dcsimg

Data Protection: Five Challenges Facing the Enterprise HR Department

  • Data Protection: Five Challenges Facing the Enterprise HR Department-

    Protecting Intellectual Property When an Employee Gives Notice

    A company's business is dependent on the product or service it sells, which all traces back to the intelligence used to design that product or service. If this information is compromised, so is the business. The HR department in this case is the first line of defense since they are the first to find out the employee is leaving and are ultimately responsible for how and when the organization is notified. Policies for access changes need to be put in place to enable the organization to immediately disable access to sensitive materials.

1 | 2 | 3 | 4 | 5 | 6 | 7

Data Protection: Five Challenges Facing the Enterprise HR Department

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Data Protection: Five Challenges Facing the Enterprise HR Department-6

    Protecting Intellectual Property When an Employee Gives Notice

    A company's business is dependent on the product or service it sells, which all traces back to the intelligence used to design that product or service. If this information is compromised, so is the business. The HR department in this case is the first line of defense since they are the first to find out the employee is leaving and are ultimately responsible for how and when the organization is notified. Policies for access changes need to be put in place to enable the organization to immediately disable access to sensitive materials.

HR departments are faced with a unique set of security challenges. The department is responsible for keeping confidential information about internal staff as well as external clients, but a big part of their job is circulating policies and inter-office communications, which everyone needs to access. Added to that, HR departments are responsible for sharing employees' private and personally identifiable information (PII) with external providers and agencies including health plans, banks and the IRS. Managing who can see sensitive information needs a solution with the flexibility to protect against insider threats, potentially destroying files automatically, while enabling secure sharing.

Fasoo classifies the types of data the department handles into two tiers. Tier one, which includes intellectual property, executive compensation, board of directors' files, customer lists and financial data, requires the highest level of protection, which includes automatic encryption and assigning a security policy upon creation. Tier two information includes policy manuals, inter-office correspondence and pre-release public files, which is less sensitive.

This slideshow looks at five functions of an enterprise HR department and points to policy controls required of a security solution to support the specific access and permission requirements for each tier of information.