Data Security Policing the workplace used to mean reminding employees about personal phone calls and making sure that paper clips did not disappear....
This question has been answered
Question

Data Security Policing the workplace used to mean reminding employees

about personal phone calls and making sure that paper clips did not disappear. But with the computer revolution at work that began in the 1990s, checking on employee behavior at work became considerably more technical. The threats to data security, not to mention other threats for potential lawsuits (e.g., sexual harassment), are now more complex as well. New federal laws pertaining to financial and medical records have put increased pressure on companies to protect their data. But auditing user privacy cannot be done without input and buy-in from HR, notes a senior consultant with an IT security firm in Massachusetts.Whether the concern is in appropriate Internet usage or transferring files outside the company, HR may be the first to learn of a problem. Although the possibility of outside attacks on the computer network is a real problem, the threat of internal security breaches is even greater. The growing insider problem and the sheer volume of electronic messages coming into and out of a company (a large company easily processes one million e-mails per day) present HR with a challenge on data security policy development, implementation, and enforcement.HR may be asked to "identify personnel at risk" who might require more stringent watching, such as people who are sending out résumés. In many cases, people leaving organizations take advantage of the opportunity to take intellectual property with them. Security software identifying employee behaviors will always require HR involvement.
Policy violations, banned sites, and stealing identity data are examples. Companies look very bad when sensitive customer or employee data are stolen or leaked to the public. Employees can easily resent the security measures and see the security as "Big Brother"watching. However, the growth of identity theft and spyware means that more employees have been personally affected by data security and are more likely to recognize the need for their employers' data security efforts. At Spherion, HR publishes a "computer and telecom resources policy" that specifies appropriate usage and a code of conduct. Employees must read and sign the policy. The company also has an IT Risk Team with members from HR, accounting, internal auditing, and other departments.There are, of course, attempts at a purely technical solution to the problem. But it is clear that HR must have a role in balancing employee privacy with company risk management. A simple act, such as a bank's loan officer burning credit information to a CD and selling the data to another bank, can disqualify the technical protections. The human side—developing a policy, communicating it, helping people understand why it is needed, and applying it fairly—is the big piece for HR.


Questions:
1.How would you communicate a data security policy that required software checking of employees' emails?


2.What elements should a data security policy for a bank include?


3.Employee data theft most frequently occurs with new employees or when an employee has given notice and is leaving. How would you deal with these two very different issues?


Consider what to include in the body of your project and demonstrate a sound level of text synthesis. Essential information must be included in the body of the project and will be counted in the word count. Extra illustrative information may be included in the appendices. Along with the recommended readings included in this week's section,support your paper with a minimum of three (3) resources. In addition to these specified resources, other appropriate scholarly resources, including older articles of your choice, may be included.

Answered by Expert Tutors

acinia pulvinar tortor nec facilisis. Pellentesque dapibus ef

a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam ri
Step-by-step explanation

, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Na


gue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolo



llentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet a

dictum vitae odio. Donec aliquet. Lorem ipsum dol

  • onec aliquet. Lorem ipsum dolor sit
  • , ultrices ac magna. Fusce dui le
  • Fusce dui lectus, congue vel laoreet ac,
  • m ipsum dolor sit amet, c
  • onec aliquet. Lorem ipsum dolor sit


nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor si


a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, c


ng elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac,


a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing el


pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fus

Get unstuck

439,573 students got unstuck by Course
Hero in the last week

step by step solutions

Our Expert Tutors provide step by step solutions to help you excel in your courses