People Team: HR Controls & Employee Management
  1. Trustero Support
  2. Phase 3: Operationalize Controls
  3. People Team: HR Controls & Employee Management

New Hire Employee Onboarding Template

An onboarding checklist template to follow in order to provide access and resources to new hires

Customize this to your own environment and scope. Save it internally as a repeatable process to follow within specified timelines. 

[Full Name] - New Hire Onboarding Form

[Projected start date]

Complete Before Start Date & Sending Laptop

Candidate Evaluation, Job Description & Background

  1. Completed candidate evaluation
  2. Crafted and finalized the job description
  3. Conducted a thorough background check
  4. Completed reference check clearance

Terms and Conditions of Employment

  1. Send the job offer to the candidate
  2. Received signed job description acknowledgment from the employee
  3. Received signed NDA or confidentiality agreement
  4. Received signed Information Security Policy and Acceptable Use Policy

One week before Start Date - Send Laptop

Laptop & Software

  1. Distribute laptop with necessary configurations and MDM profile deployed
  2. Install necessary software and ensure they are updated to the latest secure versions

On or Before the First Day

Send Initial Access steps to Personal Email

  1. Set up company email and communication tools only (e.g. Slack)
    1. Ensure each new hire is assigned a Unique User ID (email account)
  2. Ensure multifactor authentication (MFA) is enabled

First Meeting “Laptop Setup”

  1. Ensure can access company email and communication tools
  2. Provide list of company-specific applications and platforms

Second Meeting “HR Specific Items”

  1. Provide details on completing benefits enrollment and payroll items
  2. Cover list of items to complete on first day
  3. Schedule security awareness training to be completed on first day prior to giving additional access

Additional Access based on Job Role and Responsibilities (Need-to-Know)

  1. Provide role-based access to necessary systems
  2. Ensure multifactor authentication (MFA) is enabled for systems