Free Access Plan Template
Access Plan
Date: January 10, 2070
1. Plan Overview
A. Objective:
To provide new employees with the necessary access for their roles and ensure all access is securely revoked upon departure.
B. Scope:
Applicable to all new hires, internal transfers, and employees exiting GlobalTech Solutions.
2. Roles and Responsibilities
Role |
Responsibility |
---|---|
HR Department |
Notify IT and managers about new hires or terminations. |
IT Department |
Set up or revoke access to systems, tools, and devices. |
Manager |
Approve access requests and validate access needs. |
Employee |
Follow access protocols and report issues promptly. |
3. Onboarding Access Plan
Step 1: Initiate Request
-
Date: January 1, 2070
-
HR submits an onboarding request for James Carter, Software Developer to the IT department.
Step 2: Access Assignment
-
IT assigns access based on the role:
-
Basic Access: Email (james.carter@globaltech.com), HR portal, and company intranet.
-
Department-Specific Access: Access to GitHub repository, JIRA project management, and development server.
-
Step 3: Provisioning Resources
-
Assign a laptop (Model: Dell Latitude 9000) and configure credentials for tools.
Step 4: Access Confirmation
-
Date: January 2, 2070
-
Credentials are delivered securely via company email. MFA setup completed.
Step 5: Training and Review
-
Date: January 10, 2070
-
Conduct security training and role-specific tool orientation.
-
Review access needs after 30 days (Date: February 1, 2070).
4. Offboarding Access Plan
Step 1: Initiate Termination Request
-
Date: December 15, 2070
-
HR notifies IT about the departure of Emily Rogers, Project Manager, effective December 20, 2070.
Step 2: Revoke Access
-
Date: December 20, 2070
-
IT disables access to:
-
Email account (emily.rogers@globaltech.com).
-
JIRA project management and Slack.
-
Biometric entry for the headquarters office.
-
Step 3: Recover Company Assets
-
Date: December 20, 2070
-
The manager ensures the return of Emily’s laptop and company-issued phone. IT securely wipes data.
Step 4: Audit Access Logs
-
Date: December 25, 2070
-
IT reviews system activity logs to confirm no unauthorized access.
5. Access Checklist
Action |
Responsible Party |
Completion Date |
Status |
---|---|---|---|
Submit onboarding request |
HR |
January 1, 2070 |
Done |
Assign email and tool access |
IT |
January 2, 2070 |
Done |
Provision devices |
IT |
January 2, 2070 |
Done |
Provide physical access |
Facilities Security |
January 2, 2070 |
Done |
Conduct access training |
HR |
January 10, 2070 |
Done |
Submit offboarding request |
HR |
December 15, 2070 |
Done |
Revoke system access |
IT |
December 20, 2070 |
Done |
Recover company devices |
Manager/IT |
December 20, 2070 |
Done |
Conduct final audit |
IT |
December 25, 2070 |
Done |
6. Contact Information
Department |
Contact Person |
|
---|---|---|
HR |
[Your Name] |
[Your Email] |
IT |
Michael Carter |
michael.carter@globaltech.com |
Security |
David Lopez |
david.lopez@globaltech.com |
7. Approval
Name |
Role |
Signature |
Date |
---|---|---|---|
[Your Name] |
HR Manager |
January 1, 2070 |
|
Michael Carter |
IT Manager |
|
January 1, 2070 |
Linda Baker |
Senior Manager |
|
January 1, 2070 |