Skip to content

4.8 Offboarding, Access Control, and Knowledge Transfer

An employee’s departure is not merely an HR administrative task; it is a critical security event and a major operational risk point. A sloppy exit sequence leaves two dangerous vectors open: one for data leakage (Active IP theft) and one for systemic operational failure (Lost tribal knowledge).

This chapter defines the protocol for “Closing the Loop.” The sole objective of offboarding is to neutralize institutional risk and permanently preserve corporate memory. Offboarding must be treated with the identical rigor and checklist discipline applied to onboarding. All access rights must be revoked, and every critical piece of undocumented knowledge must be documented into the core system before the employee exits the building.

When an employee leaves the company—whether through voluntary resignation or involuntary termination—the highest priority is System Integrity. Access revocation is an immediate, standard process.

  • Involuntary Exit (Termination): IT and Facilities must execute access revocation simultaneously with the termination meeting.
    • The Standard: The terminated employee returns to their desk to pack personal items only under direct management or security supervision. They do not log into the network “one last time.”
  • Voluntary Exit (Resignation): Basic email access may remain active during the formal notice period for handover purposes, but all “Privileged Access” (Admin rights, Bank authorizations, ERP approvals, Code deployment permissions) is stripped when notice is given.
    • The Logic: A resigning employee is a security risk. Core administrative rights are never left with personnel who are actively exiting the system.

IT must generate and file a formal “Revocation Log” confirming that:

  1. The Email account is disabled (or forwarded to the Manager).
  2. VPN/SSO network access is terminated.
  3. All expensive SaaS licenses (Salesforce, Project management software, Altium, CAD) are reclaimed.
  4. The physical security badge is deactivated.

Useless “Exit Interviews” prioritize feelings; “Handover Audits” prioritize facts. Operationally, the reason for departure is secondary to the capture of institutional knowledge.

The ultimate engineering goal of a handover is ensuring that if the departing person were unavailable tomorrow, the company would continue operating without a single operational anomaly.

The departing employee is required to produce a detailed Transfer Document (A fixed Confluence Page or properly structured Shared Folder) containing:

  1. Open Loops: A comprehensive list of all active projects, their exact current status, and the immediate next operational step.
  2. Key Contacts: A mapping of operational dependencies (Critical Suppliers, Key Client Stakeholders).
  3. The “Gotchas”: Undocumented, bizarre quirks of the physical or digital system. (e.g., “Server B requires a manual hard restart every Tuesday at 2 AM”).
  4. The File Map: Where exactly are the source files located? (Direct URL links to the master repo or shared drive are required; local desktop storage is invalid).

The direct Manager must audit this Handover Artifact. When the handover is incomplete or lazy, the final clearance (and potentially any final discretionary bonus payouts) is withheld until it is fully rectified to the company standard.

Hardware assets (Expensive Laptops, Oscilloscopes, Security Badges, Calibrated Tools) are company property. They must be recovered in functional condition.

  • The Digital Wipe: All returned digital devices must be secure-erased by IT within 24 hours of return to prevent cross-contamination.
  • The Inspection: Facilities/IT formally checks the hardware for physical damage.
  • The Financial Hold: The replacement cost of unreturned or severely damaged equipment (beyond standard wear and tear) will be automatically deducted from the final financial settlement, wherever legally permitted.

The exit process differs by role type to mitigate specific risks. The checklists below must be strictly followed.

Checklist A: Office / Hardware Engineering Roles (IP Focus)

Section titled “Checklist A: Office / Hardware Engineering Roles (IP Focus)”
StepRequired Action ItemThe OwnerThe Timing
01Formal Resignation Acceptance Letter (Locking the Last Day).The ManagerDay 0
02Instant Privileged Access Revocation (Admin/Finance limits).ITDay 0
03Comprehensive Handover Artifact Creation & Review.The EmployeeWeek -1
04Client Notification Plan (Who officially tells the client?).The ManagerWeek -1
05Physical Asset Return (Laptop, Monitors, Specialized Peripherals).ITLast Day
06Total Access Revocation (Email, Slack, VPN disabled).ITLast Hour

Checklist B: Factory / SMT Ops Roles (Safety & Inventory Focus)

Section titled “Checklist B: Factory / SMT Ops Roles (Safety & Inventory Focus)”
StepRequired Action ItemThe OwnerThe Timing
01Shift Coverage Plan (Who actually takes the line shift?).Shift LeadDay 0
02Tool Audit (Mandatory return of calibrated tools/keys).Shift LeadWeek -1
03Physical PPE Return (Expensive ESD Smocks, Locker Keys).AdminLast Day
04Security Badge Deactivation (No physical access point).SecurityLast Hour
05WIP Handoff (Exact status check of current board batches).OperatorLast Shift

While security is rigorously enforced, departing personnel are treated with professional dignity. The tech and manufacturing industries operate within finite networks. An A-Player exiting on excellent terms (A “Good Leaver”) remains a highly valuable potential future asset or customer.

  • The Good Leaver: Resigned with proper formal notice, completed a handover artifact, actively trained their successor. -> System Status: “Eligible for Rehire.”
  • The Bad Leaver: Ghosted the team, attempted sabotage, or refused a proper handover. -> System Status: “Do Not Rehire.”

Final Checkout: Offboarding, access control, and knowledge transfer

Section titled “Final Checkout: Offboarding, access control, and knowledge transfer”
The Control PointThe Operational Rule / Standard
Revocation SpeedImmediate for involuntary. The Last Hour for voluntary.
Knowledge CaptureA formal Written Artifact is mandatory. Zero tolerance for purely verbal handovers.
Privileged AccessRevoke all Admin/Financial rights the very second a resignation notice is submitted.
Asset VerificationVerify all expensive tools/laptops against the master inventory log before the employee exits.
Client CommsThe Manager controls the narrative. The Employee does not send emotional “Goodbye” emails to key clients.
Physical SecurityThe physical badge must be collected in person. Letting them “mail it in later” is strictly prohibited.