Sentinel Help Center
  • Sentinel Overview
    • Dashboard
    • Environments
    • User Hub
    • Requests
    • Reports
  • Installation & Updates
    • Sentinel Shortcuts [From PS]
    • Sentinel VM Requirements
    • Host Server Setup RHEL/CentOS 8
    • Host Server Setup RHEL/CentOS 9
    • Sentinel Server Update
    • Oracle Database Account
    • PostgreSQL Backups
  • Settings
    • Sentinel Accounts
    • Databases
    • System Settings
    • Single Sign-On
    • Access Request Settings
    • Role Groups
    • Role Approvers
    • Custom Forms
    • Sensitive Data Settings
    • Security Log
  • Security Administration
    • Menu Functions
    • Direct Access
    • Users
      • User Access Updates
      • User Profile Features
    • Roles
      • Role Updates
      • Role Features
    • Permission Lists
      • Permission List Updates
      • Permission List Features
    • Dynamic Security
    • Temporary Access
    • Fluid Security
    • Security Matrix
    • Compare Reports
  • Security Reports
    • Security Reports Setup
    • Page Analysis
    • User Access
    • Role Access
    • Permission List Access
    • Query Analysis
    • Compare Users
    • PeopleTools Access
    • Portal Menus
  • Audit Review
    • Audit Review Setup
    • Privileged Access
    • Sensitive Data
    • Segregation of Duties
    • Correction Access
    • Restricted Roles
    • Role Changes
    • Notifications
    • Manager Reports
  • Access Requests
    • Implementation Guide
    • Submit New Request
    • Review & Approve Requests
    • Workflows & Routing
    • Apply Changes
  • Resources
    • User Training Guide
    • Policies
      • Policy Overview
      • Data Privacy
      • Cloud Security
      • Software Development
      • Disaster Recovery
      • Service Level Agreement
      • Employees
Powered by GitBook
On this page
  • Employee Onboarding
  • Employee Off-boarding
  1. Resources
  2. Policies

Employees

Employee Policy and Data Handling

PreviousService Level Agreement

Last updated 4 months ago

We use best-in-class security technology and operational processes to secure our applications and servers. We are responsible for the security of the underlying cloud infrastructure (such as data center facilities, and hardware and software systems.

Non-disclosure agreements - All employees sign an NDA which are legally enforceable agreements to ensure that company and client information will remain confidential.

Background Check - Criminal-history check, based on information supplied by the candidate, including their Social Security number. Criminal background checks will reveal felony and misdemeanor criminal convictions, any pending criminal cases, and any history of incarceration as an adult.

IAM / SSO - We use a single sign-on/IAM authentication to secure all servers and supporting applications and protecting cloud access credentials and setting up individual user accounts.

Employee Onboarding

Employee Off-boarding

Off-boarding covers all the steps necessary to successfully part ways with an employee following their resignation or termination to ensure a smooth transition for both the company and the departing employee.

Off-Boarding Tasks

  • Return of IT Equipment.

  • Update Passwords.

  • Revoke Employee Access.

  • Update Company Website.

  • Update Email and Support Documentation.

  • List of important contacts and accounts.

  • Status report on ongoing projects.

  • List of outstanding tasks.