Free Download for Network and Data Security
![Download_Now-3 Download_Now-3](https://info.ecbm.com/hs-fs/hubfs/social-suggested-images/Download_Now-3.png?width=400&height=222&name=Download_Now-3.png)
Use As-Is Or As A Template
For businesses of any size
The form can be completed and submitted to your I.T. person/ department or used as a checklist when an employee exits.
Use this checklist to:
- Recover devices
- Organize the exit procedure for your company
- Restrict access to confidential information
- Reduce lost information
- Save time deciding who will monitor email messages