SlideShare a Scribd company logo
1 of 11
Offboarding Google Apps in 7
Short Steps
Why it matters
Company records
departing employee may have access to
company secrets, client emails, and research
data
Account ownership
departing employee can delete or alter
documents if ownership is not properly
transferred
Why it matters
Company records
departing employee may have access to company
secrets, client emails, and research data
Account ownership
departing employee can delete or alter documents
if ownership is not properly transferred
Time and cost
Misplaced documents can result in loss of time and
money and re-hiring of former employees
Step 1: cut off access to the
account
Change password
– from Google Admin console
– allows continued email flow
Change user name
–stops email flow
Migrate user to another organization with services turned off
– stops email flow
Suspend the account
– stops email flow
Step 2: secure devices, data,
and connectivity
Connected devices may contain sensitive data
Includes laptops and smart phones
Identify devices assigned to user in Google Admin
console
Turn off access for each device in Console
Recover devices from user
Step 3: perform data backups
Third party software for automated backups
Manual backup
Use Google Takeout to create archives
– www.google.com/settings/takeout
– Select files to archive
– Select archive formats
Step 4: migrate ownership of
files
Even though files may be backed up, critical files
need easy access by those who will take over
Use Google Admin console to reassign account
Can assign documents to different individuals
Step 5: suspend or delete
account
Suspending account will block access without deleting
data
– Will also suspend email flow
Account deletion will forever prevent access to all
documents – be sure to back up and reassign
ownership first.
Step 6: Forward mail
Ongoing email access may be necessary for continuity
From user account, add a forwarding address to allow
ongoing access to emails from both outgoing and other
employees
If account access has been blocked, only forwarded
email will be seen.
If transition is gradual, outgoing user may continue to
receive email while email is forwarded to other users.
Consider an automated response (e.g., “out of office”) to
indicate absence of the user from the organization.
Step 7: Manage archived data
Have an overall plan for data storage, access, and
archiving – not just when offboarding
Be aware of legal requirements for data retention
Data should be fully cataloged, backed up, and
easily accessible.
Special Concerns
Security breaches often occur when inattentive
employees fail to observe basic security
precautions.
Outgoing employees may sometimes be special
security risks.
Treat offboarding as a major security procedure for
the protection of the organization.

More Related Content

Similar to Offboarding Google Apps

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingRishikesh Sah
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4Future Managers
 
More than a single patient at different places can be monitored using single ...
More than a single patient at different places can be monitored using single ...More than a single patient at different places can be monitored using single ...
More than a single patient at different places can be monitored using single ...shashi03k
 
Delegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersDelegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersHendrix Bodden
 
IS Risk Assessment example
IS Risk Assessment exampleIS Risk Assessment example
IS Risk Assessment exampleRamiro Cid
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google appsSysCloud
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxgemaherd
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Vaultastic
 
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolsCompliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolse-Safe Systems
 
SharePoint Records Management capabilities - West Monroe Partners - Virginia ...
SharePoint Records Management capabilities - West Monroe Partners - Virginia ...SharePoint Records Management capabilities - West Monroe Partners - Virginia ...
SharePoint Records Management capabilities - West Monroe Partners - Virginia ...Coskun Cavusoglu
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
West Monroe Partners - Records management capabilities in share point 2010 -...
 West Monroe Partners - Records management capabilities in share point 2010 -... West Monroe Partners - Records management capabilities in share point 2010 -...
West Monroe Partners - Records management capabilities in share point 2010 -...Coskun Cavusoglu
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 

Similar to Offboarding Google Apps (20)

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue Handling
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4NCV 3 Management Practice Hands-On Support Slide Show - Module 4
NCV 3 Management Practice Hands-On Support Slide Show - Module 4
 
More than a single patient at different places can be monitored using single ...
More than a single patient at different places can be monitored using single ...More than a single patient at different places can be monitored using single ...
More than a single patient at different places can be monitored using single ...
 
Delegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education CustomersDelegate Access for Oracle PeopleSoft Higher Education Customers
Delegate Access for Oracle PeopleSoft Higher Education Customers
 
IS Risk Assessment example
IS Risk Assessment exampleIS Risk Assessment example
IS Risk Assessment example
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google apps
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolsCompliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schools
 
SharePoint Records Management capabilities - West Monroe Partners - Virginia ...
SharePoint Records Management capabilities - West Monroe Partners - Virginia ...SharePoint Records Management capabilities - West Monroe Partners - Virginia ...
SharePoint Records Management capabilities - West Monroe Partners - Virginia ...
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
West Monroe Partners - Records management capabilities in share point 2010 -...
 West Monroe Partners - Records management capabilities in share point 2010 -... West Monroe Partners - Records management capabilities in share point 2010 -...
West Monroe Partners - Records management capabilities in share point 2010 -...
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Offboarding Google Apps

  • 1. Offboarding Google Apps in 7 Short Steps
  • 2. Why it matters Company records departing employee may have access to company secrets, client emails, and research data Account ownership departing employee can delete or alter documents if ownership is not properly transferred
  • 3. Why it matters Company records departing employee may have access to company secrets, client emails, and research data Account ownership departing employee can delete or alter documents if ownership is not properly transferred Time and cost Misplaced documents can result in loss of time and money and re-hiring of former employees
  • 4. Step 1: cut off access to the account Change password – from Google Admin console – allows continued email flow Change user name –stops email flow Migrate user to another organization with services turned off – stops email flow Suspend the account – stops email flow
  • 5. Step 2: secure devices, data, and connectivity Connected devices may contain sensitive data Includes laptops and smart phones Identify devices assigned to user in Google Admin console Turn off access for each device in Console Recover devices from user
  • 6. Step 3: perform data backups Third party software for automated backups Manual backup Use Google Takeout to create archives – www.google.com/settings/takeout – Select files to archive – Select archive formats
  • 7. Step 4: migrate ownership of files Even though files may be backed up, critical files need easy access by those who will take over Use Google Admin console to reassign account Can assign documents to different individuals
  • 8. Step 5: suspend or delete account Suspending account will block access without deleting data – Will also suspend email flow Account deletion will forever prevent access to all documents – be sure to back up and reassign ownership first.
  • 9. Step 6: Forward mail Ongoing email access may be necessary for continuity From user account, add a forwarding address to allow ongoing access to emails from both outgoing and other employees If account access has been blocked, only forwarded email will be seen. If transition is gradual, outgoing user may continue to receive email while email is forwarded to other users. Consider an automated response (e.g., “out of office”) to indicate absence of the user from the organization.
  • 10. Step 7: Manage archived data Have an overall plan for data storage, access, and archiving – not just when offboarding Be aware of legal requirements for data retention Data should be fully cataloged, backed up, and easily accessible.
  • 11. Special Concerns Security breaches often occur when inattentive employees fail to observe basic security precautions. Outgoing employees may sometimes be special security risks. Treat offboarding as a major security procedure for the protection of the organization.