Answer yes if your organisation has a formal process that ensures all access to your organisation's systems & information (this includes, but is not limited to corporate endpoints, networks, offices and third party services) is removed when employees, contractors and third party users leave the organisation and is updated when they change roles. Please describe these processes within the notes and/or upload any relevant evidence.
Your company security of information policy should detail the criteria under which information access will be granted and the circumstances under which that access will be removed. To underpin the policy, a robust security procedure should:
Step 3, removing an employees access upon termination of their employment contract, is a key step within the HR Leaver Process.
For small companies a template Leaver’s checklist can be requested at support@riskledger.com. You must ensure that all line managers fill in the checklist when a new employee or contractor joins, and that they complete the checklist when they leave (this includes revoking any access to business information).
For larger companies we suggest the IT team ensure that a formal step for revoking employee access is baked into their IT service desk and leaver processes.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.