What Are Employee On-boarding And Separation Procedures?

What Are Employee On-boarding And Separation Procedures?   When we bring on a new client, we create a document that outlines all of the steps and tasks required to get a new employee set up in their organization.  Creating a step by step procedure and checklist helps ensure that the process is handled the same way every time and that nothing is missed.  Sometimes we end up with a base procedure, that we will apply to all employees, as well as a departmental procedure, that will be applied only to staff working in that department.  We work closely with your management team to ensure that new employees have a smooth first day, as well as to protect the business when there is an unexpected employee separation.   In Addition to a detailed on-boarding procedure, here are a few of the IT related things that should be documented for all employees: General description of workflow, function, and role List of devices used and software used List of hosted systems that each user has access to Description of server, and data access requirements (folders, files & shares) Company-owned devices that each employee has possession of (laptop, tablet, smartphone) Any remote access accounts, VPN accounts, or other forms of remote access to company data Physical access controls like key fobs or mechanical keys At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. What is involved with a lock-down procedure? What types of things should be documented? What is a comprehensive data backup system? What should be included in an Acceptable Use Policy? What are employee onboarding and separation procedures? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

Ok, I Want To Know More, What’s The Next Step?

OK, I want to learn more, what’s the next step?   Simply fill out the form on our “Contact” page, or give us a call to set up a private consult. We will provide more detailed information about our company and services, and we will discuss your current situation, as well as your short and long term goals.  If it looks like we may be a good fit for each other, we will provide a ballpark estimate to give you an idea of what our services may cost. If that all sounds good, we move forward with a basic audit of your environment and gather more detail about your priorities and needs.  We will follow up with a custom proposal, as well as a few client references for your review.  There is no cost or obligation involved, and the process can take as little as a few days. If you decide that we are not a fit, or if the timing is just not right, we promise not to bug you with endless sales calls.  We will respect your time and privacy, and will be there when you are ready!   And remember, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. What is involved with a lock-down procedure? What types of things should be documented? What is a comprehensive data backup system? What should be included in an Acceptable Use Policy? What are employee onboarding and separation procedures? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?

I Have A Dispute With My Current IT Provider, how can I keep them out of my network?

I Have A Dispute With My Current IT Provider, how can I keep them out of my network?   It is very rare that an outside vendor or employee would ever intentionally cause your business harm or disruption, but we understand that it is your job to protect the businesses and minimize risk.  As the adage goes, “It’s better to be safe than sorry.” If you feel that things don’t seem right, we can help in several ways. The first step is to have a private & confidential conversation to discuss the situation and assess the risks to the business.  The risk assessment will prepare the foundation for an action plan outlining the steps required for a rapid lock-down. As you can imagine, having been in business for over thirty years, we have helped with similar situations before.  Often we have responded with an overnight data backup, lock-down, and extraction; and sometimes, we have even helped clear up a misunderstanding which resulted in getting a relationship with an existing vendor back on track.  Either way, we are happy to help. And remember, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. What is involved with a lock-down procedure? What types of things should be documented? What is a comprehensive data backup system? What should be included in an Acceptable Use Policy? What are employee onboarding and separation procedures? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?