Human Resources personnel often find themselves in a double bind. On one hand, employees like the convenience of being able to manage their personal data, such as leave, pay, and pension information from their work and personal computers. Also, in a large, corporate environment with many employees, using technology to keep track of vast amounts of data regarding employee information is often necessary, from a logistical perspective alone. However, employees are also understandably concerned that their information may be misused.
This article highlights the importance of the modern HR professional to be fluent in the safety protocols of informational technology, as well as the 'softer' side of human resource management. Employees must know that HR staff is at striving to do all they can to ensure employee data is used in a safe and appropriate manner. Appropriate password protection, and creating usernames ideally not connected to any easily traceable information regarding the employee (like names, birthdays or social security numbers) is just one example of how to create a more secure system. Also, minimizing the amount of damaging data kept online, like performance reviews or medical information, might be another way to reduce employee fears and risks of security impingement. If it is necessary to keep this data online, additional security protections regarding this data may be advisable.
Another important issue, however, that is not addressed in the article is the need to educate employees about how to keep their information safe. Employees must take active steps to keep their information confidential, such as not revealing their passwords and usernames carelessly to others, in addition to keeping it staff informed of any likely violations of computer security. All employees live in an unsafe environment, and whenever anyone uses a credit card he or she is at some risk. Every individual employee, as well as every manger must be constantly vigilant about their data. They must be aware that there are many determined hackers anxious to destroy what a responsible programmer has tried to create in to protect employee information.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now