SlideShare una empresa de Scribd logo
1 de 11
Offboarding Google Apps
Users in 7 Short Steps
Why it Matters
Company records
departing employee may have access to company
secrets, client emails, and research data
Account ownership
departing employee can delete or alter documents
if ownership is not properly transferred
Time and cost
Misplaced documents can result in loss of time and
money and re-hiring of former employees
➢ Change password
○ – from Google Admin console
○ – allows continued email flow
➢ Change user name
○ –stops email flow
➢ Migrate user to another organization with
services turned off
○ – stops email flow
➢ Suspend the account
○ – stops email flow
Step 1: Cut off Access to the Account
Step 2: Secure Devices, Data, and
Connectivity
➢ Connected devices may contain sensitive data
➢ Includes laptops and smart phones
➢ Identify devices assigned to user in Google
Admin console
➢ Turn off access for each device in Console
➢ Recover devices from user
Step 3: Perform Data Backups
➢ Third party software for automated backups
➢ Manual backup
➢ Use Google Takeout to create archives
○ – www.google.com/settings/takeout
○ – Select files to archive
○ – Select archive formats
Step 4: Migrate Ownership of Files
➢ Even though files may be backed up, critical
files need easy access by those who will take
over
➢ Use Google Admin console to reassign account
➢ Can assign documents to different individuals
Step 5: Suspend or Delete Account
➢ Suspending account will block access without
deleting data
○ – Will also suspend email flow
➢ Account deletion will forever prevent access to all
documents – be sure to back up and reassign
ownership first.
Step 6: Forward Mail
➢ Ongoing email access may be necessary for
continuity
➢ From user account, add a forwarding address to
allow ongoing access to emails from both outgoing
and other employees
➢ If account access has been blocked, only forwarded
email will be seen.
➢ If transition is gradual, outgoing user may continue
to receive email while email is forwarded to other
users.
➢ Consider an automated response (e.g., “out of
office”) to indicate absence of the user from the
organization.
Step 7: Manage Archived Data
➢ Have an overall plan for data storage, access,
and archiving – not just when offboarding
➢ Be aware of legal requirements for data
retention
➢ Data should be fully cataloged, backed up, and
easily accessible.
Special Concerns
➢ Security breaches often occur when inattentive
employees fail to observe basic security
precautions.
➢ Outgoing employees may sometimes be special
security risks.
➢ Treat offboarding as a major security procedure
for the protection of the organization.
Off-boarding a Google Apps users in 7 short steps

Más contenido relacionado

Similar a Off-boarding a Google Apps users in 7 short steps

Remo Outlook Backup and Migrate
Remo Outlook Backup and MigrateRemo Outlook Backup and Migrate
Remo Outlook Backup and MigrateRemo Software
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxgemaherd
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr complianceAsanka Nissanka
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery processJitendraKumarKar2
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
It security backing up data
It security backing up dataIt security backing up data
It security backing up dataCiaran Comerford
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationCiaran Comerford
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
Information management
Information managementInformation management
Information managementDeepak John
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingRishikesh Sah
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...Lenur Dzhemiliev
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfGeovaniGonalves6
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 
Data privacy and data classification
Data  privacy  and  data  classificationData  privacy  and  data  classification
Data privacy and data classificationQasim965490
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...RIYAJAIN179446
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
Mastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementMastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementVaultastic
 

Similar a Off-boarding a Google Apps users in 7 short steps (20)

Remo Outlook Backup and Migrate
Remo Outlook Backup and MigrateRemo Outlook Backup and Migrate
Remo Outlook Backup and Migrate
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Prep your app for gdpr compliance
Prep your app for gdpr compliancePrep your app for gdpr compliance
Prep your app for gdpr compliance
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery process
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
It security backing up data
It security backing up dataIt security backing up data
It security backing up data
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint Presentation
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
Information management
Information managementInformation management
Information management
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue Handling
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdf
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
CyberArk
CyberArkCyberArk
CyberArk
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
Data privacy and data classification
Data  privacy  and  data  classificationData  privacy  and  data  classification
Data privacy and data classification
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Mastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementMastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data Management
 

Más de SysCloud

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
SysCloud Overview
SysCloud Overview SysCloud Overview
SysCloud Overview SysCloud
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceSysCloud
 
Popular privacy & security laws you should know
Popular privacy & security laws you should knowPopular privacy & security laws you should know
Popular privacy & security laws you should knowSysCloud
 
Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017SysCloud
 
Risks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpaRisks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpaSysCloud
 
SysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerSysCloud
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google appsSysCloud
 
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationHow to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationSysCloud
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataSysCloud
 

Más de SysCloud (11)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
SysCloud Overview
SysCloud Overview SysCloud Overview
SysCloud Overview
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
 
Popular privacy & security laws you should know
Popular privacy & security laws you should knowPopular privacy & security laws you should know
Popular privacy & security laws you should know
 
Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017Syscloud Release Notes - Q1, 2017
Syscloud Release Notes - Q1, 2017
 
Risks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpaRisks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpa
 
SysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud's June 2016 Release
SysCloud's June 2016 Release
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google apps
 
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationHow to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Off-boarding a Google Apps users in 7 short steps

  • 1. Offboarding Google Apps Users in 7 Short Steps
  • 2. Why it Matters Company records departing employee may have access to company secrets, client emails, and research data Account ownership departing employee can delete or alter documents if ownership is not properly transferred Time and cost Misplaced documents can result in loss of time and money and re-hiring of former employees
  • 3. ➢ Change password ○ – from Google Admin console ○ – allows continued email flow ➢ Change user name ○ –stops email flow ➢ Migrate user to another organization with services turned off ○ – stops email flow ➢ Suspend the account ○ – stops email flow Step 1: Cut off Access to the Account
  • 4. Step 2: Secure Devices, Data, and Connectivity ➢ Connected devices may contain sensitive data ➢ Includes laptops and smart phones ➢ Identify devices assigned to user in Google Admin console ➢ Turn off access for each device in Console ➢ Recover devices from user
  • 5. Step 3: Perform Data Backups ➢ Third party software for automated backups ➢ Manual backup ➢ Use Google Takeout to create archives ○ – www.google.com/settings/takeout ○ – Select files to archive ○ – Select archive formats
  • 6. Step 4: Migrate Ownership of Files ➢ Even though files may be backed up, critical files need easy access by those who will take over ➢ Use Google Admin console to reassign account ➢ Can assign documents to different individuals
  • 7. Step 5: Suspend or Delete Account ➢ Suspending account will block access without deleting data ○ – Will also suspend email flow ➢ Account deletion will forever prevent access to all documents – be sure to back up and reassign ownership first.
  • 8. Step 6: Forward Mail ➢ Ongoing email access may be necessary for continuity ➢ From user account, add a forwarding address to allow ongoing access to emails from both outgoing and other employees ➢ If account access has been blocked, only forwarded email will be seen. ➢ If transition is gradual, outgoing user may continue to receive email while email is forwarded to other users. ➢ Consider an automated response (e.g., “out of office”) to indicate absence of the user from the organization.
  • 9. Step 7: Manage Archived Data ➢ Have an overall plan for data storage, access, and archiving – not just when offboarding ➢ Be aware of legal requirements for data retention ➢ Data should be fully cataloged, backed up, and easily accessible.
  • 10. Special Concerns ➢ Security breaches often occur when inattentive employees fail to observe basic security precautions. ➢ Outgoing employees may sometimes be special security risks. ➢ Treat offboarding as a major security procedure for the protection of the organization.