Quitting employee has privileged access to critical informationRevoking access privileges when someone leaves...
What could be a means to defeat a childrens’ nightmare?
How to fix my table, centering of columns
GPL code private and stolen
Specific Chinese carabiner QA?
It doesn't matter the side you see it
How can I handle a player who pre-plans arguments about my rulings on RAW?
Is there a limit on the maximum number of future jobs queued in an org?
How to kill a localhost:8080
Make me a metasequence
Would the melodic leap of the opening phrase of Mozart's K545 be considered dissonant?
Should we avoid writing fiction about historical events without extensive research?
In which way proportional valves are controlled solely by current?
School performs periodic password audits. Is my password compromised?
Lock enemy's y-axis when using Vector3.MoveTowards to follow the player
Why is my Contribution Detail Report (native CiviCRM Core report) not accurate?
How to get the first element while continue streaming?
Has Wakanda ever accepted refugees?
What does each site of a vanilla 9.1 installation do?
1970s scifi/horror novel where protagonist is used by a crablike creature to feed its larvae, goes mad, and is defeated by retraumatising him
Is there a math equivalent to the conditional ternary operator?
Being asked to review a paper in conference one has submitted to
Must 40/100G uplink ports on a 10G switch be connected to another switch?
Quitting employee has privileged access to critical information
How can I be pwned if I'm not registered on the compromised site?
Quitting employee has privileged access to critical information
Revoking access privileges when someone leaves a jobShould I report to HR and involve others if I am being wrongly accused of theft?deal with a coworker who just didn't seem to get itIs it ever acceptable to bring an infant to an office?Boss in relationship with a direct report who is a good friend of mine as wellHow to persuade boss that games with e-mail are not a good way to increase securityShould I open the door if I cannot verify that someone has an access card?How to gain trust of colleague who is blocking access to data?Information Security hiringHow to help new team member with security best practices without escalation to management
A colleague of mine had some very privileged access to sensitive information, that was kept in remote machines with no internet access whose files could not be copied to local machines.
He quit the company for a new job, and there was bit of trouble in the transition when he left.
One point that seemed obvious to me, but other people in the company seem not to agree was:
I believe the severing of his accesses should not have been discussed with him
Part of this, was because some of his accesses were made through methods that were not agreed upon (pretty sure he was never authorized to do so). And it may not be clear to everyone that this happened. The area's director was informed and took no action in the past, he claimed now not to have understood the situation before.
But also, I feel like talking to a person on how you cut his privileges is somewhat lack of professionalism, like telling to his face "I don't trust you, so I'm concerned you might want to do something bad". Or otherwise you may be giving a final chance for the person to collect some collateral: "Hey, just letting you know that tomorrow you won't be able to access that classified info, so steal it now if you forgot to do so before!".
Are there known practices or guidelines for this situation? Is the correct approach to discuss with the person or not?
professionalism security confidentiality
add a comment |
A colleague of mine had some very privileged access to sensitive information, that was kept in remote machines with no internet access whose files could not be copied to local machines.
He quit the company for a new job, and there was bit of trouble in the transition when he left.
One point that seemed obvious to me, but other people in the company seem not to agree was:
I believe the severing of his accesses should not have been discussed with him
Part of this, was because some of his accesses were made through methods that were not agreed upon (pretty sure he was never authorized to do so). And it may not be clear to everyone that this happened. The area's director was informed and took no action in the past, he claimed now not to have understood the situation before.
But also, I feel like talking to a person on how you cut his privileges is somewhat lack of professionalism, like telling to his face "I don't trust you, so I'm concerned you might want to do something bad". Or otherwise you may be giving a final chance for the person to collect some collateral: "Hey, just letting you know that tomorrow you won't be able to access that classified info, so steal it now if you forgot to do so before!".
Are there known practices or guidelines for this situation? Is the correct approach to discuss with the person or not?
professionalism security confidentiality
7
If I were leaving for a new job and they discussed with me how to cut my access, I would not be offended - that means they trust me. But then, I'm trustworthy.
– thursdaysgeek
2 hours ago
5
One place let me set up access for my replacement, and discussed how they would be transitioning me out so that I wouldn't be in the middle of working on something when access got shut down. As @thursdaysgeek said, why be offended if you're trusted?
– Richard U
2 hours ago
How did this situation affect you or your ability to perform your job functions?
– sf02
2 hours ago
@sf02 : This guy had Admin rights to a shared machine for which I was the main user. Admin rights is responsibility of IT people. Most of the classified info were also pieces of code I've used daily. But could remotely access it from anywhere, even to download files.
– Mefitico
2 hours ago
add a comment |
A colleague of mine had some very privileged access to sensitive information, that was kept in remote machines with no internet access whose files could not be copied to local machines.
He quit the company for a new job, and there was bit of trouble in the transition when he left.
One point that seemed obvious to me, but other people in the company seem not to agree was:
I believe the severing of his accesses should not have been discussed with him
Part of this, was because some of his accesses were made through methods that were not agreed upon (pretty sure he was never authorized to do so). And it may not be clear to everyone that this happened. The area's director was informed and took no action in the past, he claimed now not to have understood the situation before.
But also, I feel like talking to a person on how you cut his privileges is somewhat lack of professionalism, like telling to his face "I don't trust you, so I'm concerned you might want to do something bad". Or otherwise you may be giving a final chance for the person to collect some collateral: "Hey, just letting you know that tomorrow you won't be able to access that classified info, so steal it now if you forgot to do so before!".
Are there known practices or guidelines for this situation? Is the correct approach to discuss with the person or not?
professionalism security confidentiality
A colleague of mine had some very privileged access to sensitive information, that was kept in remote machines with no internet access whose files could not be copied to local machines.
He quit the company for a new job, and there was bit of trouble in the transition when he left.
One point that seemed obvious to me, but other people in the company seem not to agree was:
I believe the severing of his accesses should not have been discussed with him
Part of this, was because some of his accesses were made through methods that were not agreed upon (pretty sure he was never authorized to do so). And it may not be clear to everyone that this happened. The area's director was informed and took no action in the past, he claimed now not to have understood the situation before.
But also, I feel like talking to a person on how you cut his privileges is somewhat lack of professionalism, like telling to his face "I don't trust you, so I'm concerned you might want to do something bad". Or otherwise you may be giving a final chance for the person to collect some collateral: "Hey, just letting you know that tomorrow you won't be able to access that classified info, so steal it now if you forgot to do so before!".
Are there known practices or guidelines for this situation? Is the correct approach to discuss with the person or not?
professionalism security confidentiality
professionalism security confidentiality
asked 2 hours ago
MefiticoMefitico
369111
369111
7
If I were leaving for a new job and they discussed with me how to cut my access, I would not be offended - that means they trust me. But then, I'm trustworthy.
– thursdaysgeek
2 hours ago
5
One place let me set up access for my replacement, and discussed how they would be transitioning me out so that I wouldn't be in the middle of working on something when access got shut down. As @thursdaysgeek said, why be offended if you're trusted?
– Richard U
2 hours ago
How did this situation affect you or your ability to perform your job functions?
– sf02
2 hours ago
@sf02 : This guy had Admin rights to a shared machine for which I was the main user. Admin rights is responsibility of IT people. Most of the classified info were also pieces of code I've used daily. But could remotely access it from anywhere, even to download files.
– Mefitico
2 hours ago
add a comment |
7
If I were leaving for a new job and they discussed with me how to cut my access, I would not be offended - that means they trust me. But then, I'm trustworthy.
– thursdaysgeek
2 hours ago
5
One place let me set up access for my replacement, and discussed how they would be transitioning me out so that I wouldn't be in the middle of working on something when access got shut down. As @thursdaysgeek said, why be offended if you're trusted?
– Richard U
2 hours ago
How did this situation affect you or your ability to perform your job functions?
– sf02
2 hours ago
@sf02 : This guy had Admin rights to a shared machine for which I was the main user. Admin rights is responsibility of IT people. Most of the classified info were also pieces of code I've used daily. But could remotely access it from anywhere, even to download files.
– Mefitico
2 hours ago
7
7
If I were leaving for a new job and they discussed with me how to cut my access, I would not be offended - that means they trust me. But then, I'm trustworthy.
– thursdaysgeek
2 hours ago
If I were leaving for a new job and they discussed with me how to cut my access, I would not be offended - that means they trust me. But then, I'm trustworthy.
– thursdaysgeek
2 hours ago
5
5
One place let me set up access for my replacement, and discussed how they would be transitioning me out so that I wouldn't be in the middle of working on something when access got shut down. As @thursdaysgeek said, why be offended if you're trusted?
– Richard U
2 hours ago
One place let me set up access for my replacement, and discussed how they would be transitioning me out so that I wouldn't be in the middle of working on something when access got shut down. As @thursdaysgeek said, why be offended if you're trusted?
– Richard U
2 hours ago
How did this situation affect you or your ability to perform your job functions?
– sf02
2 hours ago
How did this situation affect you or your ability to perform your job functions?
– sf02
2 hours ago
@sf02 : This guy had Admin rights to a shared machine for which I was the main user. Admin rights is responsibility of IT people. Most of the classified info were also pieces of code I've used daily. But could remotely access it from anywhere, even to download files.
– Mefitico
2 hours ago
@sf02 : This guy had Admin rights to a shared machine for which I was the main user. Admin rights is responsibility of IT people. Most of the classified info were also pieces of code I've used daily. But could remotely access it from anywhere, even to download files.
– Mefitico
2 hours ago
add a comment |
3 Answers
3
active
oldest
votes
This breaks down to several things.
Yes, discussing something with an employee on the way out is risky, but so is shutting him down without a word.
There are several things that factor in:
- Reason for separation
- Difficulty of transition
- Level of trust
Reason for separation
Is this a voluntary separation, or an involuntary one?
If the person is leaving on good terms, then there's every reason to discuss the transition period, including when access will be shut off? Even if it's involuntary, there's quite a difference between someone leaving due to layoffs and someone being fired. Someone being laid off and not fired for cause may need to transition someone, and if severance is involved, they have quite the incentive to leave on a high note.
The risk in not discussing these things with someone leaving voluntarily or due to a layoff is that you would be showing them disrespect, which then opens you up to sabotage through malicious compliance, and having made an enemy unnecessarily. If you don't trust a person with access to the systems, then send them home with pay for the remainder of their notice period.
If the person is being fired for cause, you want to shut things down the moment he's notified.
Difficulty of transition
A person could be involved in projects where access to critical systems is required for them to wind down/teach a replacement to ramp up to taking over. If this is the case, then you certainly want to discuss termination of access with him. If Joe gave his notice, you'll want to discuss how long it will take for him to transfer his duties to Bob, and how much time it will take. This also goes hand in hand with the "Hit by a bus theory". A friend of mine was let go, they terminated his access, and there was literally no one to handle his work. Oooops. Yes, the people who were responsible were themselves terminated.
Level of trust
This is the big one, and remember, trust is a two way street. If you trust Bob, and Bob has good intentions, why wouldn't you discuss it with him. Personally, I wouldn't want access a day longer than I needed it, because I wouldn't want to be associated with any difficulties, or want to fix it.
The degree of discussions should be directly proportionate to trust.
If you don't trust him, why even have him in the building? If you do, why make him think he's not trusted? Who knows, you may want to hire Bob back if things change, or you may need to consult him on something in the future. A former employee who was shown trust on the way out might be amenable to taking a few phone calls if questions arise after his departure, one who was shut down without any notice might think, "Well, the heck with them then!"
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
3
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
add a comment |
This is a common problem with a common solution. When an employee leaves
1) On their last day, their SSO account is disabled.
2) If the company has non-internet connected "secret rooms" then the security chief goes around to each "secret room" and ensures access is removed
3) The security chief should review access to "secret rooms" once a month.
add a comment |
If the employee is trustworthy and has given notice, then it is very appropriate to work on a transition plan together, including setting up new accesses for replacements and shutting down access for the employee who is leaving. This can be a valuable part of the hand-off, making sure that the replacement truly does have adequate access. When the employee is leaving for a new job, unless there were issues with them, this is common.
The problem comes when the employee is being fired or is leaving under bad circumstances. The access still needs to be removed, but it is also important to make sure that all the access points are known, both for removal and for the replacement to have. A discussion is usually not the best way. If the business has overlooked that part of their security, and have that single point of failure, then a discussion or hiring someone to help them find the access points are often the only options.
In the US, often those who are laid-off were trusted and professional employees who would be glad to do a standard hand off of access information, but the current standards is that they are treated the same as firings: remove access without their knowledge, as they are being told of their redundancy.
That is why setting up documentation before hand is always better. It is always better to already know what servers there are and how to connect to them, just in case a key player leaves, for whatever reason.
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "423"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: false,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fworkplace.stackexchange.com%2fquestions%2f131025%2fquitting-employee-has-privileged-access-to-critical-information%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
StackExchange.ready(function () {
$("#show-editor-button input, #show-editor-button button").click(function () {
var showEditor = function() {
$("#show-editor-button").hide();
$("#post-form").removeClass("dno");
StackExchange.editor.finallyInit();
};
var useFancy = $(this).data('confirm-use-fancy');
if(useFancy == 'True') {
var popupTitle = $(this).data('confirm-fancy-title');
var popupBody = $(this).data('confirm-fancy-body');
var popupAccept = $(this).data('confirm-fancy-accept-button');
$(this).loadPopup({
url: '/post/self-answer-popup',
loaded: function(popup) {
var pTitle = $(popup).find('h2');
var pBody = $(popup).find('.popup-body');
var pSubmit = $(popup).find('.popup-submit');
pTitle.text(popupTitle);
pBody.html(popupBody);
pSubmit.val(popupAccept).click(showEditor);
}
})
} else{
var confirmText = $(this).data('confirm-text');
if (confirmText ? confirm(confirmText) : true) {
showEditor();
}
}
});
});
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
This breaks down to several things.
Yes, discussing something with an employee on the way out is risky, but so is shutting him down without a word.
There are several things that factor in:
- Reason for separation
- Difficulty of transition
- Level of trust
Reason for separation
Is this a voluntary separation, or an involuntary one?
If the person is leaving on good terms, then there's every reason to discuss the transition period, including when access will be shut off? Even if it's involuntary, there's quite a difference between someone leaving due to layoffs and someone being fired. Someone being laid off and not fired for cause may need to transition someone, and if severance is involved, they have quite the incentive to leave on a high note.
The risk in not discussing these things with someone leaving voluntarily or due to a layoff is that you would be showing them disrespect, which then opens you up to sabotage through malicious compliance, and having made an enemy unnecessarily. If you don't trust a person with access to the systems, then send them home with pay for the remainder of their notice period.
If the person is being fired for cause, you want to shut things down the moment he's notified.
Difficulty of transition
A person could be involved in projects where access to critical systems is required for them to wind down/teach a replacement to ramp up to taking over. If this is the case, then you certainly want to discuss termination of access with him. If Joe gave his notice, you'll want to discuss how long it will take for him to transfer his duties to Bob, and how much time it will take. This also goes hand in hand with the "Hit by a bus theory". A friend of mine was let go, they terminated his access, and there was literally no one to handle his work. Oooops. Yes, the people who were responsible were themselves terminated.
Level of trust
This is the big one, and remember, trust is a two way street. If you trust Bob, and Bob has good intentions, why wouldn't you discuss it with him. Personally, I wouldn't want access a day longer than I needed it, because I wouldn't want to be associated with any difficulties, or want to fix it.
The degree of discussions should be directly proportionate to trust.
If you don't trust him, why even have him in the building? If you do, why make him think he's not trusted? Who knows, you may want to hire Bob back if things change, or you may need to consult him on something in the future. A former employee who was shown trust on the way out might be amenable to taking a few phone calls if questions arise after his departure, one who was shut down without any notice might think, "Well, the heck with them then!"
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
3
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
add a comment |
This breaks down to several things.
Yes, discussing something with an employee on the way out is risky, but so is shutting him down without a word.
There are several things that factor in:
- Reason for separation
- Difficulty of transition
- Level of trust
Reason for separation
Is this a voluntary separation, or an involuntary one?
If the person is leaving on good terms, then there's every reason to discuss the transition period, including when access will be shut off? Even if it's involuntary, there's quite a difference between someone leaving due to layoffs and someone being fired. Someone being laid off and not fired for cause may need to transition someone, and if severance is involved, they have quite the incentive to leave on a high note.
The risk in not discussing these things with someone leaving voluntarily or due to a layoff is that you would be showing them disrespect, which then opens you up to sabotage through malicious compliance, and having made an enemy unnecessarily. If you don't trust a person with access to the systems, then send them home with pay for the remainder of their notice period.
If the person is being fired for cause, you want to shut things down the moment he's notified.
Difficulty of transition
A person could be involved in projects where access to critical systems is required for them to wind down/teach a replacement to ramp up to taking over. If this is the case, then you certainly want to discuss termination of access with him. If Joe gave his notice, you'll want to discuss how long it will take for him to transfer his duties to Bob, and how much time it will take. This also goes hand in hand with the "Hit by a bus theory". A friend of mine was let go, they terminated his access, and there was literally no one to handle his work. Oooops. Yes, the people who were responsible were themselves terminated.
Level of trust
This is the big one, and remember, trust is a two way street. If you trust Bob, and Bob has good intentions, why wouldn't you discuss it with him. Personally, I wouldn't want access a day longer than I needed it, because I wouldn't want to be associated with any difficulties, or want to fix it.
The degree of discussions should be directly proportionate to trust.
If you don't trust him, why even have him in the building? If you do, why make him think he's not trusted? Who knows, you may want to hire Bob back if things change, or you may need to consult him on something in the future. A former employee who was shown trust on the way out might be amenable to taking a few phone calls if questions arise after his departure, one who was shut down without any notice might think, "Well, the heck with them then!"
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
3
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
add a comment |
This breaks down to several things.
Yes, discussing something with an employee on the way out is risky, but so is shutting him down without a word.
There are several things that factor in:
- Reason for separation
- Difficulty of transition
- Level of trust
Reason for separation
Is this a voluntary separation, or an involuntary one?
If the person is leaving on good terms, then there's every reason to discuss the transition period, including when access will be shut off? Even if it's involuntary, there's quite a difference between someone leaving due to layoffs and someone being fired. Someone being laid off and not fired for cause may need to transition someone, and if severance is involved, they have quite the incentive to leave on a high note.
The risk in not discussing these things with someone leaving voluntarily or due to a layoff is that you would be showing them disrespect, which then opens you up to sabotage through malicious compliance, and having made an enemy unnecessarily. If you don't trust a person with access to the systems, then send them home with pay for the remainder of their notice period.
If the person is being fired for cause, you want to shut things down the moment he's notified.
Difficulty of transition
A person could be involved in projects where access to critical systems is required for them to wind down/teach a replacement to ramp up to taking over. If this is the case, then you certainly want to discuss termination of access with him. If Joe gave his notice, you'll want to discuss how long it will take for him to transfer his duties to Bob, and how much time it will take. This also goes hand in hand with the "Hit by a bus theory". A friend of mine was let go, they terminated his access, and there was literally no one to handle his work. Oooops. Yes, the people who were responsible were themselves terminated.
Level of trust
This is the big one, and remember, trust is a two way street. If you trust Bob, and Bob has good intentions, why wouldn't you discuss it with him. Personally, I wouldn't want access a day longer than I needed it, because I wouldn't want to be associated with any difficulties, or want to fix it.
The degree of discussions should be directly proportionate to trust.
If you don't trust him, why even have him in the building? If you do, why make him think he's not trusted? Who knows, you may want to hire Bob back if things change, or you may need to consult him on something in the future. A former employee who was shown trust on the way out might be amenable to taking a few phone calls if questions arise after his departure, one who was shut down without any notice might think, "Well, the heck with them then!"
This breaks down to several things.
Yes, discussing something with an employee on the way out is risky, but so is shutting him down without a word.
There are several things that factor in:
- Reason for separation
- Difficulty of transition
- Level of trust
Reason for separation
Is this a voluntary separation, or an involuntary one?
If the person is leaving on good terms, then there's every reason to discuss the transition period, including when access will be shut off? Even if it's involuntary, there's quite a difference between someone leaving due to layoffs and someone being fired. Someone being laid off and not fired for cause may need to transition someone, and if severance is involved, they have quite the incentive to leave on a high note.
The risk in not discussing these things with someone leaving voluntarily or due to a layoff is that you would be showing them disrespect, which then opens you up to sabotage through malicious compliance, and having made an enemy unnecessarily. If you don't trust a person with access to the systems, then send them home with pay for the remainder of their notice period.
If the person is being fired for cause, you want to shut things down the moment he's notified.
Difficulty of transition
A person could be involved in projects where access to critical systems is required for them to wind down/teach a replacement to ramp up to taking over. If this is the case, then you certainly want to discuss termination of access with him. If Joe gave his notice, you'll want to discuss how long it will take for him to transfer his duties to Bob, and how much time it will take. This also goes hand in hand with the "Hit by a bus theory". A friend of mine was let go, they terminated his access, and there was literally no one to handle his work. Oooops. Yes, the people who were responsible were themselves terminated.
Level of trust
This is the big one, and remember, trust is a two way street. If you trust Bob, and Bob has good intentions, why wouldn't you discuss it with him. Personally, I wouldn't want access a day longer than I needed it, because I wouldn't want to be associated with any difficulties, or want to fix it.
The degree of discussions should be directly proportionate to trust.
If you don't trust him, why even have him in the building? If you do, why make him think he's not trusted? Who knows, you may want to hire Bob back if things change, or you may need to consult him on something in the future. A former employee who was shown trust on the way out might be amenable to taking a few phone calls if questions arise after his departure, one who was shut down without any notice might think, "Well, the heck with them then!"
answered 2 hours ago
Richard URichard U
98.9k73266392
98.9k73266392
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
3
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
add a comment |
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
3
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
I think you said the same thing as me, only much better.
– thursdaysgeek
1 hour ago
3
3
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
When I've left places (whether on my terms or theirs) I've have always given them all the passwords I had and reminded them to cut my access. The reason is that I never wanted to be accused of whatever might happen after I left.
– NotMe
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
@thursdaysgeek great minds run in the same track ;)
– Richard U
1 hour ago
add a comment |
This is a common problem with a common solution. When an employee leaves
1) On their last day, their SSO account is disabled.
2) If the company has non-internet connected "secret rooms" then the security chief goes around to each "secret room" and ensures access is removed
3) The security chief should review access to "secret rooms" once a month.
add a comment |
This is a common problem with a common solution. When an employee leaves
1) On their last day, their SSO account is disabled.
2) If the company has non-internet connected "secret rooms" then the security chief goes around to each "secret room" and ensures access is removed
3) The security chief should review access to "secret rooms" once a month.
add a comment |
This is a common problem with a common solution. When an employee leaves
1) On their last day, their SSO account is disabled.
2) If the company has non-internet connected "secret rooms" then the security chief goes around to each "secret room" and ensures access is removed
3) The security chief should review access to "secret rooms" once a month.
This is a common problem with a common solution. When an employee leaves
1) On their last day, their SSO account is disabled.
2) If the company has non-internet connected "secret rooms" then the security chief goes around to each "secret room" and ensures access is removed
3) The security chief should review access to "secret rooms" once a month.
answered 2 hours ago
sevensevenssevensevens
12k42741
12k42741
add a comment |
add a comment |
If the employee is trustworthy and has given notice, then it is very appropriate to work on a transition plan together, including setting up new accesses for replacements and shutting down access for the employee who is leaving. This can be a valuable part of the hand-off, making sure that the replacement truly does have adequate access. When the employee is leaving for a new job, unless there were issues with them, this is common.
The problem comes when the employee is being fired or is leaving under bad circumstances. The access still needs to be removed, but it is also important to make sure that all the access points are known, both for removal and for the replacement to have. A discussion is usually not the best way. If the business has overlooked that part of their security, and have that single point of failure, then a discussion or hiring someone to help them find the access points are often the only options.
In the US, often those who are laid-off were trusted and professional employees who would be glad to do a standard hand off of access information, but the current standards is that they are treated the same as firings: remove access without their knowledge, as they are being told of their redundancy.
That is why setting up documentation before hand is always better. It is always better to already know what servers there are and how to connect to them, just in case a key player leaves, for whatever reason.
add a comment |
If the employee is trustworthy and has given notice, then it is very appropriate to work on a transition plan together, including setting up new accesses for replacements and shutting down access for the employee who is leaving. This can be a valuable part of the hand-off, making sure that the replacement truly does have adequate access. When the employee is leaving for a new job, unless there were issues with them, this is common.
The problem comes when the employee is being fired or is leaving under bad circumstances. The access still needs to be removed, but it is also important to make sure that all the access points are known, both for removal and for the replacement to have. A discussion is usually not the best way. If the business has overlooked that part of their security, and have that single point of failure, then a discussion or hiring someone to help them find the access points are often the only options.
In the US, often those who are laid-off were trusted and professional employees who would be glad to do a standard hand off of access information, but the current standards is that they are treated the same as firings: remove access without their knowledge, as they are being told of their redundancy.
That is why setting up documentation before hand is always better. It is always better to already know what servers there are and how to connect to them, just in case a key player leaves, for whatever reason.
add a comment |
If the employee is trustworthy and has given notice, then it is very appropriate to work on a transition plan together, including setting up new accesses for replacements and shutting down access for the employee who is leaving. This can be a valuable part of the hand-off, making sure that the replacement truly does have adequate access. When the employee is leaving for a new job, unless there were issues with them, this is common.
The problem comes when the employee is being fired or is leaving under bad circumstances. The access still needs to be removed, but it is also important to make sure that all the access points are known, both for removal and for the replacement to have. A discussion is usually not the best way. If the business has overlooked that part of their security, and have that single point of failure, then a discussion or hiring someone to help them find the access points are often the only options.
In the US, often those who are laid-off were trusted and professional employees who would be glad to do a standard hand off of access information, but the current standards is that they are treated the same as firings: remove access without their knowledge, as they are being told of their redundancy.
That is why setting up documentation before hand is always better. It is always better to already know what servers there are and how to connect to them, just in case a key player leaves, for whatever reason.
If the employee is trustworthy and has given notice, then it is very appropriate to work on a transition plan together, including setting up new accesses for replacements and shutting down access for the employee who is leaving. This can be a valuable part of the hand-off, making sure that the replacement truly does have adequate access. When the employee is leaving for a new job, unless there were issues with them, this is common.
The problem comes when the employee is being fired or is leaving under bad circumstances. The access still needs to be removed, but it is also important to make sure that all the access points are known, both for removal and for the replacement to have. A discussion is usually not the best way. If the business has overlooked that part of their security, and have that single point of failure, then a discussion or hiring someone to help them find the access points are often the only options.
In the US, often those who are laid-off were trusted and professional employees who would be glad to do a standard hand off of access information, but the current standards is that they are treated the same as firings: remove access without their knowledge, as they are being told of their redundancy.
That is why setting up documentation before hand is always better. It is always better to already know what servers there are and how to connect to them, just in case a key player leaves, for whatever reason.
answered 2 hours ago
thursdaysgeekthursdaysgeek
31.4k1553116
31.4k1553116
add a comment |
add a comment |
Thanks for contributing an answer to The Workplace Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fworkplace.stackexchange.com%2fquestions%2f131025%2fquitting-employee-has-privileged-access-to-critical-information%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
7
If I were leaving for a new job and they discussed with me how to cut my access, I would not be offended - that means they trust me. But then, I'm trustworthy.
– thursdaysgeek
2 hours ago
5
One place let me set up access for my replacement, and discussed how they would be transitioning me out so that I wouldn't be in the middle of working on something when access got shut down. As @thursdaysgeek said, why be offended if you're trusted?
– Richard U
2 hours ago
How did this situation affect you or your ability to perform your job functions?
– sf02
2 hours ago
@sf02 : This guy had Admin rights to a shared machine for which I was the main user. Admin rights is responsibility of IT people. Most of the classified info were also pieces of code I've used daily. But could remotely access it from anywhere, even to download files.
– Mefitico
2 hours ago