BT’s Line Manager Exit Pack & Checklist Manager’s Initials or N/A 1. Equipment, Software & non-consumable items Any items purchased for work purposes It is the Line Manager’s responsibility to ensure that all equipment, software and non-consumable items previously purchased for work purposes are returned prior to leaving. Combination locks/Code locks Change combinations on all locks to which individual had access 2. Keys Building & Gate Keys Managers need to ensure that all keys are returned to BT Security at: ______Any queries, please contact the Security Helpline on: _______ 3. Protective Clothing Managers should follow local arrangements for return 4. Image Clothing Managers should follow local arrangements for return 5. Imprests Cash float Managers should follow local arrangements for return Corporate Cards BT Corporate cards must be retrieved from employees leaving the company, cut in half and sent to: ______ 6. Communications Car Phones/ Mobile Phones (including Car Kits) Use the cease form ____ via ______Guidance notes can be found via ______ Pagers Use the cease form ____ via : ______Guidance notes can be found via: ______ BT Chargecards BT Chargecards will need to be cancelled. This can be arranged via: ______ – using form ____. Once this form is completed it should be returned to the fax number on the form. If you have any queries please contact the Chargecard unit on ______ Telephones/ Answering Machines/ Fax Machines Managers should follow local arrangements for return. However, BT has a policy for the disposal of recovered redundant equipment. Details of equipment to be recovered should be entered on the order. Removal and/or unauthorised use of any BT equipment for personal use is not allowed and will be considered under the discipline procedure. Personal computers, including:Terminals/ Modems/ Software and Printers Computing Assets are tagged to an individual, when leaving the company the individual must re-allocate the assets via e-Organisation. Line Managers must ensure the appropriate action has been taken for these assets by accessing the site via e-Gatekeeper. Note: It is the responsibility of the line manager to ensure that all sensitive data (in confidence and above documents) are deleted from the PC if it is to be transferred to an individual who should not have access to this information. Remote Access – UK Connect Individuals will need to return their SecureID cards to their Line Manager. Security Passwords systems and intranet access The ‘Left BT’ process is accessed via e-Gatekeeper at:_____. Line Manager notification via this channel will automatically trigger deletion of ALL registered systems access. REMEMBER: when you request a deletion the person will lose ALL access to systems and buildings. For further information outlining Line Manager responsibilities, please access: ______ Ownership of system/ network/ application/ website Line Managers must ensure that transfer to new owner is completed and that the appropriate System Administrator removes access authority via:______. All access to systems must be rescinded before an individuals last day of service. 7. Pass cards ID cards for BT Buildings Managers must ensure that all BT swipe and proximity cards, as well as ID cards, must be returned to BT Security at: ______ Any queries, please contact the BT Security Helpline on: ______ System access tokens Managers should follow local arrangements for return or contact Security Control Centre on ______ Signed: ____________________________________________________ Line Manager When completed, this form should be retained locally by the line manager. Please advise _____________________ via e-mail if you experience any problems accessing any of the above links/contacts. Source: British Telecom Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe