This sample employee termination checklist comes from Tim Giles' book "How to Develop and Implement a Security Master Plan" The following termination checklist was taken from Tim Giles’ book “How to Develop and Implement a Security Master Plan”. The book is available on Amazon.comFor more ideas, see BT’s employee termination checklist or “exit pack” as well as the article Security’s role in handling layoffs. XYZ Company Line Manager Termination Checklist Manager should initial or write N/A after each 1. Equipment, software, and non-consumable items; Any items purchased for work purposesIt is the line manager’s responsibility to ensure that all equipment, software, and nonconsumable items previously purchased for work purposes are returned prior to leaving. Combination locks and code locks Change combinations on all locks to which individual had access. 2. Keys Building and gate keys Managers need to ensure that all keys are returned to “CO.” Security at: (address here) Any queries, please contact the Security Helpline on: (number here) 3. Protective ClothingManagers should follow local arrangements for return. 4. Company logo clothing, etc.Managers should follow local arrangements for return. 5. Financials, Cash advances, Corporate charge cardsManagers should follow local arrangements for return of money, etc. Corporate cards must be retrieved from employees leaving the company, cut in half, and sent to(info here) 6. Communications: Car phones and mobile phones, pagers, fax machines, etc.Managers should follow local arrangements for return. However, “CO” has a policy for the disposal of recovered redundant equipment.Details of equipment to be recovered should be entered on the order. Removal or unauthorized use of any “CO” equipment for personal use are not allowed and will be considered under the discipline procedure. Personal computers, including: terminals and modems and software and printers:Computing assets are tagged to an individual, when leaving the company the individual must reallocate the assets via e-Organization. Line managers must ensure the appropriate action has been taken for these assets.It is the responsibility of the line manager to ensure that all sensitive data are deleted from the PC if it is to be transferred to an individual who should not have access to this information. Security passwords, systems and intranet accessThe “CO” process is accessed via . Line manager notification via this channel will automatically trigger deletion of ALL registered systems access. REMEMBER: When you request a deletion the person will lose ALL access to systems and buildings.For further information outlining line manager responsibilities, please access: Ownership of system/ network/ application/Web site Line managers must ensure that transfer to new owner is completed and that the appropriate system administrator removes access authority via: . All access to systems must be rescinded before individual’s last day of service. 7. Access cards ID cards for “CO” BuildingsManagers must ensure that all “CO” swipe and proximity cards, as well as ID cards, are returned to “CO” Security at: . Any queries, please contact the “CO” Security Helpline on( info here)Signed:Manager Name:When completed, this form should be retained locally by the line manager. Please advise via e-mail if you experience any problems. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe