Reference no: EM133634848
Homework: Business Finance- Accounting
Data is one of the most important tools for human resource professionals. Data is used in many human resource tasks ranging from recruitment and selection data to absenteeism statistics. Workforce data is beneficial for improving decision making, enhancing employee satisfaction, and optimizing compliance practices. Data is gathered through a variety of methods including engagement surveys, human resource information systems, EEOC reports, performance evaluations, exit interviews, and many other valuable sources.
For this homework, assume you are a human resource professional at a startup technology company with a remote workforce. The chief executive officer (CEO) asks you to join a virtual strategic planning session and asks you to prepare a data story of current workforce trends for the meeting. The workforce trends include increases in FMLA requests, Employee Assistance Program usage, tardiness, absences, compensation changes for underrepresented groups, and turnover.
As you are preparing for this virtual meeting, you share a copy of your presentation that includes a confidential data file outlining all the workforce trends with the CEO. Later in the day, you realize the email accidentally sent the file to an entry level employee with the same name as your CEO. This action has created a data breach.
Directions
To complete this homework, determine the type of data that was shared, create a workflow chart that highlights the steps you would take to address the data breach, and determine who you must communicate with regarding the breach. You must explain your steps in sequential order. Be sure that whatever information you share is appropriate and relevant to the data breach.
Specifically, you must address the following criteria:
I. Steps: Create a workflow chart to outline the steps involved in addressing the data breach. Note: The workflow chart will be graded on accuracy of the steps to address the breach.
II. Confidential Data: Explain how sharing this confidential data impacts privacy and security.
III. Communication: Describe who to communicate with regarding the data breach with rationale.