The departure of an employee who had access to keys to your business premises can pose significant security risks. Whether the separation was voluntary or involuntary, it’s essential to take proactive steps to safeguard your business and prevent unauthorized access.
R. Cummins, и C. O'Riordan. The 16th Irish conference on Artificial Intelligence
and Cognitive Science (AICS05), стр. 137--146. School of Computing and Information Engineering,
University of Ulster, University of Ulster, (7-9 September 2005)
R. Cummins, и C. O'Riordan. CIKM '05: Proceedings of the 14th ACM international
conference on Information and knowledge management, стр. 305--306. Bremen, Germany, ACM press, (31 October - 5 November 2005)
T. Joachims, L. Granka, B. Pan, H. Hembrooke, и G. Gay. SIGIR '05: Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval, стр. 154--161. New York, NY, USA, ACM Press, (2005)