Mechanisms exist to expedite the process of removing "high risk" individual's access to systems and applications upon termination, as determined by management.