a password reset notification to the employee’s closest collaborators.

 Want to gain an even deeper IT perspective on employee termination? Give us a call today at TeamLogicIT Plano 469.573.3743 or contact teamlogicitplanotx.com.