Skip to content

4.8 Offboarding, Access Control, and Knowledge Transfer

An employee’s departure is not just an HR administrative task; it is a critical security event and a major operational risk point. A sloppy exit sequence leaves two dangerous doors open: one for data leakage (Active IP theft) and one for systemic operational failure (Lost tribal knowledge).

This chapter defines the protocol for “Closing the Loop.” The sole objective of offboarding is to neutralize institutional risk and permanently preserve corporate memory. We treat offboarding with the same rigor and checklist discipline as onboarding. All access rights must be revoked, and every critical piece of undocumented knowledge must be downloaded into the core system before the employee exits the building.

When an employee leaves the company—whether through voluntary resignation or involuntary termination—the highest priority is System Integrity. Access revocation is an immediate, standard process.

  • Involuntary Exit (Termination): IT and Facilities must execute access revocation simultaneously with the termination meeting.
    • The Standard: The terminated employee returns to their desk to pack personal items only under direct management or security supervision. They do not log into the network “one last time.”
  • Voluntary Exit (Resignation): Basic email access may remain active during the formal notice period for handover purposes, but all “Privileged Access” (Admin rights, Bank authorizations, ERP approvals, Code deployment permissions) is stripped when notice is given.
    • The Logic: A resigning employee is a security risk. You do not leave the master keys to the kingdom in the pocket of someone who has mentally checked out and is actively leaving.

IT must generate and file a formal “Revocation Log” confirming that:

  1. The Email account is disabled (or forwarded to the Manager).
  2. VPN/SSO network access is terminated.
  3. All expensive SaaS licenses (Salesforce, Jira, Altium, CAD) are reclaimed.
  4. The physical security badge is deactivated.

Useless “Exit Interviews” are designed for feelings; “Handover Audits” are designed for facts. Operationally, we do not care why they are leaving nearly as much as we care about capturing exactly what they know.

The ultimate engineering goal of a handover is to ensure that when this departing person is hit by a bus tomorrow, the company would continue operating without a single operational hiccup.

The departing employee is required to produce a detailed Transfer Document (A fixed Confluence Page or properly structured Shared Folder) containing:

  1. Open Loops: A comprehensive list of all active projects, their exact current status, and the immediate next operational step.
  2. Key Contacts: A mapping of “Who do I call for X?” (Critical Suppliers, Key Client Stakeholders).
  3. The “Gotchas”: Undocumented, bizarre quirks of the physical or digital system. (e.g., “Server B requires a manual hard restart every Tuesday at 2 AM”).
  4. The File Map: Where exactly are the source files located? (Provide the direct URL link to the master repo or shared drive, not “It’s somewhere on my local desktop”).

The direct Manager must audit this Handover Artifact. When the handover is incomplete or lazy, the final clearance (and potentially any final discretionary bonus payouts) is withheld until it is fully rectified to the company standard.

Hardware assets (Expensive Laptops, Oscilloscopes, Security Badges, Calibrated Tools) are company property. They must be recovered in functional condition.

  • The Digital Wipe: All returned digital devices must be secure-erased by IT within 24 hours of return to prevent cross-contamination.
  • The Inspection: Facilities/IT formally checks the hardware for physical damage.
  • The Financial Hold: The replacement cost of unreturned or severely damaged equipment (beyond standard wear and tear) will be automatically deducted from the final financial settlement, wherever legally permitted.

The exit process differs by role type to mitigate specific risks. You must use the checklist below.

Checklist A: Office / Hardware Engineering Roles (IP Focus)

Section titled “Checklist A: Office / Hardware Engineering Roles (IP Focus)”
StepRequired Action ItemThe OwnerThe Timing
01Formal Resignation Acceptance Letter (Locking the Last Day).The ManagerDay 0
02Instant Privileged Access Revocation (Admin/Finance limits).ITDay 0
03Comprehensive Handover Artifact Creation & Review.The EmployeeWeek -1
04Client Notification Plan (Who officially tells the client?).The ManagerWeek -1
05Physical Asset Return (Laptop, Monitors, Specialized Peripherals).ITLast Day
06Total Access Revocation (Email, Slack, VPN disabled).ITLast Hour

Checklist B: Factory / SMT Ops Roles (Safety & Inventory Focus)

Section titled “Checklist B: Factory / SMT Ops Roles (Safety & Inventory Focus)”
StepRequired Action ItemThe OwnerThe Timing
01Shift Coverage Plan (Who actually takes the line shift?).Shift LeadDay 0
02Tool Audit (Mandatory return of calibrated tools/keys).Shift LeadWeek -1
03Physical PPE Return (Expensive ESD Smocks, Locker Keys).AdminLast Day
04Security Badge Deactivation (No physical access point).SecurityLast Hour
05WIP Handoff (Exact status check of current board batches).OperatorLast Shift

While we are rigorous on security, we genuinely treat departing employees with dignity. The tech and manufacturing industry is extremely small. An A-Player who leaves on excellent terms (A “Good Leaver”) is a highly valuable potential future re-hire or future customer.

  • The Good Leaver: Resigned with proper formal notice, completed a handover artifact, actively trained their successor. -> System Status: “Eligible for Rehire.”
  • The Bad Leaver: Ghosted the team, attempted sabotage, or refused a proper handover. -> System Status: “Do Not Rehire.”
The Control PointThe Operational Rule / Standard
Revocation SpeedImmediate for involuntary. The Last Hour for voluntary.
Knowledge CaptureA formal Written Artifact is mandatory. Zero tolerance for purely verbal handovers.
Privileged AccessRevoke all Admin/Financial rights the very second a resignation notice is submitted.
Asset VerficiationVerify all expensive tools/laptops against the master inventory log before the employee exits.
Client CommsThe Manager controls the narrative. The Employee does not send emotional “Goodbye” emails to key clients.
Physical SecurityThe physical badge must be collected in person. Do not ever let them “mail it in later.”