Data Protection: Five Challenges Facing the Enterprise HR Department

1 | 2 | 3 | 4 | 5 | 6 | 7
Next Data Protection: Five Challenges Facing the Enterprise HR Department-6 Next

Protecting Intellectual Property When an Employee Gives Notice

A company's business is dependent on the product or service it sells, which all traces back to the intelligence used to design that product or service. If this information is compromised, so is the business. The HR department in this case is the first line of defense since they are the first to find out the employee is leaving and are ultimately responsible for how and when the organization is notified. Policies for access changes need to be put in place to enable the organization to immediately disable access to sensitive materials.

HR departments are faced with a unique set of security challenges. The department is responsible for keeping confidential information about internal staff as well as external clients, but a big part of their job is circulating policies and inter-office communications, which everyone needs to access. Added to that, HR departments are responsible for sharing employees' private and personally identifiable information (PII) with external providers and agencies including health plans, banks and the IRS. Managing who can see sensitive information needs a solution with the flexibility to protect against insider threats, potentially destroying files automatically, while enabling secure sharing.

Fasoo classifies the types of data the department handles into two tiers. Tier one, which includes intellectual property, executive compensation, board of directors' files, customer lists and financial data, requires the highest level of protection, which includes automatic encryption and assigning a security policy upon creation. Tier two information includes policy manuals, inter-office correspondence and pre-release public files, which is less sensitive.

This slideshow looks at five functions of an enterprise HR department and points to policy controls required of a security solution to support the specific access and permission requirements for each tier of information.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.