<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1557350231232256&amp;ev=PageView&amp;noscript=1">
Skip to content

Free Download for Network and Data Security

Download_Now-3

Use As-Is Or As A Template

For businesses of any size

The form can be completed and submitted to your I.T. person/ department or used as a checklist when an employee exits.

Use this checklist to:

  • Recover devices
  • Organize the exit procedure for your company
  • Restrict access to confidential information
  • Reduce lost information
  • Save time deciding who will monitor email messages