What elements should data security policy for bank

Assignment Help HR Management
Reference no: EM133274982

Data Security

Policing the workplace used to mean reminding employees about personal phone calls and making sure that paper clips did not disappear. But with the computer revolution at work that began in the 1990s, checking on employee behavior at work became considerably more technical. The threats to data security, not to mention other threats for potential lawsuits (e.g., sexual harassment), are now more complex as well. New federal laws pertaining to financial and medical records have put increased pressure on companies to protect their data. But auditing user privacy cannot be done without input and buy-in from HR, notes a senior consultant with an IT security firm in Massachusetts.

Whether the concern is in appropriate Internet usage or transferring files outside the company, HR may be the first to learn of a problem. Although the possibility of outside attacks on the computer network is a real problem, the threat of internal security breaches is even greater. The growing insider problem and the sheer volume of electronic messages coming into and out of a company (a large company easily processes one million e-mails per day) present HR with a challenge on data security policy development, implementation, and enforcement.

HR may be asked to "identify personnel at risk" who might require more stringent watching, such as people who are sending out résumés. In many cases, people leaving organizations take advantage of the opportunity to take intellectual property with them. Security software identifying employee behaviors will always require HR involvement. Policy violations, banned sites, and stealing identity data are examples. Companies look very bad when sensitive customer or employee data are stolen or leaked to the public. Employees can easily resent the security measures and see the security as "Big Brother" watching. However, the growth of identity theft and spyware means that more employees have been personally affected by data security and are more likely to recognize the need for their employers' data security efforts.

At Spherion, HR publishes a "computer and telecom resources policy" that specifies appropriate usage and a code of conduct. Employees must read and sign the policy. The company also has an IT Risk Team with members from HR, accounting, internal auditing, and other departments.

There are, of course, attempts at a purely technical solution to the problem. But it is clear that HR must have a role in balancing employee privacy with company risk management. A simple act, such as a bank's loan officer burning credit information to a CD and selling the data to another bank, can undo all the technical protections. The human side-developing a policy, communicating it, helping people understand why it is needed, and applying it fairly-is the big piece for HR.

Case Study Questions

1. How would you communicate a data security policy that required software checking of employees' emails?

2. What elements should a data security policy for a bank include?

3. Employee data theft most frequently occurs with new employees or when an employee has given notice and is leaving. How would you deal with these two very different issues?

Reference no: EM133274982

Questions Cloud

What is the parable about the king : What is the parable about the King and his two servants? What does this parable have to do with the endeavor of the Talmud and rabbinic Judaism
Company organizational mission : What does AT&T as organization do? What goods and services does it produce and provide? What kind of value does it create?
What is outsourcing : Pick two types of Supply Chain designs. Compare them and discuss the relative risks and opportunities inherent in each.
How would you apply the five basic steps of theory : How would you apply the five basic steps of theory of constraint to manage your constraint and what operational control measures you would choose to monitor
What elements should data security policy for bank : How would you communicate data security policy that required software checking of employees' emails? What elements should data security policy for bank include?
What is the companys inventory position : is awaiting arrival of an order for 400 cases and has backorders of 100 cases to fill, what is the company's inventory position? If the reorder point is 100
What are creation myths : What are creation myths, and what purpose do they serve? What similar themes appear in creation myths across cultures
Elude the german consciousness : What is the author In the Ability to Mourn trying to say in this quote: "The present work attempts to illuminate and explain issues which generally elude the Ge
Explain how operations management activities affect : Explain how operations management activities affect the customer experience described in the Apple anecdote at the beginning of this chapter

Reviews

Write a Review

HR Management Questions & Answers

  Improve problem solving capabilities within organization

Types of teams as to their effectiveness that will improve problem solving capabilities within organizations.

  Influence tactics help in reducing organizations politics

Explain the different types of influence tactics that will be of a help “if adopted” in reducing the organizational politics.

  Report on citigroup''s hr service level agreement

Human Resources or Human Resource Management deals with HR Service Level Agreement. HR Service Level Agreement is an agreement made between the employer and the employee, which states that the employee would work under any client and sometimes any ti..

  A project report on hrm

Human Resource Management as the name suggests, it is a management discipline which deals with the human i.e. the workforce aspect of organizations. Need and practices of HRM are inevitable in present scenario of extreme competition where "Talent War..

  Hrp: recruitment and selection

Recruitment and Selection is the initial ladder of any Human Resource Planning process and contains an immense significance for any organisation.

  A project report on study of statutory complainces

Statutory compliance and its immense knowledge are crucial to be understood in an organization. It contains all the forms, procedures and acts applicable in a company.

  Operant conditioning and Reinforcement

Operant conditioning is a learning process where behaviour is controlled by its consequences. In this process an individual's behaviour can be modified through the use of positive or negative reinforcement.

  Effectiveness of training programs in achieving customers an

The main motive for conducting this research is to provide broad range of research of the literature and their reviews related to training and development and assisting the employees in providing customers satisfaction.

  A critical analysis of hr processes and practices in fedex c

FedEx is illustrious for its novel HR processes and practices that have greatly accounted for its success.

  Integrating culture and diversity in decision making

People in the organization are known as Google where they share common goals and have common vision.

  Impact of employee attrition on people management in organis

Talent management implies recognizing a person's inherent skills, traits, personality and offering him a matching job.

  Labour dissonance at maruti suzuki india limited: a case stu

This Case Study focuses on various issues related to Labour Unrest at Maruti Suzuki India Limited.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd