Skip to content
LuxSci
Secure High Volume Email Secure Email Gateway Secure Marketing Secure Forms Secure Text Secure Email Hosting Secure Web Hosting
HIPAA Compliant Email HIPAA Compliant Marketing HIPAA Compliant Email Marketing HIPAA Compliant Forms HIPAA Compliant Hosting
API Access SMTP TLS Checker SecureLine Technology System Status Blog EOB Calculator
About Us Partners Support Contact Us
Login Contact Us
Secure High Volume Email Secure Email Gateway Secure Marketing Secure Forms Secure Text Secure Email Hosting Secure Web Hosting
HIPAA Compliant Email HIPAA Compliant Marketing HIPAA Compliant Email Marketing HIPAA Compliant Forms HIPAA Compliant Hosting
API Access SMTP TLS Checker SecureLine Technology System Status Blog EOB Calculator
About Us Partners Support Contact Us
Login Contact Us

Plan Ahead – Preparing for Employee Termination

August 18, 2009 • By Erik Kangas • In Business Solutions

Repeatedly, it is a situation that we see over and over.  Monday morning hits and we get a frantic call from a manager or VP in one of our customer’s organization. They need access to their account, but the person who was set up as their account manager has left the company or been terminated.  Oops.

At LuxSci, like many other conscientious places, we take very seriously the determination of “who is authorized to do what” in an account.  If the account owner is gone and provisions are not made ahead of time for taking over his/her duties, it can be a time consuming and tedious process to validate and establish someone else in the organization as the rightful owner of the account (and not just someone trying to “trick the system” and get access to things that s/he should not have access to).

If you are planning on letting an employee go, you should make sure well ahead of time to check the following things:

  • Domain names: Does this employee “own” your company’s domain names?  Look in the online WHOIS database and see who is listed as the owner and technical contacts.  If this person leaves and owns your domain name(s), it might come down to a lawsuit to get them back and you could lose service and access in the interim.  Many times, when employees register new domain names for their companies, they put themselves down as the point of contact — which may also make them the “owner”.
  • Even if the employee is not the owner of your domains, make sure that s/he is not the only one with the login access to the domain name registrar.  If you need to change something later — you do not want to discover that you suddenly do not have any access.
  • Email and Web Services: If the employee is the main administrator for your outsourced email and/or web hosting services, make sure that you know his/her login information before letting him/her go.  Alternately, make sure that the account is set up so that there are alternate administrators that have full authority over the account. It may be difficult to access all administrative functions or get support for your account once the administrator is no longer at the company.
  • Internal Systems: Take an inventory of all of your internal systems and see what the employee may have administrative access to.  For example, servers, routers, WiFi, web sites, blogs, wikis, etc.  Make sure that someone else also has full administrative access to these systems so that, when an employee leaves, you still have full access to everything and so that employee’s access can be removed promptly and without causing business disruption.

Recommendations

For each critical system or web site, you should make sure that:

  • At least two authorized people have administrative access
  • The access of these people is independent, if possible, so that removing or turning off the access of one person does not remove access for the other person.

Systems to review may include:

  • Domain name registration, domain name ownership, access to registrar and DNS management portals
  • Important Email accounts
  • Spam and Virus Filtering management portals
  • Email Archival management portals
  • Web sites with administrative control panels
  • Networking hardware such as routers, switches, firewalls, etc.
  • Administration of custom web site applications: Wiki, Blog, Forum, Content Management, Web Hosting Control Panel
  • Credit card payment gateways accounts
  • Online bank account and credit card portals

You can protect access in many ways.  The most common include:

  1. Create two separate administrative users with equal and complete access.  This gives you accountability in terms of who is doing what and when.  It also allows one user to disable the other user if needed, without the need to change passwords or lose access to his/her own settings and access.
  2. Use one shared administrative user and password.  In this case, multiple people can login to the same account with the same username and password and perform administrative tasks.  If needed, the password can also be changed to lock out someone.
  3. At LuxSci, you could contact Technical Support, and define a policy under which the administrator can be changed or who should always have full access, no matter what.  You can also specify how you want the identity of people to be verified.  In this way, no matter what an employee may do, you cannot be locked out of your account.

The means that you employ to secure access to important services will depend upon your level of paranoia and the capabilities of the systems and services involved.

All we can do is recommend that you plan ahead and make sure that, if it came down to suddenly having to let someone important go, that you would know exactly how to (a) remove their access to your critical systems quickly and (b) retain your own access to those systems.  If you wait until after the fact and react instead of plan, as we have seen many companies do, you are sure to have problems … maybe minor, but maybe so serious that they threaten your business.

Erik Kangas

About Erik Kangas

With 30 years engaged in to both academic research and software architecture, Erik Kangas is the founder and Chief Technology Officer of LuxSci, playing a core role in building the company into the market leader for HIPAA compliant, secure healthcare communications solutions that it is today. An international lecturer on messaging security, Erik also advises and consults on email technology strategies and best practices, secure architectures, and HIPAA compliance. Erik holds undergraduate degrees in physics and mathematics from Case Western Reserve University, and a doctoral degree in computational biophysics from MIT.

Follow: LinkedIn

Get in touch

Find The Best Solution For Your Organization
Talk To An Expert & Get A Quote

I consent to be contacted by LuxSci for this inquiry and other relevant content, products, and services. You may unsubscribe from these communications at any time. We're committed to your privacy. For more information, check out our Privacy Policy.


A member of our staff will reach out to you

Category

  • AAA Featured Articles (8)
  • Affiliates & Resellers (3)
  • Business Solutions (72)
  • Case Studies (8)
  • Collaboration (1)
  • Company Announcements (8)
  • Dedicated & Cloud Servers (15)
  • Email Archival (4)
  • Email data breach (1)
  • Faxing (1)
  • HIPAA Compliant Email Marketing (10)
  • HIPAA Compliant Forms (28)
  • HIPAA Email Compliance (72)
  • HIPAA Marketing (98)
  • HITRUST CSF (6)
  • Industry News (11)
  • LuxSci Help (4)
  • LuxSci Insider (12)
  • LuxSci Library: Email Programs and Devices (13)
  • LuxSci Library: HIPAA (104)
  • LuxSci Library: Insider Insight (2)
  • LuxSci Library: Security and Privacy (95)
  • LuxSci Library: The Technical Side of Email (53)
  • LuxSci Library: Web Design and Programming (4)
  • Mobile (8)
  • New Feature Announcements (88)
  • Patient Engagement (14)
  • Popular Posts (21)
  • Secure Text (7)
  • Secure Video (1)
  • SMTP Connector (3)
  • Spam (1)
  • Telehealth (8)

Recent Posts

  • The Case For Email Security
  • What Makes A HIPAA Compliant Website?
  • Why You Should Separate Your Transactional and Your Marketing Email Sending
  • What exactly does HIPAA say about Email Security?
  • Patient Engagement: Why Email is an Essential Channel
  • 6 Email Marketing Best Practices for Healthcare

Get Your Free E-Book!

LuxSci High Email Deliverability Best Practices Paper

High Email Deliverability Best Practices

What you'll learn:

  • How to optimize email performance
  • Key strategies to increase email deliverability rates
  • How email deliverability impacts marketing ROI
Get Free Ebook
LuxSci

Personalized Healthcare Engagement

LinkedIn G2 YouTube Facebook X (Twitter)

Products

  • Secure High Volume Email
  • Secure Email Gateway
  • Secure Marketing
  • Secure Forms
  • Secure Text
  • Secure Email Hosting
  • Secure Web Hosting

Resources

  • SMTP TLS Checker
  • SecureLine Technology
  • System Status
  • Blog
  • Company
  • Support
  • Partners
  • Contact us
  • Report Security Concerns

Web Portal Links

  • LuxSci App: Phoenix
  • LuxSci App: Ashburn
  • LuxSci App: Staging
  • Premium Email Filtering
  • DNS Management
  • Secure Video
  • MobileSync Device Management
  • SecureSend
  • Affiliate Portal

Legal

  • Privacy Policy
  • GDPR Contract Addendum
  • HIPAA BAA
  • Legal

Copyright © 2004-2025 Lux Scientiae® Incorporated