Professional Documents
Culture Documents
Theft: the value of information can be much higher than the price
of hardware / software
Many HR managers still tend to think that security threats refer to external
security breaches (virus outbreak or malicious hackers)
Continue…
Hr managers should focus on less obvious threat such as
disgruntled employees and ex-employees, network links to
business partners who don’t have proven trustworthy systems,
misuse of computers by employees, and insecure network
access points set up by employees
Best practices for handling information in HRIS
The careful selection of staff with due regard to their honesty and
integrity
The raising of information security awareness among staff and
ensuring that employees are aware of the company’s security policies
Measures to address the personal problems of staff, such as gambling
and drug addiction, which might lead them to indulge in computer
abuse for financial gains
Access to effective grievance procedures, since the motivation for
much computer abuse is retaliation against management
train users on how to handle equipment, data and software safely;
train users to logoff their personal computers when not in use;
do not allow password to be shared, and change the password
frequently;
run the software through virus detection before using it;
Continue…
ensure that backup copies, data files, software and printouts are
used by authorized personnel only;
ensure that all data files and programmes have backup copies;
ensure that all software applications and mainframes are equipped
with audit trail (a record that keeps detail of each modification and
transaction that takes place, including when and who performed the
changes); and
use edit controls such as passwords to restrict user access to data
files
Ethical issues in hris
Information privacy
1. Big data