Hiring Policies And Privacy Term Paper

PAGES
3
WORDS
1102
Cite

¶ … Employee Hiring Policies on Private Security Employee hiring policies can have an impact on the private security of a given business or company. One way in which private security is protected within a company or firm is via a hiring probation period. A probation period can be useful in helping to determine the nature and the character of the person involved so that one can adequately determine the character of the person that one is dealing with and to see if this person can be considered to be adequately trustworthy: "Probation policies can help to increase the amount of time spent with the employee and teach an employer about different behaviors that the screening process may lack" (UofP, 2005). Hiring policies need to protect the private security of a given business so that all can run smoothly and so that reliable employees are located: the more detailed the hiring policies and the more nuanced they are, the more overall effectiveness in securing quality employees. For example, no company wants to hire new staff members just to have them try to compromise private or confidential information. Employees who have poor character or who are just interested in gathering confidential intelligence or files kept by an organization, need to be weeded out by the hiring process in general.

However, this weeding out process needs to have strong record-keeping and other such documentation for it to work smoothly: or else prospective employees can easily sue on the grounds of discrimination. For instance, the case Desert Palace Inc. v. Costa (2003) found that direct evidence need not even be presented by the plaintiff in order to win such a case which...

...

This means that an employee doesn't need to present hard evidence in order to prove discrimination. This also indicates that the burden is thus placed on the defendant, meaning that a strong paper trail which tracks all reasons why an employee wasn't hired and all security issues raised, needs to be detailed and well-documented.
Hiring policies need to help reinforce the private security of an organization. This means that there needs to be a range of physical and mental tests which will help bolster the quality of all employees. "Protection of classified information can result in a safer work environment. The main focus of policies is for control of internal employees within the work setting. Employers will also use different tools to help find the most suitable employees for the job at hand. There are different tools such as self-assessments, direct observations, work samples, and interviews that each individual will face before becoming an employee" (UofP, 2005). Thus, hiring policies need to rely on things like the process of evaluation and assessment: this can help illuminate if employees will be able to engage in the necessary tasks in a trustworthy, reliable manner or if employers will need to find people with different traits. New employees needed to be treated as new for a long time, a least a year, even after the probation period has ended. In this regard, all confidential information needs to be hidden from them and to be rendered completely inaccessible, until they have been with the company for at least a year. In that sense, the information will inaccessible until the employee has proven that they are qualified and…

Sources Used in Documents:

References

Desert Paalce Inc. Vs. Costa, 539 (U.S. 90, 2003).

Griggs v. Duke Power Co., 401 (U.S. 424-1971).

Naacpldf.org. (2003, June). Gonzalez v. Abercrombie & Fitch Stores. Retrieved from Naacpldf.org: http://www.naacpldf.org/case-issue/abercrombie-fitch-employment-discrimination

UofP. (2005). Employee Hiring Policies and Security. Retrieved from expertscolumn.com: http://crazyjenn33.expertscolumn.com/article/employee-hiring-policies-and-security


Cite this Document:

"Hiring Policies And Privacy" (2014, March 03) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/hiring-policies-and-privacy-184287

"Hiring Policies And Privacy" 03 March 2014. Web.20 April. 2024. <
https://www.paperdue.com/essay/hiring-policies-and-privacy-184287>

"Hiring Policies And Privacy", 03 March 2014, Accessed.20 April. 2024,
https://www.paperdue.com/essay/hiring-policies-and-privacy-184287

Related Documents

Abstract Human resources managers are increasingly called upon to contribute to ethical decision making in their hiring practices. Hiring policies and practices are a critical gateway to fulfilling organizational ethical commitments. Using standard screening methods like background checks or screening applicant social media accounts present ethical dilemmas, pitting the need for due diligence against the need to resist any form of discrimination in hiring. By engaging in hiring policies and practices

This balkanization is partially driven by the lack of integration between various segments of itself, and this is primarily a technological limitation. Yet the far broader and more difficult challenge in this regard is the segregating of knowledge not just for profit, but for lasting competitive advantage between nations. On the one hand there is the need for competitive differentiation in company's offerings, yet in others including the sharing

Privacy Abuse and Protection
PAGES 13 WORDS 3618

Privacy and Abuse Protection Efforts of Businesses Facts Many workforces in most nations all over the world are increasingly becoming global. These workforces cooperate, communicate, and link up in multinationals and global marketplaces via web-based applications across countries and territories. The phenomenon of globalization has removed quite a number of differences amongst peoples and nations both in workplaces and in other areas[footnoteRef:2]. However, some questions have been raised on the origins of

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

internal environment seems to be an environment where the competitive forces that form between the employees within a company and that relate to the individual need to be promoted and rise above the others (with all the ugly details this implies) are subordinated to obtaining the best working environment possible. It is also an internal environment where the company's added value comes, in great part, from the connections and

POLICY Youth and Gangs in Low Income AreasThis assignment is based on Burgess� concentric model, which divides urban centers into five zones that differ by income levels and distance from the central business district (Allen et al., 2005). Gang activity is more prominent in the �loop� (the CBD), the transition zone, which is characterized by low incomes and slum conditions, and the factory zone, which is dominated by factories and