Answer yes if your organisation has a formal process that ensures all access to your organisation's systems & information (this includes, but is not limited to corporate endpoints, networks, offices and third party services) is removed when employees, contractors and third party users leave the organisation and is updated when they change roles. Describe these processes within the notes and/or upload any relevant evidence.
Your company security of information policy should detail the criteria under which information access will be granted and the circumstances under which that access will be removed. To underpin the policy, a robust security procedure should:
Step 3, removing an employees access upon termination of their employment contract, is a key step within the HR Leaver Process.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.