A.6.5 Responsibilities after Termination or Change of Employment would include:
-
Termination Policy: A documented policy that outlines the responsibilities of employees with respect to information security upon termination or change of employment.
-
Policy Communication: Evidence that the termination policy has been communicated to all employees and that they are aware of their information security responsibilities upon termination or change of employment.
-
Exit Procedures: Documentation of the procedures followed when an employee leaves the organization, ensuring that their access to information systems, data, and physical premises is promptly revoked or modified according to their new role.
-
Access Revocation: Records of access revocation or modification for terminated or transferred employees, including termination of user accounts, removal from access groups, and deactivation of physical access cards.
-
Data and Equipment Handling: Proof that employees are aware of how to handle company data and equipment when leaving the organization, including data backup, return of company-owned devices, and removal of personal data from the devices.
-
Non-Disclosure Agreement (NDA): Documentation of any non-disclosure agreements signed by employees, emphasizing their obligation to protect confidential information even after termination or change of employment.
-
Employee Training: Records of any training provided to employees regarding their information security responsibilities upon termination or change of employment.
-
Exit Interviews: Documentation of exit interviews conducted with employees leaving the organization, focusing on information security responsibilities and ensuring that they understand the importance of protecting sensitive information even after leaving the company.
-
Recordkeeping: Proof that the organization maintains proper records of employee access rights, system permissions, and equipment assignments to facilitate the exit process.
-
HR and IT Collaboration: Evidence of collaboration between Human Resources (HR) and Information Technology (IT) departments to ensure a smooth and secure transition of responsibilities when an employee leaves the organization.
-
Compliance with Legal Requirements: Assurance that the termination process aligns with relevant laws and regulations regarding the protection of sensitive data and information confidentiality.
-
Monitoring and Audit Trail: Evidence of monitoring and audit trails to detect and prevent unauthorized access or data breaches by terminated employees.
By examining these pieces of evidence, an auditor can assess whether the organization has established and followed appropriate procedures to safeguard information assets and ensure that former employees no longer have access to sensitive information after termination or change of employment. The goal is to minimize the risk of data breaches and unauthorized access to confidential data by individuals who are no longer associated with the organization.