πŸ”’ You Must Have a Written Policy for Terminating Accounts πŸ”’

As someone with over 20 years of experience in executive management roles, particularly in operations, IT, and cybersecurity, I can’t stress enough the importance of having robust security measures in place. One area that often gets overlooked is the procedure for terminating accounts when an employee leaves the company.

🚨 Why is this Important?

When an employee leaves, they shouldn’t leave with access to sensitive company data or systems. Failing to properly deactivate accounts can lead to unauthorized access, data breaches, and a host of other security risks.

πŸ“ The Need for a Written Policy and Procedure

A written policy and correlating procedure ensures that everyone in the organization understands the steps that need to be taken when an employee leaves. It provides a clear, actionable checklist that can be followed by HR, IT, and other relevant departments. This is not just a best practice; it’s a necessity for maintaining a secure operational environment.

🀝 Engage CISOs and Security Teams

I strongly recommend involving your Chief Information Security Officer (CISO) or security team in drafting this policy. Their expertise will ensure that all bases are covered, from revoking email access to securing proprietary software.

πŸ”‘ Key Components of a Good Policy

  1. Immediate Deactivation: Accounts should be deactivated immediately upon an employee’s departure.
  2. Inventory Check: Make sure to have a list of all accounts the employee had access to.
  3. Data Retrieval: Secure any important data before deactivation.
  4. Audit: Conduct a security audit to ensure no unauthorized access has occurred or remained in place.
  5. Documentation: Keep records of all actions taken for compliance and auditing purposes.
What are you discussing at board meetings?

πŸ‘‰ Take Action Now

If your company doesn’t have a written policy for terminating accounts, now is the time to create one. It’s a simple step that can save you a lot of trouble down the line.

Feel free to share your thoughts and experiences on this topic. Let’s keep the conversation going!

#CyberSecurity #InformationSecurity #CISO #DataProtection #BestPractices #HRM #ITManagement


Stay Safe and Secure, Paul Bergman
Strategically Focused Executive Leader
20+ Years in Operations, IT, Cybersecurity
Building Bridges Between Business and Technology
πŸ”— Connect with me


Paul Bergman runs a business strategy and cybersecurity consulting company in San Diego. He writes on cybersecurity and board management for both corporate and nonprofit boards.

Verified by MonsterInsights