workflow chart

pptx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

420

Subject

Computer Science

Date

Jan 9, 2024

Type

pptx

Pages

4

Uploaded by latoyalwilliams710

Report
3-1 ASSIGNMENT: WORKFLOW CHART LATOYA WILLIAMS HRM 225 PROFESSOR: JANNEL HILL DATE: 3/15/2023
Data breach Identify the breach Take restrictions and recovery precautions Collect evidence Analyze the Data breach Notify staff Focus on post breach operations Clear up breach
The data breach that occurred in error by the emailing of the workforce trends that included increases in FMLA requests, Employee Assistance Program usage, tardiness, absences, compensation changes for underrepresented groups, and turnover. The email in question was sent to an entry level employee that shares the same name as the CEO and this person should not have any access to this information. The Information that would have been shared would contain personal identifiers along with salary and disciplinary information for all employees. With this type of information not remaining confidential you have a risk in the information being shared to other employees, the general public and competitors. This would cause issues for the HR department because when salary and disciplinary information is out you will have questions as to why others aren't making as much as some and why some were disciplined, and others weren't.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Communicating this breach is necessary for keeping others informed of the information that was shared. I would first try to recall the email sent to the unintended party. If the email has already been read, I would then email all parties explaining the situation and the seriousness of this information being relayed to other parties in the company. Next, I would contact the CEO just so that he/she stays in the loop of the situation. Since there is no protected system passwords or information of that source, I would inquire with the IT department to make sure there is nothing they have to do to in order to protect this information further. I would then draft a company wide email to advise of this breach explaining the information that has been leaked what to do if they should incur any issues related to the breach. Once everyone has been notified, I would keep a close eye on the information and parties involved to continue maintaining a secure workplace for our employees.