HR SECURITY  EGBERT PESHA 215061772  ALLOCIOUS RUZIWA 215029119  AUTHER MAKUVAZA 215049845  SAKARIA IINOLOMBO 215052072.

Slides:



Advertisements
Similar presentations
UNIT 3: Functions of Business UNIT 3: Functions of Business.
Advertisements

Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Buffalo State College Internal Control Program Presented to: Buffalo State College Line Staff Delivered by: BSC IC Program & Department Managers.
Session 3 – Information Security Policies
Be An Effective Manager
Practical Tips and Tools For Effectively Managing Worker’s Compensation Cases.
Disability Management Definition: “…the process of preventing and managing absence from work. Operationally, it is an active process directed towards promoting.
Chapter 22 The Private Security Professional and Profession.
Computer Security: Principles and Practice
Disciplinary Policy INCA Community Services. Purpose O Every employee has the duty and the responsibility to be aware of and abide by existing rules and.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Policies and Procedures © Policies and Procedures 2013 U.S Security Associates, Inc. All rights reserved. Unit 2 Policies and Procedures © Policies and.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
West Virginia University Laboratory Training Module 1. OSHA Laboratory Standard.
Outline Welcome & Introductions Secretarial Management Guide Privacy Update EPR Education Index.
Minnesota’s Internal Control Initiative National Association of State Comptrollers March 25, 2011 Speaker Jeanine Kuwik, MBA, CPA, CISA Director of Internal.
SUPERVISING STUDENT EMPLOYEES August 13, 2002 Office of Human Resources Office of the General Counsel.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
1 CIP Cyber Security – Personnel & Training Steve Garn CIP Compliance Workshop Baltimore, MD August 19-20, 2009 © ReliabilityFirst Corporation.
Managing your Research Staff
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Accountability Presented by Mollie Schaffer August 13 th, 2014.
Human Resource Security ISO/IEC 27001:2013
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
S Doogan Unit 1b – Functions of Departments Human Resources Department/ Personnel Department.
Recruiting, Training, and Motivating Employees. Lesson Goals: Learn procedures for finding and selecting employees Create plan for securing and maintaining.
Presentation Title | May 4, 2009 HR Hiring Process ▸HR Decision Process is Completed ▸Job Descriptions will be reviewed in 10 business days ▸Position Recruitment.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
Five Recruitment Strategies or Methods  The basic and the most effective methods are identifying the job opening, which starts with job vacancy due to.
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
HOW TO DEVELOP THE BOARD COVENANT SCANPO Wednesday Webinar.
MODULE 3 Policies, Procedures & Supervisor Responsibilities.
1 Describe the intent of the Americans with Disabilities Act (ADA). Define disability as stated in the ADA. Identify which persons have protection under.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
PENNSYLVANIA STATE SYSTEM OF HIGHER EDUCATION. Commercial Drivers’ License (CDL) Training/Information.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Overview Volunteers are a crucial part of youth-serving organizations Enable staff to reach a wider audience Precautions should be taken.
OEISD Employee handbook
Developing Personnel Policies
Be An Effective Manager
Ethics, Justice, and Fair Treatment in HR Management
Student Employment & Work Study Overview
Privacy & Confidentiality
CHAPTER 2 – ROLES OF CONSTRUCTION PERSONNEL IN SAFETY AND HEALTH
Introduction In the first lesson we demonstrated the following:-
ONBOARDING IDEAS This form provides you with some ideas for onboarding your employee. Because every role is different, you will most likely have additional.
Performance Review for County Educators
Top 10 Security-Related Discrepancies
County HIPAA Review All Rights Reserved 2002.
Unit 7 – Organisational Systems Security
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Developing Personnel Policies
Performance Review for County Educators
Injury and Illness Prevention Program (IIPP)
Chapter 8 Developing an Effective Ethics Program
Code of Conduct Training and Statement of Understanding 2018
Ethics, Justice, and Fair Treatment in HR Management
The Medical Assistant as Human Resources Manager
The Elements of appropriate Internal Controls
Completing the documentation
Commercial Drivers’ License (CDL) Training/Information
Move this to online module slides 11-56
Managing Personnel Advanced Marketing.
Position descriptions
Protecting Student Data
Presentation transcript:

HR SECURITY  EGBERT PESHA  ALLOCIOUS RUZIWA  AUTHER MAKUVAZA  SAKARIA IINOLOMBO

WHAT IS HR SECURITY?  Human resources security is part of personnel management and applies to pre-employment, the duration of employment, and termination of employment. It includes pre-employment checks and processes, documentation of security roles and responsibilities, and ongoing security and privacy awareness training.  It also includes processes for changes in employment status i.e also security awareness

ROLES OF HR IN ENFORCING A SECURITY POLICY.  Recruitment  Code of Conduct

FUNCTIONS OF HR SECURITY?  Job descriptions  User awareness and training  Disciplinary process

3 AREAS OF HR SECURITY A. Prior to employment.  Defining roles and responsibilities of the job.  Defining appropriate access to sensitive info.  Determining depth of candidate’s screening levels.

B. During employment.  Sending all the employees with access to sensitive information reminders of their responsibilities  Conducting updated security awareness training

C. Termination and change of employment  Preventing unauthorized access to sensitive information.  Return of any assets of the organization that was held by the employees.

Intended outcomes regarding policies of HR security.  These policies are enforced to ensure that-Risks to the security of government information resources are minimized.  Security responsibilities are documented and communicated.  Personnel are aware of their security and privacy responsibilities.  Access to information resources is removed or reviewed when employment status changes.  Management promotes security through hiring and supervisory practices at all times.

Duties of every personnel to ensure HR security success  Attend security and privacy awareness and training events.  Understand and abide by the Standards of Conduct.  Follow the established processes and policies to maintain security and privacy.  Consult managers or supervisors for guidance on security and privacy issues.  When assigning work, ensure personnel are aware of security requirements.  Consider security implications when making organizational changes which involve information resources

Things to avoid :  Not asking for clarification or direction when unsure about information security, privacy and records management requirements. Things to pay attention to:  Security and privacy requirements in job descriptions.  Security is everyone’s responsibility. Things to report:  Actions or activities which could circumvent or impair security processes.  Actual and suspected security incidents and events as required by the Information Incident Management Process.  File a General Incident or Loss Report (GILR) within 24 hours of a security incident.

Responsibilities of the organization management Things to do:  Ensure information security requirements are included in job descriptions.  Consult the Ministry Information Security Officer (MISO) for guidance on security issues.  Understand and abide by the Appropriate Use of Government Resources.  Support security awareness and education programs.

Things to pay attention to:  Legislation and policy related to privacy, security and records management. Things to establish procedures for:  Orientation programs for new personnel.  Reviewing access rights of personnel when employment status changes occur. Things to monitor:  That personnel support and follow security and privacy processes.

Things to report:  Promptly contact the Ministry Information Security Officer (MISO) when actual or suspected breaches of privacy or security occur. Things to reinforce with personnel:  The importance of understanding policies, adhering to standards and following approved processes for the protection of information.  That everyone has a role in securing information resources

References.  Roles of an HR. enforcing-security-policy html enforcing-security-policy html  de/Human+Resources+Security de/Human+Resources+Security  Information Security Policy policy/isp.pdf