+1(323)689-1506 support@essayhubmarket.com

Looking for help with an assignment? Connect with an assignment Expert Now!

What steps and provisions do you need to include in your workplace violence action plan?

Instructions

Read the case study “Data Security“. Submit a 2-4 page paper (excluding the cover page and reference page) answering the questions related to the case study “Data Security.” Incorporate theories and practices you learned during this course into your paper. Be sure to follow APA guidelines and write your paper in the proper format, not as a question and answer.

CHAPTER 14 Risk Management and Worker Protection 499 HR EXPERIENTIAL PROBLEM SOLVING Due to an increase in recent employee layoffs because of economic conditions and the increased risk of workplace violence, as well as an increase in domestic restraining orders that several employees have recently obtained against former spouses, company management has decided it is time to take a proactive position and develop a workplace violence action plan. There are many factors to consider, as your company has three locations and more than 500 employees. For information to assist you in identifying workplace violence categories and prevention strategies, visit the website at www.fbi.gov/publications/violence.pdf. 1. Which workplace violence categories are of most concern to your company? 2. What steps and provisions do you need to include in your workplace violence action plan? Policing the workplace used to mean reminding employees about personal phone calls and making sure that paper clips did not disappear. But with the computer revolution at work that began in the 1990s, checking on employee behavior at work became considerably more technical. The threats to data security, not to mention other threats for potential lawsuits (e.g., sexual harassment), are now more complex as well. New federal laws pertaining to financial and medical records have put increased pressure on companies to protect their data. But auditing user privacy cannot be done without input and buy-in from HR, notes a senior consultant with an IT security firm in Massachusetts. Whether the concern is in appropriate Internet usage or transferring files outside the company, HR may be the first to learn of a problem. Although the possibility of outside attacks on the computer network is a real problem, the threat of internal security breaches is even greater. The growing insider problem and the sheer volume of electronic messages coming into and out of a company (a large company easily processes one million e-mails per day) present HR with a challenge on data security policy development, implementation, and enforcement. HR may be asked to “identify personnel at risk” who might require more stringent watching, such as people who are sending out résumés. In many cases, people leaving organizations take advantage of the opportunity to take intellectual property with them. Security software identifying employee behaviors will always require HR involvement. Policy violations, banned sites, and stealing identity data are examples. Companies look very bad when sensitive customer or employee data are stolen or leaked to the public. Employees can easily resent the security measures and see the security as “Big Brother” watching. However, the growth of identity theft and spyware means that more employees have been personally affected by data security and are more likely to recognize the need for their employers’ data security efforts. At Spherion, HR publishes a “computer and telecom resources policy” that specifies appropriate usage and a code of conduct. Employees must read and sign the policy. The company also has an IT Risk Team with members from HR, accounting, internal auditing, and other departments. There are, of course, attempts at a purely technical solution to the problem. But it is clear that HR must have a role in balancing employee privacy with company risk management. A simple act, such as a bank’s loan officer burning credit information to a CD and selling the data to another bank, can undo all the technical protections. The human side—developing a policy, communicating it, helping people understand why it is needed, and applying it fairly—is the big piece for HR.56 QUESTIONS 1. How would you communicate a data security policy that required software checking of employees’ emails? 2. What elements should a data security policy for a bank include? 3. Employee data theft most frequently occurs with new employees or when an employee has given notice and is leaving. How would you deal with these two very different issues? Data Security CASE 5315X_14_ch14_p465-501.indd 499 315X_14_ch14_p465-501.indd 499 26/06/10 6:11 PM 6/06/10 6:11 PM

Get a Quick Quote

Approximately 250 words
Total price (USD) $: 10.99

Reviews from Clients who Ordered From Us:

Kate Hogan

They are my go to assignment helper and have been a great help. Thank you!

Sheena easton

I`ve been working with this website for over a year! Here`s what I liked the most about them. First, quality of writing (creative and with catchy titles).

Our Benefits

Get your essay writing needs completed by us and enjoy these and more benefits:

Fast

Whether you have a last minute discussion post due in a couple of hours or the last day in class and you totally forgot to work on that research paper, we always put everything aside to save your grade

Custom Essay

Our qualified team of experts have access to varied online library databases to help with recent and well researched tools that help in writing your paper to deliver a profound research that earns you a stellar grade

80+ Subjects

We do not turn down any type of work. We have qualified writers holding bachelors, graduate and Doctoral certificates matched with skill and expertise. Get help with homework acroos varied subject

Real Time Tracking

We have a user friendly interface to help you track the progress on your order from your client portal. Additionally, with each and every step, you will get notified on the status of your paper to give you an easy time to do other kinds of stuff

Order Our Custom Essay Writing Service

1. Making an Order Tip and Tricks

  • Choose the type of assignment, topic, subject, length, and deadline for your paper.
  • Indicate the following order parameters: service, chosen writer level, number of cited sources, and citation style.
  • Add your document or provide instructions for paper in a specific form.
Image showing step 1 of making an order
Image showing how to make payment for your order

2. Tips and Tricks for Choosing the Right Writer

  • Log in using your email address or your Facebook account.
  • A list of suitable writers will be offered to you. Before making a selection, you can read testimonials or engage in a Live Chat with authors.
  • Check your balance and, if necessary, add funds to your account. Here you will also find exclusive bargains.
  • Put money into the account of the chosen writer.

3. Tips and Tricks for Supervising the Writing Process

  • Get the chance to keep track of the process and connect with your writer.
  • If required, include updated instructions.
  • Have a conversation with your author.
Image showing how to supervise writing process
Image showing how to download your completed results

4. Tips and Tricks to Enjoy the Results

  • You will receive the paper. You have the option of requesting modifications if they are required. Before giving it back to the writer, make a list of the adjustments that need to be made.
  • Accept the paper and send the money to the author.
  • Rate your writer, submit your request, then sit back and enjoy the results.

How can we even make your school life easier with our services?

We always strive to provide the best techniques and skills that help your essay a stellar paper. We have achieved this through the years by offering features such as:

Progressive Delivery

Your order is assigned to a writer who delivere’s your bulk research projects in small chunks and making edits upon feedback from the professor

Native Writers

Our writers are varied across different coutnries such s Canada, Australia, U.K and the United States. Request a native speaker writer to help you ace that paper

Powerpoint slides & other visuals

Order a visual such as Powerpoint to better expound your research paper at $10 per slide including speaker notes

Top rated writers

Order from among the top 10 rated writers at no extra cost