Preview

Human Resource Management Week 7 Case Answers

Good Essays
Open Document
Open Document
592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Human Resource Management Week 7 Case Answers
Case 7.1 “Data Security”.
See the case study on page 499. Answer questions 1,2 & 3.
Q. 1, 2 & 3
How would you communicate a data security policy that required software checking on employees’ emails? What elements should a data security policy for a bank include? Employee data theft most frequently occurs with new employees or when an employee has given notice and is leaving. How would you deal with these two very different issues?
As mentioned in our text, there are two ways to address security issues. First, the technical approach in which computer software and monitoring is used to monitor and control websites being visited or information being copied. Second, the communication methods and partnership and control by the Human Resources department. Because not all possible risks could be addressed by the use of technology there is also a great need to control the flow of information and proprietary technology by implementing policy. A bank for example could implement a security access policy following a “need to know” plan where only if necessary an employee could have access to data or information. The bank could also create an expectation of zero privacy where all files or devices on a company network whether owned or provided by the employee are subject to scanning or monitoring, and finally the automatic acceptance that devices such as peripheral blockers may be in place in order to avoid data extraction or movement. In regards to a new employee versus an employee who has given notice, a new employee could have restricted access that is only opened slowly as they acquire responsibilities and an employee leaving the firm depending on his level of access, the firm may opt to take his termination effective immediately.
Case 7.2 "Dealing with Workplace Bullying”
See the case study on page 534. Answer questions 1,2 & 3.
Q. 1 & 2
Based on your work experiences, identify examples of bullying that you have observed by managers, supervisors



References: Mathis, R. L., & Jackson, J. H. (2011). Human resource management (13th ed.). Mason, OH: Thomson/South-western.

You May Also Find These Documents Helpful

  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    * Develop and implement a structured flexible work environment security policy. A concise, structured policy for telecommuting…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mathis, R. L., & Jackson, J. H. (2000). Human Resource Management (9th ed.). Cincinnati, OH:…

    • 4497 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    References: Stewart, G., & Brown, K. (2008). Human resource management: 2010 custom edition (1st ed.). Hoboken, NJ: John Wiley & Sons.…

    • 1580 Words
    • 7 Pages
    Better Essays
  • Best Essays

    Safety, C. C. (2005, March 8). Bullying in the Work Place . Retrieved May 31, 2012, from Canadian Centre for Occupational Health and Safety: http://www.ccohs.ca/oshanswers/psychosocial/bullying.html…

    • 2010 Words
    • 9 Pages
    Best Essays
  • Better Essays

    The failure of organizations to implement a comprehensive and robust information security program can mean the untimely demise for some and costly setbacks for others. At the heart of information security is security policy. Without security policy there can be no security program. Without people, security policies would not exist. They would not be written, implemented, and enforced. Security policies and the adoption of standards provide many benefits as shall be discussed in this paper. Further is discussed how information in systems often falls under different classifications to reflect a degree of sensitivity and how this relates to an organization’s security policy.…

    • 1099 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Mathis, R., & Jackson, J. (2008). Human Resource Management (12th ed.). Williard, Ohio, USA: Thomson South-Western.…

    • 975 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Employee Privacy Paper

    • 1193 Words
    • 5 Pages

    The business world is rapidly changing with the introduction to new technologies and communication methods. Business corporations, both large and small, are adapting to the new norms of society and have started to apply the internet and email usage to everyday business activities. Within every business office one can find computers, internet, and other technologies that create a quicker, immediate means to communication and allow employees to perform their many tasks and duties associated with their jobs. In recent developments, businesses have begun implementing privacy policies on both employee internet and email usage at the office. Many believe that…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Bullying in the work place

    • 1327 Words
    • 4 Pages

    (Bullying At Work - Book by Andrea Adams & Neil Crawford (1992)) describes bulling at the work place is like a malignant cancer. It creeps up on you long before you or anyone else are able to appreciate what is that making you feel the ill effects. Yet despite the fact that the majority of the adult population spends more waking hours than anywhere else, the disturbing manifestation of adult bullying, in this particular context, are widely dismissed. (Adams 1992, p9)…

    • 1327 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Despite the benefits of maintaining a secure organization and the potentially devastating consequences of not doing so, many organizations have poor security mechanisms, implementations, policies, and culture. 1. OBSTACLES TO SECURITY In attempting to build a secure organization, we should take a close look at the obstacles that make it challenging to build a totally secure organization. Security Is Inconvenient Security, by its very nature, is inconvenient, and the more robust the…

    • 11027 Words
    • 45 Pages
    Powerful Essays
  • Better Essays

    --Lack of employee awareness about security policies ranked as having the greatest impact on the security of mobile data…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Job Analysis

    • 661 Words
    • 3 Pages

    Stewart, G. L., & Brown, K. G. (2012). Human resource management (2nd ed.). Danvers, MA: John Wiley & Sons, Inc.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The objective posed in every information security policy is that of data protection through a thorough definition of procedures, practices and guidelines for the practical configuration and information security management in the entire corporate environment. The policy therefore defines the organization’s orientation in regard to philosophy and the actual requirements for securing the information assets. Again, the policy outlines its applicability to all stakeholders, the processes and the environments subject thereto.…

    • 2847 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    The first key sign of workplace bullying involves repeated unreasonable behaviour (Caponeccia & Wyatt, 2009), such behaviours would be seen as victimizing, humiliating, undermining or distressing to an individual or a group of people (WorkCover 2008). Examples of bullying include: undue criticism, gossiping and name-calling, social or physical isolation, intimidation, withholding information for effective work performance, work overload or not providing enough work, spreading rumours, humiliation and verbal abuse. (Caponeccia & Wyatt, 2009; House of Representatives
Standing Committee on Education and Employment 2012). The second key sign of workplace bullying relates to the harm of a person or person’s health and wellbeing…

    • 2046 Words
    • 9 Pages
    Powerful Essays