Monday, October 7, 2019

How can Human Resources protect an organization from the risks and Essay

How can Human Resources protect an organization from the risks and liabilities associated with HR Technology and Digital Communications - Essay Example Human resource management is a company’s first contact point with its employees because it is the arm of the company that recruits and as such it is in a good position to train them on how to use its technology and digital communications responsibly. User training is important in protecting organizations from the risks and liabilities associated with human resource management technology and digital communications because many of these risks arise from their inappropriate use (Baldwin, 2010). The human resource department should train employees on the organization’s acceptable-use policy for its digital machines and software applications. Important areas that this training can touch on include proper use of the email system, password administration guidelines, login requirements and desktop security. Some of the training activities that can help protect against risks and liabilities associated with human resource management technology and digital communications can include sensitizing employees about policy changes, in-person seminars and web-based courses. Requiring employees to sign a security awareness agreement at the end of every training session enhances employees’ adherence to policies on human resource technology and digital communications security policies (Kerr et. al., 2011). The human resource department should adopt mechanism that can help detect user violations of responsible and acceptable use of human resource technology and digital communications which can bring risks and predispose the organization to liabilities. Timely detection of such violations enables timely mitigation of risks and the management of the things that damage a company’s reputation and brand. The human resource department should require auditors to assess for the effectiveness and adequacy of IT security policies and procedures to protect against risks and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.