The organization, upon termination of individual employment:
-
a: Disables information system access within [organization-defined time period];
-
b: Terminates/revokes any authenticators/credentials associated with the individual;
-
c: Conducts exit interviews that include a discussion of [organization-defined information security topics];
-
d: Retrieves all security-related organizational information system-related property;
-
e: Retains access to organizational information and information systems formerly controlled by terminated individual; and
-
f: Notifies [organization-defined personnel or roles] within [organization-defined time period].
Supplemental
Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.