Steps
The IT administrator reviews the employee's access footprint and compiles a de-provisioning list.
- Identify email, collaboration, VPN, SSO, HRIS, ERP, CRM, source control, cloud, and endpoint access.
- Identify privileged roles, service accounts, delegated access, and shared mailbox permissions.
- Identify physical access systems if IT administers badge or door access.
- Record any exceptions, unknown systems, or inherited permissions.
If a system owner cannot be identified, the IT administrator escalates to the manager and security team for ownership confirmation.
The IT administrator preserves business data and transfers ownership where required.
- Export or archive email, files, chat records, and project data according to retention policy.
- Transfer ownership of shared documents, repositories, and cloud resources to the designated manager or successor.
- Confirm that business-critical data is not stored only in the employee's personal profile or local device.
- Record the storage location, retention period, and responsible owner for each archived dataset.
If data cannot be accessed, exported, or transferred, the IT administrator escalates to the system owner and records the deviation.
The IT administrator or designated coordinator collects company-owned assets from the employee.
- Recover laptop, monitor, mobile device, peripherals, smart cards, badges, keys, and security tokens.
- Verify serial numbers, asset tags, and condition against the inventory record.
- Confirm charger, docking station, and other issued accessories are returned where applicable.
- Document missing, damaged, or unreturned items as a non-conformance.
If any asset is missing or damaged beyond normal wear, the coordinator escalates to HR, the manager, and security according to policy.