Talk Nerdy To Me | Jacksonville's Premier Tech and Cybersecurity Blog for SMBs

🔐 “Just Log In and Check It”—Why That’s a Risky Mistake After an Employee Leaves

Written by Erick Wilson | May 22, 2025 1:26:32 PM Z

When an employee leaves your company—especially under tense circumstances—it’s natural to want answers. Maybe you’re trying to verify what they were doing, or ensure no damage was done on the way out. And in those moments, it’s all too common for a manager to say, “Can you reset their password so I can check their email?” or even worse, “I want to see their LinkedIn or Gmail—just get me in.”

But here’s the problem: that request, while seemingly harmless, can carry significant legal, ethical, and cybersecurity risks.

⚖️ Legal Exposure: You May Be Breaking the Law

Accessing someone’s personal accounts (like Gmail, Facebook, or LinkedIn) without their permission—even on a company device—can violate federal laws like the Computer Fraud and Abuse Act (CFAA) and various state-level privacy protections. Even if your intentions are just to gather information, courts may see it as unauthorized access.

Even accessing a work email account carries risks if the information obtained is later used in litigation. Improperly gathered evidence could be ruled inadmissible—or worse, used against your company to claim privacy violations or retaliation.

🧑‍💼 “But It’s a Company Device…” Still Doesn’t Make It Safe

Yes, the computer may belong to your business. But that doesn’t automatically grant access to every application or online account the former employee used. Personal accounts accessed on work machines still retain personal protections. Resetting a password or forcing access, especially without proper documentation or HR/legal review, is a legal grey area at best—and a liability minefield at worst.

🛡️ Best Practices Instead of Risky Shortcuts

Here’s what you should do instead of logging in yourself:

  1. Have a Digital Offboarding Policy
    Ensure IT deactivates or suspends the former employee’s accounts immediately—but without accessing their personal data.

  2. Preserve First, Investigate Later
    Use tools to archive email or capture a disk image of the machine for secure review. This maintains the integrity of any potential evidence without tampering.

  3. Involve HR and Legal Early
    If you suspect misconduct or need to gather digital evidence, work with legal counsel and your IT provider. They can ensure the process complies with employment and privacy laws.

  4. Train Managers on What’s Off Limits
    Most of the time, this issue isn’t about malice—it’s a lack of understanding. Train your leadership team on digital boundaries to avoid accidental policy violations.

🧠 Remember: Just Because You Can Doesn’t Mean You Should

The moment you access a former employee’s private messages or reset their credentials without following due process, your company may cross a line that’s hard to walk back. Even with good intentions, the legal and ethical fallout can be significant.

At Bluefin Technology Group, we work with our clients to build clear offboarding procedures that protect your business, your data, and your reputation. Don’t go it alone—talk to your IT partner before you take that risky step.