August 7, 2024

ISO 27001:2022 Annex A Control 6.5: Responsibilities After Termination or Change of Employment

Annex A control 6.5 of the 2022 version of the ISO 27001 standard can be mapped to ISO 27001:2013 Annex A 7.3.1

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

Control 6.5 focuses on how it’s important for organisations to outline the information security responsibilities and roles that remain in effect even if staff leave or are reassigned. Duties and responsibilities should be communicated to the employee and any other relevant persons.

Any information entrusted to employees by their employers must be kept confidential, and it is vital that staff comprehend the requirements for protecting the organisation’s data.

The responsibilities of information security

Safeguarding confidential data is something that employers are generally entitled to assume from their staff. Data should never be shared or exploited for personal profit or to sabotage the business.

Information security duties and responsibilities will likely include:

  • Making sure personal information confidentiality is of the highest importance
  • Maintaining a log of how personal data is applied, managed and shared
  • Ensuring data accuracy and dependability by collecting from reliable sources and securely storing and disposing of data when necessary
  • Limiting data access to authorised individuals only
  • Only using and divulging personal data lawfully

Understanding Annex A control 6.5

In the event of an employee’s departure from the organisation, control 6.5 gains relevance by safeguarding the organisation’s information security interests when an employment contract changes or is terminated.

The purpose of control 6.5 is to protect the organisation against employees taking advantage of their access to confidential data and processes for malicious intent or personal gain, especially after leaving the organisation or role.

Meeting the requirements of control 6.5

The control covers employees, contractors and third parties with access to sensitive data. Measures must be taken to ensure people don’t maintain access to personal data after leaving the organisation.

Employment contracts or agreements must specify any information security responsibilities and duties that are still in place after the conclusion of the role within the organisation. Upon leaving the role or organisation, all security responsibilities must be transferred, and all access credentials must be replaced or deleted.

What’s changed since 2013?

Because control 6.5 replaces 2013’s Annex A control 7.3.1, the two controls are very alike. However, the 2022 version goes into more detail when offering guidance on how to implement the control.

Control 6.5 also uses more user-friendly language to ensure it is as accessible as possible and includes a statement of purpose and an attributes table for each control, making it easier for users to understand and implement them.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Staying Compliant
IT and Services
Legal Services
Growth