Secure IT offboarding process to protect company data

When an employee walks out the door, your company’s data walks with them—unless you have a system in place. The numbers are sobering: 12% of departing employees take sensitive information when they leave, and 83% of former employees retain some form of access to company systems even after employment ends.

What is IT offboarding? IT offboarding is the process of revoking system access, retrieving devices, and securing company data when an employee leaves. It includes disabling accounts, wiping devices, and auditing data retention to prevent unauthorized access.

Remote work has magnified this risk. Without physical proximity, your IT team can’t simply collect a badge and laptop. Cloud-based tools, mobile devices with cached credentials, and passwords saved in browsers create hidden access points that a traditional offboarding checklist might miss entirely.

This guide shows you how to build an IT offboarding process that actually works in a remote environment.

TL;DR: Secure Offboarding at a Glance

  • Disable all access within the first 24 hours of separation notice through your identity provider (IdP) or SSO system
  • Retrieve all company devices (laptops, phones, security keys) within 48 hours of termination notification
  • Audit cloud storage, shared drives, and shadow IT applications for residual access
  • Implement automated access revocation to reduce manual errors and delay
  • Document every action taken during employee offboarding with timestamps for compliance
  • Reset shared credentials, update distribution lists, and revoke API keys immediately
  • Conduct a final verification check 7–10 days after departure to confirm complete access removal
  • Create a formal handoff process for customer accounts, passwords, and sensitive projects

Why Remote Employee Departure Creates Unique Risks

Remote work introduced flexibility and cost savings, but it also created a security liability. Your employees aren’t typing passwords into computers in your office. They’re logging in from home, airports, and coffee shops. Their laptops sync data to personal cloud accounts. Their phones have access to critical systems.

When an employee departs, the old office-based offboarding rules break down. Simply reclaiming physical devices no longer guarantees removal of all sensitive data access. Former employees may retain synchronized files on personal devices, stored passwords in browsers, or access to unmanaged applications.

Here’s what the data shows: 88% of IT workers said they would take sensitive company information if fired. More troubling, 89% of workers reported they could access sensitive company data well after leaving employment. On average, they retained access to email (35%), shared files (31%), backend systems (25%), and financial information (14%).

The costs compound fast. Malicious insider attacks cost organizations $4.92 million on average. Breaches caused by insider error run $3.62 million. A single departing employee with unrevoked access becomes your most expensive security incident waiting to happen.

Remote-first companies face an additional challenge: shadow IT. Employees use unauthorized software, cloud services, and third-party applications that your IT team never approved or documented. When they leave, these accounts remain active and forgotten. In Q1 2026, there were 486 data breach events recorded across all vectors. Your offboarding process needs to account for every application an employee touched, not just the approved ones.

Step 1: Prepare Before the Departure Date

Your IT offboarding process begins the moment you know an employee is leaving. Not on their last day. Not after they’ve already uploaded files to personal accounts. Now.

Create a departure event in your identity and access management system. This triggers a sequence of actions your team will follow. Assign one person as the offboarding coordinator. They’re responsible for ensuring nothing slips through the cracks.

Gather the following information about the departing employee:

  • All devices they own or have used (laptop, phone, tablet, security keys)
  • All cloud services and software they access (both approved and shadow IT)
  • All projects, customer accounts, and sensitive data they manage
  • All shared credentials or API keys they possess
  • Their physical location on their final day

Generate a complete list of their accounts. Query your identity provider for all active sessions and applications they’re connected to. This takes 30 minutes and prevents hours of manual hunting later. If you don’t have centralized identity management, this is the moment you realize you need it.

Schedule a handoff meeting with the departing employee for their second-to-last day of employment. The goal: transfer critical knowledge and ownership of ongoing work to remaining team members. This isn’t a social call. It’s operational insurance. Have them document their passwords in a secure vault, provide access to customer accounts, and list which applications they use daily that others may not know about.

Step 2: Disable Account Access Immediately

The clock starts on the employee’s last day. Within the first hour they leave, you disable their account.

Start with your identity provider or single sign-on (SSO) system. This is your central switch. Disabling the account at the IdP cascades access removal across every connected application. Slack, Google Workspace, Microsoft 365, Salesforce, Jira, GitHub—all gone.

If you use an automated access revocation tool, configure it to trigger on the termination date. These systems integrate with your HR platform and automatically revoke access at a specified time. They reduce manual errors and ensure timing precision. When the final day arrives, the system fires without delay.

For applications not connected to your IdP, manually disable or delete the account within the same timeframe:

  • Email systems
  • VPN accounts
  • Remote desktop access
  • Third-party SaaS applications
  • Legacy on-premise systems

Reset any shared credentials or passwords the employee knew. If they had access to the company bank account password, Google Analytics admin account, or marketing platform master login, change it immediately. Shared credentials are a security antipattern. Replace them with individual accounts and role-based access. But in the moment, reset everything they touched.

Remove them from all distribution lists and email aliases. This prevents someone from sending messages impersonating them.

Disable their security keys and multi-factor authentication devices. If they have a FIDO2 key registered, remove it. If they use an authenticator app, disarm it.

In a 2025 study on insider threat data, researchers found that 83% of former employees maintained some form of access to company systems after departure. Most of these cases were due to manual oversight or slow access revocation processes. Automation cuts this percentage dramatically.

Step 3: Retrieve All Company-Owned Devices

Device retrieval is the physical complement to account access revocation. Start within 24 hours of the final day.

Your goal: recover every company-owned device in the employee’s possession. This includes the obvious (laptop, phone) and the overlooked (security keys, mobile hotspots, tablets, smartwatches).

Send a formal request via email and phone. Be direct: “We need you to return your company laptop and any other company equipment by [date/time].” Provide specific instructions for how and where to return devices. If the employee is in another state or country, offer options: mail with prepaid label, local shipping, or courier pickup.

Set a deadline of 48 hours from notification. This aggressive timeline prevents devices from disappearing into a drawer at home. Track every device. Create a checklist and confirm receipt.

When devices arrive, don’t just shelve them. Perform a security wipe. Connect the laptop to your network in a controlled environment and run a data removal tool that meets Department of Defense standards (7-pass overwrite minimum). For phones, remote wipe them using mobile device management (MDM) tools. For hard drives, either destroy them physically or certify that data has been securely erased.

Why so aggressive? Studies show that return rates drop 40% if you wait beyond 48 hours. Employees forget. They move. They ignore requests. Immediate action ensures you recover assets and minimize risk.

Retrieve the employee’s security badges, building access cards, and any physical security tokens. Update your access control system to revoke their entry permissions. If they worked hybrid, confirm they no longer have office access.

One additional step many companies miss: retrieve backup drives or external storage devices. If the employee has a personal backup drive they used for work, collect it. These devices often contain unencrypted copies of sensitive files.

Step 4: Audit Cloud Storage and Shared Drives

This is where remote work creates the biggest vulnerability. Shared drives, Google Drive, OneDrive, and Dropbox often contain files the departing employee can still access or has already copied.

Log into each cloud storage system with an admin account. Search for files the employee recently modified or accessed. If they were working on customer data, contracts, or intellectual property, trace which folders they touched.

Look for signs of data exfiltration:

  • Large files downloaded recently
  • Bulk file access in the hours before resignation announcement
  • Files moved to personal folders or external shares
  • Unusual access patterns (logging in at midnight, downloading from multiple locations)

Document what you find. If the employee violated a data security policy or confidentiality agreement, your documentation becomes evidence.

Remove the departing employee as the owner or editor of any shared folders. Transfer ownership to a remaining team member. Audit the sharing settings to confirm external recipients no longer have access.

Remove them from all team drives, shared OneDrive folders, and shared Dropbox accounts.

Check Google Groups and Microsoft 365 groups they belonged to. Remove them from any distribution lists or team memberships.

The shadow IT problem compounds here. Employees often use personal cloud accounts (Gmail, personal iCloud, WeTransfer) to store work files without IT approval. You can’t directly access a personal account, but you can ask for deletion of company files as part of the offboarding process. Include this in your offboarding letter to the departing employee and request signed confirmation they’ve removed company data from personal accounts.

Related Reads:
Remote Device Retrieval for Offboarding
Zero Trust Security for Remote Teams
IT Asset Management Policy Template
Sources:
NIST Cybersecurity Framework
CISA: Cybersecurity Best Practices
SHRM: Conducting Employment Termination

Key Takeaways

An effective IT offboarding process protects your company in three ways. First, it reduces the risk of data theft and security breaches from departing employees. Second, it ensures compliance with data protection regulations and industry standards. Third, it demonstrates due diligence to auditors, customers, and regulators.

Remote work has made offboarding more complex, but it hasn’t made it impossible. The steps are straightforward:

  1. Prepare before departure
  2. Disable access immediately
  3. Retrieve devices within 48 hours
  4. Audit cloud storage and shared drives
  5. Revoke third-party access
  6. Secure customer accounts
  7. Monitor for residual access
  8. Document everything
  9. Assign clear ownership
  10. Automate what you can

Start with a basic offboarding employee checklist. Document what happens when each person leaves. Find the gaps. Fix them. Repeat.

The 12% of departing employees who take company data aren’t stealing it during their final presentation. They’re exfiltrating it weeks before they resign, when your systems are still trusting and unaware. A strong offboarding process catches these actions before they happen.

Your data is too valuable to leave to chance.