Discover a wealth of knowledge at Westonci.ca, where experts provide answers to your most pressing questions. Experience the ease of finding precise answers to your questions from a knowledgeable community of experts. Experience the convenience of finding accurate answers to your questions from knowledgeable experts on our platform.

From a security point of view, which of the following actions should be done upon the termination of an employee?
A. remove the person's name from all lists of authorized access
B. recover all assets, including employee ID, disks, documents and equipment
C. remove all personal access codes
D. all of the above