4

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

OL645

Subject

Management

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by CaptainMoonCrocodile28

Report
While I truly believe that companies should take different measures to make sure that employees don't go into any breach of information, I also believe that employees should have a right to privacy and confidentiality and employers should also have a right to privacy in terms of trade secrets (Hartman et. al., 2021). Honestly, sometimes, the more I discuss different work situations that involve any type of monitoring, the more contradictory are their answers. I was sharing with a friend, who is the Director of HR, about a recent issue that happens in my workplace: phishing, which is: "A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person." (Computer Security Resource Center, n.d.) As I was telling my friend, the company I work for did everything possible to fix and prevent a huge wave of phishing emails addressed to most of us, employees; however, one of our co-workers, about one year ago some information was leaked. That employee involved was a 68-years old woman, an excellent employee, who works full-time and brings a lot of value to her team. At that point, because the IT person had left the organization, we were in the process of hiring another IT Project Manager, who, shortly after being hired, implemented new policies and worked hard to prevent and stop these attacks. Back to the 68 years old employee, I would like to mention that the information that was leaked was not confidential. Once she realized the mistake, the colleague called HR right away, apologized, and said she was ready to face any consequences pertaining to this. Leadership decided to offer her more guidance, which was then offered to all employees, until specific policies were implemented. My friend to whom I was telling this, said that we did poorly. She said we should have fired that person right away, because she poses a danger to the organization.
Since then, our employee, who still works full-time, never made a mistake like this. She participated in all the cybersecurity trainings and she still does an exceptional job. What factors should be taken into account for any law regarding this subject? I would say the main laws that should be respected are the local state laws. Depending on the issue, as an HR professional, I encourage background checks before hiring someone, in some fields drug testings. Another factor which should not be ignored by HR and IT professionals is installing anti-viruses in computers, performing credit checks on employees who are supposed to receive company credit cards. References: Hartman, L. P., DesJardins, J., & MacDonald, C. (2021). Business ethics: Decision making for personal integrity and social responsibility. New York: McGraw-Hill Education.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help