What about access to our passwords, software licenses, hardware inventory and critical network data?

We believe in full transparency when it comes to YOUR critical business information, so you’ll always have access to it. We’ll provide you with written and electronic copies of this data, so you can end worries over whether or not we’re holding your IT ”hostage” for our own job security.