What Are Employee On-boarding And Separation Procedures?

When we bring on a new client, we create a document that outlines all of the steps and tasks required to get a new employee set up in their organization.  Creating a step by step procedure and checklist helps ensure that the process is handled the same way every time and that nothing is missed.  Sometimes we end up with a base procedure, that we will apply to all employees, as well as a departmental procedure, that will be applied only to staff working in that department. 

We work closely with your management team to ensure that new employees have a smooth first day, as well as to protect the business when there is an unexpected employee separation. 

 In Addition to a detailed on-boarding procedure, here are a few of the IT related things that should be documented for all employees:

  • General description of workflow, function, and role
  • List of devices used and software used
  • List of hosted systems that each user has access to
  • Description of server, and data access requirements (folders, files & shares)
  • Company-owned devices that each employee has possession of (laptop, tablet, smartphone)
  • Any remote access accounts, VPN accounts, or other forms of remote access to company data
  • Physical access controls like key fobs or mechanical keys

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

LB signature

Related Posts

The Advantages and Disadvantages of a Password Manager

Advantages Enhanced Security - Password managers excel in generating robust, unique passwords for each account, diminishing the threat of security breaches stemming from weak or reused passwords. Convenience - They offer a hassle-free means to store and automatically input login credentials, saving precious time and effort, with just one master password to remember. Organization - Password...

Securing Your Wireless Network

Alter the Security Information on Your Router As with any account that is protected by a password, you will want to ensure that your router?s login information is changed to something much more secure than the default configuration that comes with the device. This is because any default credentials for router models can be found online and can easily be accessed by anyone that can use a Google se...

Comprehensive Cybersecurity Starts With These Actions

The effectiveness of your business' IT security heavily relies on the functionality of your IT operations. Ensuring that your staff understands their role in safeguarding your business assets is imperative. Let’s delve into the essential priorities for establishing a robust security training platform—an indispensable element in fortifying your business' IT defenses. Evaluate and Improve Your Se...

Cyberthreats Threaten Your Entire Business

How Cyberattacks Imperil Your Business Cyberattacks manifest differently from other threats and yield a diverse array of consequences. They often involve attempts to infiltrate an organization's technology infrastructure with the intent to steal data, extract monetary gain, or extort business proprietors. As a result, business owners and managers are confronted with a host of distressing scenario...