TL;DR
- Disable all access within the first 24 hours after a separation notice using your identity provider (IdP) or SSO system.
- Collect all company devices, including laptops, phones, and security keys, within 48 hours of the termination notice.
- Review cloud storage, shared drives, and shadow IT tools for any remaining access.
- Use automated access revocation to reduce delays and manual mistakes.
- Record every offboarding action with timestamps to support compliance.
- Reset shared credentials, update distribution lists, and revoke API keys right away.
- Run a final verification check 7-10 days after departure to confirm all access has been removed.
- Set up a formal handoff process for customer accounts, passwords, and sensitive projects.
When an employee walks out the door, your company’s data walks with themâunless you have a system in place. The numbers are sobering: 12% of departing employees take sensitive information when they leave, and 83% of former employees retain some form of access to company systems even after employment ends.
What is IT offboarding? IT offboarding is the process of revoking system access, retrieving devices, and securing company data when an employee leaves. It includes disabling accounts, wiping devices, and auditing data retention to prevent unauthorized access.
Remote work has magnified this risk. Without physical proximity, your IT team can’t simply collect a badge and laptop. Cloud-based tools, mobile devices with cached credentials, and passwords saved in browsers create hidden access points that a traditional offboarding checklist might miss entirely.
This guide shows you how to build an IT offboarding process that actually works in a remote environment.
Why Remote Employee Departure Creates Unique Risks
Remote work introduced flexibility and cost savings, but it also created a security liability. Your employees aren’t typing passwords into computers in your office. They’re logging in from home, airports, and coffee shops. Their laptops sync data to personal cloud accounts. Their phones have access to critical systems.
When an employee departs, the old office-based offboarding rules break down. Simply reclaiming physical devices no longer guarantees removal of all sensitive data access. Former employees may retain synchronized files on personal devices, stored passwords in browsers, or access to unmanaged applications.
Here’s what the data shows: 88% of IT workers said they would take sensitive company information if fired. More troubling, 89% of workers reported they could access sensitive company data well after leaving employment. On average, they retained access to email (35%), shared files (31%), backend systems (25%), and financial information (14%).
The costs compound fast. Malicious insider attacks cost organizations $4.92 million on average. Breaches caused by insider error run $3.62 million. A single departing employee with unrevoked access becomes your most expensive security incident waiting to happen.
Remote-first companies face an additional challenge: shadow IT. Employees use unauthorized software, cloud services, and third-party applications that your IT team never approved or documented. When they leave, these accounts remain active and forgotten. In Q1 2026, there were 486 data breach events recorded across all vectors. Your offboarding process needs to account for every application an employee touched, not just the approved ones.
Step 1: Prepare Before the Departure Date
Your IT offboarding process begins the moment you know an employee is leaving. Not on their last day. Not after they’ve already uploaded files to personal accounts. Now.
Create a departure event in your identity and access management system. This triggers a sequence of actions your team will follow. Assign one person as the offboarding coordinator. They’re responsible for ensuring nothing slips through the cracks.
Gather the following information about the departing employee:
- All devices they own or have used (laptop, phone, tablet, security keys)
- All cloud services and software they access (both approved and shadow IT)
- All projects, customer accounts, and sensitive data they manage
- All shared credentials or API keys they possess
- Their physical location on their final day
Generate a complete list of their accounts. Query your identity provider for all active sessions and applications they’re connected to. This takes 30 minutes and prevents hours of manual hunting later. If you don’t have centralized identity management, this is the moment you realize you need it.
Schedule a handoff meeting with the departing employee for their second-to-last day of employment. The goal: transfer critical knowledge and ownership of ongoing work to remaining team members. This isn’t a social call. It’s operational insurance. Have them document their passwords in a secure vault, provide access to customer accounts, and list which applications they use daily that others may not know about.
Step 2: Disable Account Access Immediately
The clock starts on the employee’s last day. Within the first hour they leave, you disable their account.
Start with your identity provider or single sign-on (SSO) system. This is your central switch. Disabling the account at the IdP cascades access removal across every connected application. Slack, Google Workspace, Microsoft 365, Salesforce, Jira, GitHub all gone.
If you use an automated access revocation tool, configure it to trigger on the termination date. These systems integrate with your HR platform and automatically revoke access at a specified time. They reduce manual errors and ensure timing precision. When the final day arrives, the system fires without delay.
For applications not connected to your IdP, manually disable or delete the account within the same timeframe:
- Email systems
- VPN accounts
- Remote desktop access
- Third-party SaaS applications
- Legacy on-premise systems
Reset any shared credentials or passwords the employee knew. If they had access to the company bank account password, Google Analytics admin account, or marketing platform master login, change it immediately. Shared credentials are a security antipattern. Replace them with individual accounts and role-based access. But in the moment, reset everything they touched.
Remove them from all distribution lists and email aliases. This prevents someone from sending messages impersonating them.
Disable their security keys and multi-factor authentication devices. If they have a FIDO2 key registered, remove it. If they use an authenticator app, disarm it.
In a 2025 study on insider threat data, researchers found that 83% of former employees maintained some form of access to company systems after departure. Most of these cases were due to manual oversight or slow access revocation processes. Automation cuts this percentage dramatically.
Step 3: Retrieve All Company-Owned Devices
Device retrieval is the physical complement to account access revocation. Start within 24 hours of the final day.
Your goal: recover every company-owned device in the employee’s possession. This includes the obvious (laptop, phone) and the overlooked (security keys, mobile hotspots, tablets, smartwatches).
Send a formal request via email and phone. Be direct: “We need you to return your company laptop and any other company equipment by [date/time].” Provide specific instructions for how and where to return devices. If the employee is in another state or country, offer options: mail with prepaid label, local shipping, or courier pickup.
Set a deadline of 48 hours from notification. This aggressive timeline prevents devices from disappearing into a drawer at home. Track every device. Create a checklist and confirm receipt.
When devices arrive, don’t just shelve them. Perform a security wipe. Connect the laptop to your network in a controlled environment and run a data removal tool that meets Department of Defense standards (7-pass overwrite minimum). For phones, remote wipe them using mobile device management (MDM) tools. For hard drives, either destroy them physically or certify that data has been securely erased.
Why so aggressive? Studies show that return rates drop 40% if you wait beyond 48 hours. Employees forget. They move. They ignore requests. Immediate action ensures you recover assets and minimize risk.
Retrieve the employee’s security badges, building access cards, and any physical security tokens. Update your access control system to revoke their entry permissions. If they worked hybrid, confirm they no longer have office access.
One additional step many companies miss: retrieve backup drives or external storage devices. If the employee has a personal backup drive they used for work, collect it. These devices often contain unencrypted copies of sensitive files.
Step 4: Audit Cloud Storage and Shared Drives
This is where remote work creates the biggest vulnerability. Shared drives, Google Drive, OneDrive, and Dropbox often contain files the departing employee can still access or has already copied.
Log into each cloud storage system with an admin account. Search for files the employee recently modified or accessed. If they were working on customer data, contracts, or intellectual property, trace which folders they touched.
Look for signs of data exfiltration:
- Large files downloaded recently
- Bulk file access in the hours before resignation announcement
- Files moved to personal folders or external shares
- Unusual access patterns (logging in at midnight, downloading from multiple locations)
Document what you find. If the employee violated a data security policy or confidentiality agreement, your documentation becomes evidence.
Remove the departing employee as the owner or editor of any shared folders. Transfer ownership to a remaining team member. Audit the sharing settings to confirm external recipients no longer have access.
Remove them from all team drives, shared OneDrive folders, and shared Dropbox accounts.
Check Google Groups and Microsoft 365 groups they belonged to. Remove them from any distribution lists or team memberships.
The shadow IT problem compounds here. Employees often use personal cloud accounts (Gmail, personal iCloud, WeTransfer) to store work files without IT approval. You can’t directly access a personal account, but you can ask for deletion of company files as part of the offboarding process. Include this in your offboarding letter to the departing employee and request signed confirmation they’ve removed company data from personal accounts.
Remote Device Retrieval for Offboarding
Zero Trust Security for Remote Teams
IT Asset Management Policy Template
NIST Cybersecurity Framework
CISA: Cybersecurity Best Practices
SHRM: Conducting Employment Termination
Key Takeaways
An effective IT offboarding process protects your company in three ways. First, it reduces the risk of data theft and security breaches from departing employees. Second, it ensures compliance with data protection regulations and industry standards. Third, it demonstrates due diligence to auditors, customers, and regulators.
Remote work has made offboarding more complex, but it hasn’t made it impossible. The steps are straightforward:
- Prepare before departure
- Disable access immediately
- Retrieve devices within 48 hours
- Audit cloud storage and shared drives
- Revoke third-party access
- Secure customer accounts
- Monitor for residual access
- Document everything
- Assign clear ownership
- Automate what you can
Start with a basic offboarding employee checklist. Document what happens when each person leaves. Find the gaps. Fix them. Repeat.
The 12% of departing employees who take company data aren’t stealing it during their final presentation. They’re exfiltrating it weeks before they resign, when your systems are still trusting and unaware. A strong offboarding process catches these actions before they happen.
Your data is too valuable to leave to chance.
Frequently Asked Questions
FAQ: Secure IT Offboarding for Remote Teams
What is IT offboarding and why does it matter for remote teams?
IT offboarding is the process of removing system access, recovering devices, and securing company data when an employee leaves. For remote teams, it matters even more because employees may use personal devices, sync files to personal cloud accounts, and adopt unauthorized apps. That means collecting a badge is no longer enough. Research shows 83% of former employees still retain some level of access after departure.
What should happen within the first 24 hours of an employee’s departure?
Start by disabling the employee’s account in your identity provider (IdP) or SSO system, since that removes access across connected tools like Slack, Google Workspace, Salesforce, and GitHub. Then manually shut off any apps outside the IdP, reset shared credentials, remove the person from distribution lists, and disable security keys and MFA devices. Speed matters because delays are the main reason former employees keep lingering access.
How quickly should company devices be retrieved, and what happens to them?
Send a formal device return request within 24 hours of the employee’s last day and set a firm 48-hour return deadline. Return rates fall sharply after that window. Once devices are back, complete a certified security wipe, such as a DoD-standard 7-pass overwrite for laptops or a remote MDM wipe for phones. Be sure to recover security keys, tablets, hotspots, and external drives as well, since they may contain unencrypted sensitive data.
How do you audit cloud storage and catch potential data exfiltration?
Review each cloud storage platform with admin access and check which files the employee recently opened or changed. Warning signs include large downloads before resignation, bulk file access, files moved into personal folders, or logins at unusual times. Reassign ownership of shared folders, remove the employee from team drives and groups, and send an offboarding notice requesting signed confirmation that company data has been deleted from any personal cloud accounts they may have used.
What’s the biggest mistake companies make during IT offboarding?
The most common mistake is relying on manual processes. Manual offboarding is slower and more error-prone, which makes it the leading cause of lingering access after someone leaves. The best fix is automation: connect your HR system to your identity platform so access is removed automatically on the termination date. Follow that with a final verification check 7-10 days later and document every step with timestamps for compliance and audit readiness.