3-1 Assignment Workflow HRM 225

pptx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

225

Subject

Information Systems

Date

Apr 3, 2024

Type

pptx

Pages

5

Uploaded by ChancellorLightningFly24

Report
3-1 Assignment Workflow HRM 225 Proactive HR Strategies Sarah Villanueva
Contain the data breach Assess the data breach by gathering all the facts Prevent the data breach from spreading Data Breach Incident response team must assess the level of risk of data breach Evaluate the risk of harm to affected individuals Notify the appropriate parties such as IT staff or legal counsel Review the incident and consider what actions can be taken to prevent future
Confidential Data The data breach that occurred in error by the workforce trends that included increases in FMLA request, Employee Assistance Program usage, tardiness, absences, compensation changes for underrepresented groups, and turnover. However, this email was accidently sent to an entry level of employee that shares the same name as the CEO. This is a level of severity regarding this information sent is low, but this can still compromise individuals' privacy. The impacts of confidential data breaches can have financial loss, operational downtime, legal action, and loss of sensitive data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Communication Once the security breach has been discovered it is up for to that individual to move quickly.. They must prepare a formal way to tell those who may be affected of the data breach. All information told is a must. Also, they need to decide if they will tell those who could be at harm or everyone who has given their personal information. The incident response team needs be alerted to prevent future loss that may occur. Lastly, must consider if law enforcement needs to be contacted.
Reference Fabian, D. (2023, September 11). Personal Data Breach Prevention And Response Strategy.  Mondaq Business Briefing , NA.  https://linkgal.com.ezproxy.snhu.edu/apps/doc/A764716424/ITOF?u=nhc_main&sid=ebsco&xid=0bf869b9