Upon termination of individual employment:
- Disable system access within [Assignment: organization-defined time period];
- Terminate or revoke any authenticators and credentials associated with the individual;
- Conduct exit interviews that include a discussion of [Assignment: organization-defined information security topics];
- Retrieve all security-related organizational system-related property; and
- Retain access to organizational information and systems formerly controlled by terminated individual.
System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for system-related property. Security topics at exit interviews include reminding individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not always be possible for some individuals, including in cases related to the unavailability of supervisors, illnesses, or job abandonment. Exit interviews are important for individuals with security clearances. The timely execution of termination actions is essential for individuals who have been terminated for cause. In certain situations, organizations consider disabling the system accounts of individuals who are being terminated prior to the individuals being notified.
Notify terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information; and Require terminated individuals to sign an acknowledgment of post-employment requirements as part of the organizational termination process.
Use [Assignment: organization-defined automated mechanisms] to [Assignment (one or more): notify [Assignment: organization-defined personnel or roles] of individual termination actions, disable access to system resources].