What Are Employee On-boarding And Separation Procedures?

When we bring on a new client, we create a document that outlines all of the steps and tasks required to get a new employee set up in their organization.  Creating a step by step procedure and checklist helps ensure that the process is handled the same way every time and that nothing is missed.  Sometimes we end up with a base procedure, that we will apply to all employees, as well as a departmental procedure, that will be applied only to staff working in that department. 

We work closely with your management team to ensure that new employees have a smooth first day, as well as to protect the business when there is an unexpected employee separation. 

 In Addition to a detailed on-boarding procedure, here are a few of the IT related things that should be documented for all employees:

  • General description of workflow, function, and role
  • List of devices used and software used
  • List of hosted systems that each user has access to
  • Description of server, and data access requirements (folders, files & shares)
  • Company-owned devices that each employee has possession of (laptop, tablet, smartphone)
  • Any remote access accounts, VPN accounts, or other forms of remote access to company data
  • Physical access controls like key fobs or mechanical keys

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

LB signature

Related Posts

Strategies to Control Your Passwords

Passwords are the keys to digital access, but they're often not treated as keys; meaning they aren’t always protected by their users. Unfortunately, people don’t always do everything they can to protect their passwords and there are a lot more scammers out there than pickpockets. Effective password management is crucial for any business. It works to maintain the security of online accounts and se...

Securing Your Wireless Network

Alter the Security Information on Your Router As with any account that is protected by a password, you will want to ensure that your router?s login information is changed to something much more secure than the default configuration that comes with the device. This is because any default credentials for router models can be found online and can easily be accessed by anyone that can use a Google se...

The Advantages and Disadvantages of a Password Manager

Advantages Enhanced Security - Password managers excel in generating robust, unique passwords for each account, diminishing the threat of security breaches stemming from weak or reused passwords. Convenience - They offer a hassle-free means to store and automatically input login credentials, saving precious time and effort, with just one master password to remember. Organization - Password...

Ransomware is Still a Major Threat for All Businesses and Individuals Alike

Prioritize Your Backups We recommend that you make data backup a top priority for your business in just about all situations possible. Good backups keep your data safe in an isolated environment where they can be accessed as needed. We recommend you use the cloud, offline backups, or off-site data centers for your storage needs. You can also use automation to ensure that the process is as consist...