When a person starts an employment relationship, he or she is granted access to all data systems related to his or her role at once.
Our organization has defined procedures for coordinating, at the time of termination of employment, e.g..:
Organisaatio on muodostanut ohjeistukset, joilla varmistetaan turvallisuutta eri työsuhteen elinkaaren vaiheissa. Ohjeistuksia koulutetaan ja valvotaan tarvittavien henkilöstöryhmien parissa (esim. esimiehet).
Menettelyohjeet voidaan kohdistaa työsuhteen eri elinkaaren vaiheisiin. Eri ohjeistuksia voivat olla esimerkiksi:
Applicants applying for cyber security should have their background checked, taking into account relevant laws and regulations.
The check may include:
The background check may also be extended to, for example, teleworkers, contractors or other third parties. The depth of the background check can be related to the category of the accessed data.
The employment contract should distinguish between cyber security responsibilities and obligations that remain in force after the termination of the employment relationship. The employee should also be reminded of these at the end of the employment relationship to ensure compliance.
If a person's employment is terminating or significantly changing, the reduction of access rights to assets should be considered, depending on the following: