|| should be accomplished by implementing a standard set of procedures for outgoing or transferring employees. This normally includes:
- removal of access privileges, computer accounts, authentication tokens,
- the control of keys,
- the briefing on the continuing responsibilities for confidentiality and privacy,
- return of property, and
- continued availability of data. In both the manual and the electronic worlds, this may involve documenting procedures or filing schemes, such as how documents are stored on the hard disk, and how are they backed up. Employees should be instructed whether or not to "clean up" their PC before leaving. If cryptography is used to protect data, the availability of cryptographic keys to management personnel must be ensured.