Question: Hector is a security administrator for a defense contractor. This business frequently works with highly sensitive, classified material. Hector has developed a policy for departing employees. This policy handles everything mentioned in this chapter:
¦ All logon accounts to any server, VPN, network, or other resource are disabled.
¦ All keys to the facility are returned.
¦ All accounts for email, Internet access, wireless Internet, cell phones, etc. are shut off.
¦ Any accounts for any mainframe resources are canceled.
¦ The employee's workstation hard drive is searched.
Given the highly sensitive nature of the work at this company, what other actions might you add to this policy?