What Are Employee On-boarding And Separation Procedures?

When we bring on a new client, we create a document that outlines all of the steps and tasks required to get a new employee set up in their organization.  Creating a step by step procedure and checklist helps ensure that the process is handled the same way every time and that nothing is missed.  Sometimes we end up with a base procedure, that we will apply to all employees, as well as a departmental procedure, that will be applied only to staff working in that department. 

We work closely with your management team to ensure that new employees have a smooth first day, as well as to protect the business when there is an unexpected employee separation. 

 In Addition to a detailed on-boarding procedure, here are a few of the IT related things that should be documented for all employees:

  • General description of workflow, function, and role
  • List of devices used and software used
  • List of hosted systems that each user has access to
  • Description of server, and data access requirements (folders, files & shares)
  • Company-owned devices that each employee has possession of (laptop, tablet, smartphone)
  • Any remote access accounts, VPN accounts, or other forms of remote access to company data
  • Physical access controls like key fobs or mechanical keys

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

LB signature

Related Posts

Cyberthreats Threaten Your Entire Business

How Cyberattacks Imperil Your Business Cyberattacks manifest differently from other threats and yield a diverse array of consequences. They often involve attempts to infiltrate an organization's technology infrastructure with the intent to steal data, extract monetary gain, or extort business proprietors. As a result, business owners and managers are confronted with a host of distressing scenario...

You Need to Have a Business Continuity Plan for Your SMB

Business technology is known to be remarkably finicky, particularly if you do not have the requisite knowledge to manage and maintain it. After all, there is a reason why you hire an IT department or a managed service provider to handle this role. What happens if your technology fails, though? Do you have a plan in place? What does a plan like this even look like, anyway? Let’s dig into the detail...

Critical Security Measures for Data Privacy

In an individual sense, at least, it?s relatively simple. You don?t want to share anything more than what you need to. However, there is also something to be said for security and its relationship with privacy, and whether or not you should sacrifice one to maintain the other. You don?t have to pick one; in fact, you should be using security to protect your data privacy. Today, we?re investigating...

Browser Hijacking Attacks are a Serious Threat

Understanding Browser Hijacking Attacks Browser hijacking attacks involve the stealthy installation of malicious software onto a user's web browser. This malware can range from adware and spyware to more sophisticated forms like ransomware and keyloggers. The primary goal of these attacks is to gain unauthorized access to sensitive information or disrupt the user's browsing experience. Common Te...