Practical Applications of Information Privacy Plan
Autor: geebee715 • July 29, 2012 • Essay • 1,061 Words (5 Pages) • 2,434 Views
The increase usage of the Internet has resulted in many important issues being raised regarding information security and privacy in today’s technology driven economy. These issues become important ones for organizations to consider for several reasons. First, private employee information is recorded on computers. Secondly, organizations have their own operational information recorded on computers. Third, many organizations conduct business over the Internet. These types of issues can result in security breaches that can be extremely costly to an organization. The question of security is an important one for organizations and is becoming the responsibility of the HR department in many organizations with the questions of security and privacy an extension of the HRIS system.
Discuss why information security and privacy are important considerations in the design, development, and maintenance of HRIS.
The HRIS is an important tool in assisting with strategic decision making of an organization. The HRIS provides detailed information related to payroll, benefits, performance management, recruitment, and training. Because of this type of confidential information, it is important that a security and privacy policy be implemented along with the HRIS. This is to ensure that employee and company information does not fall into wrong hands leading to lawsuits, business losses, or incorrect employee data.
During the design and development stages, internal and external security threats must be taken into considerations. External threats such as hackers, viruses, and natural disasters should be coordinated along with the overall organizations technology security policy. Internal threats such as human error, disgruntled employees, and unauthorized access of information should be the focus of the HR management group. By adopting a detailed information and security privacy policy, ensuring the proper storage of confidential personnel data, conducting ongoing training of company security policies, delegating accessibility to employees who have shown high ethical standards, and developing a check and balance system HR can minimize the security threats that may occur within an organization.
In each of the three scenarios, identify what information privacy principles have been breached.
In scenario 1, an outside photocopier vendor was left alone with information on a grievance matter against an employee of the agency. The photocopier decides to view the paper and realizes that the individual is a neighbor. This is a breach of anonymity principle.
In scenario 2, Tom calls a student’s home about a misconduct hearing. The student is not at home and Tom speaks with the student’s partner whom he shares very private details of the allegations. This is a breach of the reserve principle.
In scenario 3, Brad is an employee in the student administration
...