Effective Dates and Issuing Authority
Effective Date: November 22, 2011
Date Last Reviewed: June 25, 2018
Date Scheduled for Review: June 2023
Issuing Authority: Chief Information Security Officer
Introduction
When an employee ends his/her employment relationship with the University, there is sometimes a need to access business-related information stored on the former employee’s University computing resources. While the University makes computer resources available to its employees for the primary use of education and research, and for administrative activities, it recognizes that former employees could be current students or alumni and using University computing resources, especially email accounts, for approved personal use. Thus, it is reasonable to expect the University will provide protection for the individual’s personal information as long as it does not violate any local, state or federal laws and regulations. According to University policies, access to a former employee's computing resources is strictly prohibited. Any exceptions to this policy must be approved by the Cognizant Vice President/Dean, Chief Information Security Officer and VP for Information Technology Services.
These guidelines supplement the termination process and guide the supervisor in determining what may be done with a former employee’s University computing resources.
Authorization Procedure for Accessing a Former Employee's Computing Resources
Date of Request: _____________
Requestor Name: ______________________________________________________________
Former Employee’s Name: _______________________________________________________
Former Employee’s TUid: ________________________________________________________
Please list specific resources (for example, all files and emails related to admissions business):
_______________________________________________________________________________________________________________________________________________________
_______________________________________________________________________________________________________________________________________________________
_______________________________________________________________________________________________________________________________________________________
_______________________________________________________________________________________________________________________________________________________
_________________________________________________________________________________________________________________________________
DEPARTMENT APPROVAL:
Dean/Vice President Name: _________________________________
Dean/Vice President Signature: _________________________________ Date: __________
Once you have obtained department approval, please scan this form and email it to ciso@temple.edu for the university approval.
UNIVERSITY APPROVAL:
Chief Information Security Officer: _________________________________ Date: __________
VP for Information Technology Services: ____________________________________ Date: _________