Question

Policing the workplace used to mean reminding employees about personal phone calls and making sure that...

Policing the workplace used to mean reminding employees about personal phone calls and making sure that paper clips did not disappear. But with the computer revolution at work that began in the 1990s, checking on employee behavior at work became considerably more technical. The threats to data security, not to mention other threats for potential lawsuits (e.g., sexual harassment), are now more complex as well. New federal laws pertaining to financial and medical records have put increased pressure on companies to protect their data. But auditing user privacy cannot be done without input and buy-in from HR, notes a senior consultant with an IT security firm in Massachusetts. Whether the concern is in appropriate Internet usage or transferring files outside the company, HR may be the first to learn of a problem. Although the possibility of outside attacks on the computer network is a real problem, the threat of internal security breaches is even greater. The growing insider problem and the sheer volume of electronic messages coming into and out of a company (a large company easily processes one million e-mails per day) present HR with a challenge on data security policy development, implementation, and enforcement. HR may be asked to “identify personnel at risk” who might require more stringent watching, such as people who are sending out résumés. In many cases, people leaving organizations take advantage of the opportunity to take intellectual property with them. Security software identifying employee behaviors will always require HR involvement. Policy violations, banned sites, and stealing identity data are examples. Companies look very bad when sensitive customer or employee data are stolen or leaked to the public. Employees can easily resent the security measures and see the security as “Big Brother” watching. However, the growth of identity theft and spyware means that more employees have been personally affected by data security and are more likely to recognize the need for their employers’ data security efforts. At Spherion, HR publishes a “computer and telecom resources policy” that specifies appropriate usage and a code of conduct. Employees must read and sign the policy. The company also has an IT Risk Team with members from HR, accounting, internal auditing, and other departments. There are, of course, attempts at a purely technical solution to the problem. But it is clear that HR must have a role in balancing employee privacy with company risk management. A simple act, such as a bank’s loan officer burning credit information to a CD and selling the data to another bank, can undo all the technical protections. The human side—developing a policy, communicating it, helping people understand why it is needed, and applying it fairly—is the big piece for HR.56 QUESTIONS 1. How would you communicate a data security policy that required software checking of employees’ emails? 2. What elements should a data security policy for a bank include? 3. Employee data theft most frequently occurs with new employees or when an employee has given notice and is leaving. How would you deal with these two very different issues?

Homework Answers

Answer #1

Answer:-

Information security has turned into an essential capacity of the HR as the risk like taking information, hacking databases, maltreatment of intermit and other office workplaces happens in an affiliation. Here the affiliation will execute programming which peruses the messages of the specialists. Checking or auditing the emails of the employees can also irritate the employees and can affect their morale.

Hence the communication of such data security activities is very essential. A roundabout can be sent to all divisions previously actualizing this information security measure. The division heads can be encouraged to give some preparation to the workers about it and its significance. This can enable the laborers to set themselves up for the survey.

  

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from outside of the office. Employees and employers both benefit from the flexibility and efficiency that arises when workers can perform their duties from coffee shops, airports, their homes, and more. As such, providing employees with the ability to work remotely is an excellent way to attract and retain a talented, productive team. The devices and security measures used throughout an organization play a significant...
An effective Social Media Policy should: Clearly state that employees have no reasonable expectation of privacy...
An effective Social Media Policy should: Clearly state that employees have no reasonable expectation of privacy on company owned electronic assets, including portable devices, and when accessing company systems from remote locations. Clearly state expectations regarding the limits on personal use of email and the internet. Clearly state whether employee electronic usage is monitored. If employee electronic communications are not monitored, it should reserve the right to monitor. Prohibit use of the company image or trademarks without express authorization. Give...
Which of the following is not a benefit of keeping employees motivated? Workers are more productive...
Which of the following is not a benefit of keeping employees motivated? Workers are more productive Companies benefit financially Retention levels are higher More opportunities to offshore production    Q11. According to Maslow’s hierarchy of needs: Self-actualization usually takes a higher level of motivation/achievement than physiological basics? True    False Q12. An autocratic leader usually is known for all of these traits except: Listens well Offers threats Has tight control Drives talent away Q13. One of the negative consequences of...
Sitting at his desk, Bob Menendez is distraught over his current situation. Bob is the founder...
Sitting at his desk, Bob Menendez is distraught over his current situation. Bob is the founder of a relatively young, small company called Digital Gaming (DG), which designs computer games. He has personally earned a lot of money and has a strong reputation in the electronic gaming industry for his vision and creativity. His computer games are routinely best sellers and rated among the top products in the industry, particularly for being lifelike, creative, and challenging. Recently, however, several industry...
Case Study: Position Description and Specification for an HRIS Administrator One way to assess the nature...
Case Study: Position Description and Specification for an HRIS Administrator One way to assess the nature and importance of a particular function or position in an organization is to examine the job description and job specifications for this position, as they tell us what activities, duties, and tasks are involved in the job as well as what knowledge, skills, and abilities (KSA) are required to perform the job. The following is an actual advertisement for an HRIS administrator. A large...
Case Study: Position Description and Specification for an HRIS Administrator One way to assess the nature...
Case Study: Position Description and Specification for an HRIS Administrator One way to assess the nature and importance of a particular function or position in an organization is to examine the job description and job specifications for this position, as they tell us what activities, duties, and tasks are involved in the job as well as what knowledge, skills, and abilities (KSA) are required to perform the job. The following is an actual advertisement for an HRIS administrator. A large...
What is the answer to these Quastions? The performance effectiveness of employees is provided to them...
What is the answer to these Quastions? The performance effectiveness of employees is provided to them during the _______ process. a. Performance appraisal b. Achievement discrepancy c. Ability analysis d. Performance feedback e. a and d are correct From a(n)  ______________ standpoint, the effect on performance motivation may be limited in ownership program because of the less obvious link between pay and performance. a.   Agency theory b.   Equity theory c.   Efficiency wage theory d.   Reinforcement theory e.   Contract theory Prometheus Corp. is a large-scale manufacturer of...
What are 4 key things you learned about the topic from reading their paper? How does...
What are 4 key things you learned about the topic from reading their paper? How does the topic relate to you and your current or past job? Critique the paper in terms of the organization and quality. Team 3 answer questions above. Part I In today’s world we see fear among people when dealing with sexual harassment. This leads to people not reporting sexual harassment. A misconception about sexual harassment is that it’s only about touching and forcing other people...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the firm for IS resources or services to the department that uses them Direct billing by the manager of a function for IS resources or services to an employee that uses them An accounting process that reduces tax liability for capital investments All of the following are attributes of considering IS costs as Overhead except the...
Case Study Big Data Stewart Clegg Radically changing your business due to disruptive innovation requires a...
Case Study Big Data Stewart Clegg Radically changing your business due to disruptive innovation requires a different approach. When dealing with disruptive innovation, the alignment and/or realignment of an organization’s assets might not be enough to sustain competitive advantage. When newcomers use the latest technology to disrupt an entire industry, the incumbents will need to take drastic measures to change their organization. The emergence of strategies driven by Big Data means a transition to a data-driven, information-centric organization consisting of...