SlideShare a Scribd company logo
1 of 15
Human Resources:
Protecting Confidentiality
BUSINESS STUDENT AT PENN STATE MONT ALTO
TAYLOR CANNON
Protect your company’s confidential information
 On the minds of business professionals:
Confidentiality
Privacy
Security
What is confidentiality?
 Involves numerous concepts/ different circumstances
 Different types of information must be protected
 Most is stolen because of poorly trained employees
 Insiders caused 60% of data breaches
 75% done with malicious intent
 25% were accidental
Protect Customers and Clients
 Obtaining consent to collect personal informational must be
reinforced
 Confidential information must be presented with confidence
 Create policies
Protect Employees
 Employees are required to give their employers with
information
 Employment history
 Criminal background
 Credit scores
 Immigration status
 Etc.
Workplace Privacy
 Privacy battleground
 State laws tend to govern privacy rules in the
workplace
 Constitutional right to privacy
 Employers tend to monitor employees
Protect Management Information
 Company executives are often
involved with:
 Strategic objectives
 Business deals
 Mergers and acquisitions
 Sales and financial reports
Failing to protect
confidential management
information can result in:
Broken deals
Unwanted press
Judgement of criticism
Failed investigations
Outright sabotage
Legal Confidentiality
 Three types of confidentiality rules
Attorney-client communication privilege
General ethical duty of confidentiality
Work-product doctrine
Nondisclosure Agreements
An agreement between two parties that
wish to share confidential information and
make sure it's not disclosed to third
parties.
Noncompetition Agreements
 Companies like to protect their confidential
information and strategic advantages using these
agreements.
 Governed by state regulations and court rulings
Trade Secret Protections
The law protects information such as a formula, a
pattern, compilation, program, device, method,
technique, process, drawing, data, or customer list that
derives independent economic value because it's not
generally known or readily available, and reasonable
efforts are made by the company to maintain secrecy
Social Media Policies
 Companies are concerned with employees leaking
confidential company information
 Restrict employees from using social media on employer
equipment
 Employers have the right to limit what they post on social
media
Cybersecurity
 Companies use applications to make sure they are
secure
 Designed to protect confidential information
 Security of a company’s entire computer network
and information system
 Maintain a virus free system
Document Management
 Can be either electronic stored or paper
 Three aspects of document management are:
Storage
Retention limits
Destruction
Bottomline
Important information of
companies and individuals must
be secured and protected.

More Related Content

What's hot

Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordellcoreycordell2
 
Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit TrapIdeba
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for businessSameerShaik43
 
Nicholson's Presentation
Nicholson's PresentationNicholson's Presentation
Nicholson's Presentationguest1e9cf4145
 
Nicholson Power Point Presentation
Nicholson Power Point PresentationNicholson Power Point Presentation
Nicholson Power Point Presentationruthykeefe
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ, Inc.
 
Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementPaige Rasid
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and ComplianceAlistair Pugin
 
Fictional Law Firm
Fictional Law FirmFictional Law Firm
Fictional Law Firmthaliapa
 
PIPL - Data Protection & Security
PIPL - Data Protection & SecurityPIPL - Data Protection & Security
PIPL - Data Protection & SecurityDr. Sanjeev B Ahuja
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsCharles McNeil
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.Unified11
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...DATUM LLC
 
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceWEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceKSM Consulting
 
BV Company Overview Web
BV Company Overview WebBV Company Overview Web
BV Company Overview Webjlbrewer
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 

What's hot (20)

Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordell
 
Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
 
Nicholson's Presentation
Nicholson's PresentationNicholson's Presentation
Nicholson's Presentation
 
Nicholson Power Point Presentation
Nicholson Power Point PresentationNicholson Power Point Presentation
Nicholson Power Point Presentation
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability Flyer
 
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
 
Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
Fictional Law Firm
Fictional Law FirmFictional Law Firm
Fictional Law Firm
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
 
PIPL - Data Protection & Security
PIPL - Data Protection & SecurityPIPL - Data Protection & Security
PIPL - Data Protection & Security
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceWEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
 
BV Company Overview Web
BV Company Overview WebBV Company Overview Web
BV Company Overview Web
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 

Similar to Human resources protecting confidentiality

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality KelbySchwender
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Caseprivacytalks
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxcomstarndt
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Jonathan Chilton
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersSpain-Holiday.com
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038FNian
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glbaguestfd062
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperServersys
 

Similar to Human resources protecting confidentiality (20)

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist Whitepaper
 

More from TaylorCannon8

Business Ethics for Sales Professionals
Business Ethics for Sales ProfessionalsBusiness Ethics for Sales Professionals
Business Ethics for Sales ProfessionalsTaylorCannon8
 
Implementing Supply Chain Management
Implementing Supply Chain ManagementImplementing Supply Chain Management
Implementing Supply Chain ManagementTaylorCannon8
 
SAP ERP Essential Traning
SAP ERP Essential TraningSAP ERP Essential Traning
SAP ERP Essential TraningTaylorCannon8
 
Purchasing Foundations
Purchasing FoundationsPurchasing Foundations
Purchasing FoundationsTaylorCannon8
 
Business law for managers
Business law for managersBusiness law for managers
Business law for managersTaylorCannon8
 
Lean six sigma foundations
Lean six sigma foundationsLean six sigma foundations
Lean six sigma foundationsTaylorCannon8
 
Decision making strategies
Decision making strategiesDecision making strategies
Decision making strategiesTaylorCannon8
 
Linkedin learning highlights
Linkedin learning highlightsLinkedin learning highlights
Linkedin learning highlightsTaylorCannon8
 
Lynda negotiating your job offer
Lynda  negotiating your job offerLynda  negotiating your job offer
Lynda negotiating your job offerTaylorCannon8
 
Lynda strategic negotiation
Lynda  strategic negotiationLynda  strategic negotiation
Lynda strategic negotiationTaylorCannon8
 
Lynda practicing fairness as a manager
Lynda  practicing fairness as a managerLynda  practicing fairness as a manager
Lynda practicing fairness as a managerTaylorCannon8
 
Lynda creating your personal brand
Lynda  creating your personal brandLynda  creating your personal brand
Lynda creating your personal brandTaylorCannon8
 
Negotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad CopNegotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad CopTaylorCannon8
 
Lynda -Negotiation Foundations
Lynda -Negotiation FoundationsLynda -Negotiation Foundations
Lynda -Negotiation FoundationsTaylorCannon8
 

More from TaylorCannon8 (14)

Business Ethics for Sales Professionals
Business Ethics for Sales ProfessionalsBusiness Ethics for Sales Professionals
Business Ethics for Sales Professionals
 
Implementing Supply Chain Management
Implementing Supply Chain ManagementImplementing Supply Chain Management
Implementing Supply Chain Management
 
SAP ERP Essential Traning
SAP ERP Essential TraningSAP ERP Essential Traning
SAP ERP Essential Traning
 
Purchasing Foundations
Purchasing FoundationsPurchasing Foundations
Purchasing Foundations
 
Business law for managers
Business law for managersBusiness law for managers
Business law for managers
 
Lean six sigma foundations
Lean six sigma foundationsLean six sigma foundations
Lean six sigma foundations
 
Decision making strategies
Decision making strategiesDecision making strategies
Decision making strategies
 
Linkedin learning highlights
Linkedin learning highlightsLinkedin learning highlights
Linkedin learning highlights
 
Lynda negotiating your job offer
Lynda  negotiating your job offerLynda  negotiating your job offer
Lynda negotiating your job offer
 
Lynda strategic negotiation
Lynda  strategic negotiationLynda  strategic negotiation
Lynda strategic negotiation
 
Lynda practicing fairness as a manager
Lynda  practicing fairness as a managerLynda  practicing fairness as a manager
Lynda practicing fairness as a manager
 
Lynda creating your personal brand
Lynda  creating your personal brandLynda  creating your personal brand
Lynda creating your personal brand
 
Negotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad CopNegotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad Cop
 
Lynda -Negotiation Foundations
Lynda -Negotiation FoundationsLynda -Negotiation Foundations
Lynda -Negotiation Foundations
 

Recently uploaded

JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 

Recently uploaded (20)

JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 

Human resources protecting confidentiality

  • 1. Human Resources: Protecting Confidentiality BUSINESS STUDENT AT PENN STATE MONT ALTO TAYLOR CANNON
  • 2. Protect your company’s confidential information  On the minds of business professionals: Confidentiality Privacy Security
  • 3. What is confidentiality?  Involves numerous concepts/ different circumstances  Different types of information must be protected  Most is stolen because of poorly trained employees  Insiders caused 60% of data breaches  75% done with malicious intent  25% were accidental
  • 4. Protect Customers and Clients  Obtaining consent to collect personal informational must be reinforced  Confidential information must be presented with confidence  Create policies
  • 5. Protect Employees  Employees are required to give their employers with information  Employment history  Criminal background  Credit scores  Immigration status  Etc.
  • 6. Workplace Privacy  Privacy battleground  State laws tend to govern privacy rules in the workplace  Constitutional right to privacy  Employers tend to monitor employees
  • 7. Protect Management Information  Company executives are often involved with:  Strategic objectives  Business deals  Mergers and acquisitions  Sales and financial reports Failing to protect confidential management information can result in: Broken deals Unwanted press Judgement of criticism Failed investigations Outright sabotage
  • 8. Legal Confidentiality  Three types of confidentiality rules Attorney-client communication privilege General ethical duty of confidentiality Work-product doctrine
  • 9. Nondisclosure Agreements An agreement between two parties that wish to share confidential information and make sure it's not disclosed to third parties.
  • 10. Noncompetition Agreements  Companies like to protect their confidential information and strategic advantages using these agreements.  Governed by state regulations and court rulings
  • 11. Trade Secret Protections The law protects information such as a formula, a pattern, compilation, program, device, method, technique, process, drawing, data, or customer list that derives independent economic value because it's not generally known or readily available, and reasonable efforts are made by the company to maintain secrecy
  • 12. Social Media Policies  Companies are concerned with employees leaking confidential company information  Restrict employees from using social media on employer equipment  Employers have the right to limit what they post on social media
  • 13. Cybersecurity  Companies use applications to make sure they are secure  Designed to protect confidential information  Security of a company’s entire computer network and information system  Maintain a virus free system
  • 14. Document Management  Can be either electronic stored or paper  Three aspects of document management are: Storage Retention limits Destruction
  • 15. Bottomline Important information of companies and individuals must be secured and protected.