- Docs
- Compliance
- Internal Security Controls
- Employee Lifecycle
Employee Lifecycle
Files.com implements formal policies and processes to manage the full employee lifecycle, from hiring and onboarding through performance evaluation and termination. These policies are designed to support security, confidentiality, and operational excellence across the organization. Related access controls are reviewed as part of our annual SOC 2 Type II audit.
Job Descriptions
All positions at Files.com have written job descriptions that define role responsibilities, including safeguarding confidential and sensitive information. Job descriptions are reviewed and updated as needed to reflect evolving requirements or address identified skills gaps.
Background & Credential Checks
Prior to employment, all Files.com employees undergo a pre-screening process that includes reference checks, education and certification verification, and criminal background checks where legally permissible.
Training
All new employees complete standardized security awareness training during onboarding. Ongoing training and support are provided to ensure that employees understand and comply with company policies, especially those related to security and data protection. Targeted training is also provided to close any identified skills gaps.
Employee Onboarding
Files.com follows a formal onboarding process for all employees. Each employee is assigned a unique user identifier and granted access to internal systems based on job role and need-to-know principles. Confidentiality agreements are signed during onboarding, and access controls are enforced through our internal identity management and VPN systems.
Performance Management
Employee performance is reviewed regularly, with formal reviews conducted at least annually. These evaluations assess role-specific performance, confirm compliance with security and confidentiality responsibilities, and support employee development.
Disciplinary Action
Disciplinary actions are handled on a case-by-case basis depending on the specific facts and circumstances of the situation. Outcomes may include coaching, formal discipline, or termination.
Termination & Offboarding
Files.com follows a structured termination process designed to immediately revoke access upon an employee’s departure. Nearly all internal systems are gated through VPN access, which is disabled at the time of termination.
All company-owned devices are managed through Mobile Device Management (MDM). Upon termination, devices are remotely disabled and rendered unusable by the former employee. Devices are then returned to Files.com.
As a matter of policy, Files.com does not disclose information about individual terminations.
Contractors
Files.com does not currently engage contractors. However, company policy requires that any future contractors undergo the same pre-screening, onboarding, access control, and confidentiality procedures as full-time employees. This includes background checks, signing confidentiality agreements, and completing standardized security awareness training.