|| should be accomplished by implementing a standard set of procedures for outgoing or transferring employees. This normally includes:
- removal of access privileges, computer accounts, authentication tokens,
- the control of keys,
- the briefing on the continuing responsibilities for confidentiality and privacy,
- return of property, and
- continued availability of data. In both the manual and the electronic worlds, this may involve documenting procedures or filing schemes, such as how documents are stored on the hard disk, and how are they backed up. Employees should be instructed whether or not to "clean up" their PC before leaving. If cryptography is used to protect data, the availability of cryptographic keys to management personnel must be ensured.
- ↑ NIST Special Publication 800-14, at 29.
See also Edit
Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.