Download presentation
Presentation is loading. Please wait.
Published byGarey Blair Modified over 8 years ago
1
HR SECURITY EGBERT PESHA 215061772 ALLOCIOUS RUZIWA 215029119 AUTHER MAKUVAZA 215049845 SAKARIA IINOLOMBO 215052072
2
WHAT IS HR SECURITY? Human resources security is part of personnel management and applies to pre-employment, the duration of employment, and termination of employment. It includes pre-employment checks and processes, documentation of security roles and responsibilities, and ongoing security and privacy awareness training. It also includes processes for changes in employment status i.e also security awareness
3
ROLES OF HR IN ENFORCING A SECURITY POLICY. Recruitment Code of Conduct
4
FUNCTIONS OF HR SECURITY? Job descriptions User awareness and training Disciplinary process
5
3 AREAS OF HR SECURITY A. Prior to employment. Defining roles and responsibilities of the job. Defining appropriate access to sensitive info. Determining depth of candidate’s screening levels.
6
B. During employment. Sending all the employees with access to sensitive information reminders of their responsibilities Conducting updated security awareness training
7
C. Termination and change of employment Preventing unauthorized access to sensitive information. Return of any assets of the organization that was held by the employees.
8
Intended outcomes regarding policies of HR security. These policies are enforced to ensure that-Risks to the security of government information resources are minimized. Security responsibilities are documented and communicated. Personnel are aware of their security and privacy responsibilities. Access to information resources is removed or reviewed when employment status changes. Management promotes security through hiring and supervisory practices at all times.
9
Duties of every personnel to ensure HR security success Attend security and privacy awareness and training events. Understand and abide by the Standards of Conduct. Follow the established processes and policies to maintain security and privacy. Consult managers or supervisors for guidance on security and privacy issues. When assigning work, ensure personnel are aware of security requirements. Consider security implications when making organizational changes which involve information resources
10
Things to avoid : Not asking for clarification or direction when unsure about information security, privacy and records management requirements. Things to pay attention to: Security and privacy requirements in job descriptions. Security is everyone’s responsibility. Things to report: Actions or activities which could circumvent or impair security processes. Actual and suspected security incidents and events as required by the Information Incident Management Process. File a General Incident or Loss Report (GILR) within 24 hours of a security incident.
11
Responsibilities of the organization management Things to do: Ensure information security requirements are included in job descriptions. Consult the Ministry Information Security Officer (MISO) for guidance on security issues. Understand and abide by the Appropriate Use of Government Resources. Support security awareness and education programs.
12
Things to pay attention to: Legislation and policy related to privacy, security and records management. Things to establish procedures for: Orientation programs for new personnel. Reviewing access rights of personnel when employment status changes occur. Things to monitor: That personnel support and follow security and privacy processes.
13
Things to report: Promptly contact the Ministry Information Security Officer (MISO) when actual or suspected breaches of privacy or security occur. Things to reinforce with personnel: The importance of understanding policies, adhering to standards and following approved processes for the protection of information. That everyone has a role in securing information resources
14
References. Roles of an HR. http://smallbusiness.chron.com/role-hr-play- enforcing-security-policy-39619.html http://smallbusiness.chron.com/role-hr-play- enforcing-security-policy-39619.html https://spaces.internet2.edu/display/2014infosecuritygui de/Human+Resources+Security https://spaces.internet2.edu/display/2014infosecuritygui de/Human+Resources+Security Information Security Policy http://www.cio.gov.bc.ca/local/cio/informationsecurity/ policy/isp.pdf
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.