As a risk advisory consultant, you are asked to evaluate and recommend improvements for the employee onboarding process for Swiftly Tech. During your evaluation you discover that Swiftly Tech's employee data was part of a data breach from a third-party background check provider. What action do you recommend that Swiftly Tech take? Swiftly Tech should require employees to acquire and provide their own background check data. Swiftly Tech should forgo background checks to avoid sharing confidential employee data with other companies. Swiftly Tech should require background check providers to have their own internal controls to ensure confidentiality and security of data. All of these answer choices are correct.
As a risk advisory consultant, you are asked to evaluate and recommend improvements for the employee onboarding process for Swiftly Tech. During your evaluation you discover that Swiftly Tech's employee data was part of a data breach from a third-party background check provider. What action do you recommend that Swiftly Tech take?
Swiftly Tech should require employees to acquire and provide their own background check data.
Swiftly Tech should forgo background checks to avoid sharing confidential employee data with other companies.
Swiftly Tech should require background check providers to have their own internal controls to ensure confidentiality and security of data.
All of these answer choices are correct.
Trending now
This is a popular solution!
Step by step
Solved in 4 steps