Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask HR Management Expert

QUESTIONS

1. How would you communicate a data security policy that required software checking of employees' emails?

2. What elements should a data security policy for a bank include?

3. Employee data theft most frequently occurs with new employees or when an employee has given notice and is leaving. How would you
deal with these two very different issues?

Case : Data Security

Policing the workplace used to mean reminding employees about personal phone calls and making sure that paper clips did not disappear. But with the computer revolution at work that began in the 1990s, checking on employee behavior at work became considerably more technical.

The threats to data security, not to mention other threats for potential lawsuits (e.g., sexual harassment), are now more complex as well. New federal laws pertaining to financial and medical records have put increased pressure on companies to protect their data. But auditing user privacy cannot be done without input and buy-in from HR, notes a senior consultant with an IT security firm in Massachusetts.

Whether the concern is in appropriate Internet usage or transferring files outside the company, HR may be the first to learn of a problem. Although the possibility of outside attacks on the computer network is a real problem, the threat of internal security breaches is even greater.

The growing insider problem and the sheer volume of electronic messages coming into and out of a company (a large company
easily processes one million e-mails per day) present HR with a challenge on data security policy development, implementation, and enforcement.

HR may be asked to "identify personnel at risk" who might require more stringent watching, such as people who are sending out résumés.
In many cases, people leaving organizations take advantage of the opportunity to take intellectual property with them. Security software identifying employee behaviors will always require HR involvement. Policy violations, banned sites, and stealing identity data are examples.

Companies look very bad when sensitive customer or employee data are stolen or leaked to the public. Employees can easily resent the security measures and see the security as "Big Brother" watching. However, the growth of identity theft and spyware means that more employees have been personally affected by data security and are more likely to recognize the need for their employers' data security efforts.

At Spherion, HR publishes a "computer and telecom resources policy" that specifies appropriate usage and a code of conduct. Employees must read and sign the policy. The company also has an IT Risk Team with members from HR, accounting, internal auditing, and other departments.

There are, of course, attempts at a purely technical solution to the problem. But it is clear that HR must have a role in balancing employee privacy with company risk management. A simple act, such as a bank's loan officer burning credit information to a CD and selling the data to another bank, can undo all the technical protections. The human side-developing a policy, communicating it, helping people understand why it is needed, and applying it fairly-is the big piece for HR.

HR Management, Management Studies

  • Category:- HR Management
  • Reference No.:- M92357889
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in HR Management

Email is becoming one of the most common forms of

Email is becoming one of the most common forms of communication in the workplace. Although email is a main form of business communication, it is not always done well. Many employers complain of employees who send poorly ...

Question describe a few of the most important take aways

Question: Describe a few of the most important "take aways" from this training and development course-that you will be able to use moving forward. The response must be typed, single spaced, must be in times new roman fon ...

It is claimed that no qualitative forecasting method is

It is claimed that no qualitative forecasting method is completely qualitative (there are quantitative elements involved), and also that no quantitative forecasting method is completely quantitative (that there are quali ...

Assignment distinguishing the role of the local state and

Assignment: Distinguishing the role of the local, state and national policy makers. It is important to understand the process of how ideas become regulations and rules and how rules and regulations become policy and laws ...

1 give an example where the best technology did not

1) Give an example where the best technology did not dominate a network effects-driven market and why? Please make sure your example is unique and not something that has already been discussed on this particular forum. 2 ...

Question 1 what has been the impact of the health care and

Question: 1) What has been the impact of the Health Care and Education Reconciliation Act of 2010 on health benefits? 2) It's been over 53 years since the passage of the Equal Pay Act. How has this landmark legislation c ...

Topic - diabetes diabetes screening as it relates to

Topic - Diabetes (Diabetes screening) as it relates to Minnesota Department of Health. Part I: Basic Principles and Tools of Budget and Resource Management 1. Principles Explain the basic principles of budget and resourc ...

Question budgetary variance modelprior to completing this

Question: Budgetary Variance Model Prior to completing this assignment, review Assignment 9 in Chapter 17 of your course text. Prepare an evaluation of the performance of the Radiology Department Manager for a hospital. ...

1 which approach would be best suited for an online

1. Which approach would be best suited for an online retailer, infinite or finite loading? 2. The SPT does well on minimizing flow time and number of jobs in the system. What does FCFS and EDD do well on or its purpose? ...

Question ethical issues in business please respond to the

Question: Ethical Issues in Business" Please respond to the following: • Read the article titled, "Recognition, Reification, and Practices of Forgetting: Ethical Implications of Human Resource Management (By Gazi Islam)" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As