What Are Employee On-boarding And Separation Procedures?

When we bring on a new client, we create a document that outlines all of the steps and tasks required to get a new employee set up in their organization.  Creating a step by step procedure and checklist helps ensure that the process is handled the same way every time and that nothing is missed.  Sometimes we end up with a base procedure, that we will apply to all employees, as well as a departmental procedure, that will be applied only to staff working in that department. 

We work closely with your management team to ensure that new employees have a smooth first day, as well as to protect the business when there is an unexpected employee separation. 

 In Addition to a detailed on-boarding procedure, here are a few of the IT related things that should be documented for all employees:

  • General description of workflow, function, and role
  • List of devices used and software used
  • List of hosted systems that each user has access to
  • Description of server, and data access requirements (folders, files & shares)
  • Company-owned devices that each employee has possession of (laptop, tablet, smartphone)
  • Any remote access accounts, VPN accounts, or other forms of remote access to company data
  • Physical access controls like key fobs or mechanical keys

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

LB signature

Related Posts

Is Your Organization Prepared to Invest What is Needed into Cybersecurity?

Safeguarding your business' infrastructure from various threats is a well-known imperative. In discussions about network security, the term "endpoint" frequently arises. Exploring the significance of securing all endpoints is the focus of today's article. Commencing with an elucidation of what constitutes an endpoint, we define it as "any device connected to a network capable of serving as a po...

The Advantages and Disadvantages of a Password Manager

Advantages Enhanced Security - Password managers excel in generating robust, unique passwords for each account, diminishing the threat of security breaches stemming from weak or reused passwords. Convenience - They offer a hassle-free means to store and automatically input login credentials, saving precious time and effort, with just one master password to remember. Organization - Password...

Implement Zero Trust Policies to Combat Ransomware

Yes, Ransomware is Common Enough to Warrant This Measure Ransomware infections, according to recent surveys, have affected three out of four professional organizations in some capacity over the past year. That?s a huge portion of businesses, and it?s no laughing matter. You need to protect yourself in any way you can. Ransomware can have various negative effects on your business, such as the foll...

Mobile Device Management is Critical for Today's Business

Security Enhancement Security is the name of the game and MDM helps enhance the security of mobile devices by policy enforcement. It gives organizations the ability to configure and enforce settings such as password complexity, encryption, and can even wipe a device in the case of theft or loss. It also provides real-time monitoring and alerts for potential security threats, allowing administrato...