Tuesday, May 7, 2019

How can Human Resources protect an organization from the risks and Essay

How can Human Resources protect an validation from the risks and liabilities associated with HR Technology and Digital Communications - Essay ExampleHuman resource management is a companys first contact point with its employees because it is the arm of the company that recruits and as such it is in a good position to train them on how to use its technology and digital communication theory responsibly. exploiter training is important in protecting musical arrangements from the risks and liabilities associated with human resource management technology and digital communications because many of these risks arise from their inappropriate use (Baldwin, 2010).The human resource department should train employees on the organizations acceptable-use policy for its digital machines and software applications. Important areas that this training can touch on complicate proper use of the email system, password administration guidelines, login requirements and desktop security. Some of the tr aining activities that can inspection and repair protect against risks and liabilities associated with human resource management technology and digital communications can include sensibilise employees about policy changes, in-person seminars and web-based courses. Requiring employees to sign a security awareness agreement at the abrogate of every training session enhances employees adherence to policies on human resource technology and digital communications security policies (Kerr et. al., 2011).The human resource department should adopt mechanism that can help detect user violations of responsible and acceptable use of human resource technology and digital communications which can go risks and predispose the organization to liabilities. Timely detection of such violations enables timely mitigation of risks and the management of the things that damage a companys reputation and brand. The human resource department should require auditors to assess for the effectiveness and enou gh of IT security policies and procedures to protect against risks and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.