Why is an IT offboarding SOP critical for company security?
An IT offboarding SOP is critical because every missed deactivation is an open door to company systems. A former employee with active credentials can access email, customer data, financial systems, and source code. In regulated industries, incomplete offboarding can also trigger compliance violations. A standardized checklist ensures every account is deactivated, every device is recovered, and every access point is closed.
What are the risks of incomplete offboarding?
| Risk | Impact | Example |
|---|---|---|
| Data theft | Former employee downloads customer data | CRM access left active for 3 months |
| Unauthorized access | Former employee reads company email | Email not disabled on departure date |
| Financial exposure | Former employee accesses billing systems | Payment platform credentials not revoked |
| IP theft | Former employee copies source code | GitHub access not removed |
| Compliance violation | Audit finds orphaned accounts with access to PII | SOC 2 / HIPAA violation |
| Reputation damage | Former employee sends messages from company accounts | Slack/email access not revoked |
What must the offboarding SOP cover?
| System | Action | Timeline |
|---|---|---|
| SSO/Identity provider | Disable account | Immediately on last day |
| Disable, set auto-forward to manager | Immediately | |
| Slack/Teams | Deactivate account | Immediately |
| CRM | Revoke access, transfer records | Within 24 hours |
| Code repositories | Remove access, rotate shared secrets | Within 24 hours |
| Cloud storage | Transfer ownership, remove sharing | Within 24 hours |
| VPN | Revoke credentials | Immediately |
| Hardware | Collect and wipe devices | Within 1 week |
How do you make offboarding reliable?
Document the deactivation workflow for each system using Glyde. Create a master offboarding checklist that links to each system-specific guide. Assign IT to execute the checklist on every departure — no exceptions, no shortcuts.
This answer is part of our guide to SOPs by role and use case.