-
Onboarding/Offboarding Checklist
-
Checklist: Employee Termination
-
New Employee Checklist and Default Access Policy
Change is one of the few things in life that you can count on, and it’s even more true when it comes to managing a team at work. Whether you are welcoming a new employee to the team or letting one go, it’s important to establish best processes. Adding checklists to your management tool box will help to seamlessly transition employees
Carefully managing the onboarding and offboarding process of an employee or contractorsaves time, effort, and money. When bringing on a new employee, it’s easy to provide too much or not enough access if you don’t have a policy in place with specific guidelines.
Likewise, during layoffs, it’s easy to skip or forget important protocols, which could leave company resources vulnerable to attacks or cyber theft.
These TechRepublic Premium checklists cover the processes of onboarding and offboarding an employee in careful detail. This ensures that the process remains consistent and that any manager can step in and do it, in a pinch.
Onboarding/Offboarding Checklist
Without a proper process, the hiring of new employees and onboarding of new contractors can cause any number of problems. Adopting and maintaining a formal process for onboarding and offboarding users can reduce the chances that something will go wrong..
This onboarding/offboarding checklist covers part-time non-exempt staff, full-time salaried employees, and contractors.
Checklist: Employee Termination
Laying off employees is such a stressful and uncomfortable process, it’s easy to overlook a few important steps. Using an employee termination checklist will ensure that managers take care of details likecollecting equipment or turning off access, to name a few. This checklist also provides sections for the HR department and the security team to complete as well.
New Employee Checklist and Default Access Policy
This checklist and default access policy establishes the employee’s primary level of systems access. It also outlines the process end users should follow to request and receive additional access as a user’s job and responsibilities change and evolve. This policy and checklist can be customized as needed to fit the needs of your organization.