SlideShare a Scribd company logo
1 of 18
Human Resources: Protecting
Confidentiality
Created By: Kelby L. Schwender
Business student, Penn State
Bottom-line Insight
“When we talk about confidential information, it’s information that’s been provided to
somebody in confidence, trusting that it will not be used or shared for reasons outside of
the need to support a particular transaction unless it has permission to do so.”
Understanding
Confidentiality
What is confidentiality?
● Confidentiality originates from the word confident, which implies trust.
● Types of information that must be protected: health care information, social security
numbers, financial information, trade secrets, business strategies and more.
● Maintaining the broad range of confidential information at your company will be a
never-ending challenge for leadership, management, employees and customers alike.
Protect customers and clients
● Types of information YOU give out: financial information, credit information, health
information, location information, websites visited, items purchased, sports teams,
dating preferences and more.
● Your consent and the company’s ability to use your confidential information is
outlined in some privacy or user agreement that you sign on a contract on their
website or otherwise.
● It’s the responsibility of you and your company to do everything possible to protect
the confidential information of your customers and clients.
Protect employees
● Employees are required to provide their employers with a wide range of information.
○ Hiring process: employment history, criminal background, credit scores, the ability to be fit for duty,
immigration status, prior salary information and even more.
● Companies should make sure employee information is distributed on a need-to-know
basis only.
● As for protecting confidential customer information, you and your company must do
a good job of protecting confidential employee information.
Workplace Privacy
● The workplace has become a privacy battleground.
● Three places where privacy rights show up:
○ Workplace
○ Employee monitoring
○ Drug and Alcohol testing
● The idea of what remains private is constantly shifting and challenged with new
technologies, a general transparency and archaic laws.
Protect management information
● Failing to protect confidential management information can result in broken delas, unwanted press, judgement of criticism,
failed investigations and outright sabotage.
● The biggest challenge is identifying and stopping those willing to share or leak confidential information for their personal gain.
● While confidential information may be leaked to boost share prices and make its participants rich in the process, it also gets the
securities and exchange commission and other regulatory agencies excited as it violates insider trading laws.
● As with the other types of confidential protection, information should be limited on a need to know basis, rules must be
established to control dissemination of information, the people must be trained on those rules and the leaks need to be plugged.
Legal confidentiality
● There are three types of confidentiality rules the relate to attorney-client - (1)
Attorney-client communication privilege (2) General ethical duty of confidentiality
(3) Work-product doctrine.
● Both the conversation and the report remain confidential unless the lawyer decides to
introduce some or all of it into evidence to show they (attorney and client) have a
good faith defense to any claims that have been brought.
Best Practices for
Protecting Confidentiality
Nondisclosure agreements
● A nondisclosure agreement (NDA) is an agreement between two parties that wish to share confidential
information and make sure it’s not disclosed to third parties.
● NDAs are often used by deal makers, taking a, hey, you show me yours and I’ll show you mine approach to
sharing information.
● An NDA can be a bilateral agreement or a one-way disclosure.
● Nondisclosure agreements and other confidentiality provisions may define obligations and legal remedies, but
that is no guarantee somebody is gonna abide by them.
Noncompetition agreements
● Some employee noncompete agreements include specifically identified competitors, agreed-upon damages the employee will
pay if they breach the agreement, and the ability of the company to obtain injunctive relief.
● The courts will consider these six factors in determining whether to enforce a noncompete agreement:
○ Does the employer have a legitimate interest in restricting this employee’s competitive activity? What exactly is a
competitive activity or information being protected?
○ Is the restriction reasonable given the circumstances?
○ Is the restriction reasonably limited in time and geography?
○ Will enforcing restriction harm the public interest? Will any aspect of public policy be affected if the agreement is
enforced?
○ Was there reasonable consideration given in return for the agreement being signed?
○ When will the noncompetition restriction be triggered?
● Before using an employee noncompete agreement, consult with an attorney to understand the laws in your state.
Trade secret protections
● To determine whether a piece of information is a trade secret, the Restatement of
Torts, will generally examine these fix factors:
○ The extent to which the information is known outside the business
○ The extent to which its known by employees and others involved in the business
○ The extent of measures taken by the business to guard the secrecy of the information
○ The value of the information to the business and its competitors
○ The effort or money expended by the business in developing the information
○ The ease or difficulty with which the information could be properly acquired or duplicated by others
● Every company should make efforts to define and protect confidential trade secrets
through written agreements and legal action when needed.
Social media policies
● Numerous states have passed a law that restricts employers from requiring employees to disclose social media passwords; thus
keeping employers our of employee personal business.
● Employers do have the right to limit what employees can say about confidential company information on social media.
● A typical social media policy will say that employees are required to maintain the confidentiality of company trade secrets and
private or confidential information
○ Trade secrets may include: information regarding development of systems, processes, products, know-how, and
technology.
● Do not post internal reports, policies, procedures, or other internal business-related confidential communications.
Cybersecurity
● Cybersecurity is designed to protect confidential information from cyberattacks like malware, denial-of-service attacks, viruses,
and hacks on a company’s website and computer networks.
● To prevent cybersecurity attacks, employers should consider taking these eight steps:
○ Adopt a cybersecurity culture
○ Restrict access to sensitive data, devices, or software where possible and create a password policy for all employees to
follow
○ Stay on top of emerging cybersecurity threats with both technology solutions, and ongoing training
○ Automatically update all applications, programs, and networks with the latest security upgrades
○ Inform your employees about spear phishing attempts sent through social media and email
○ Backup data to a secure location
○ Have independent experts assess and test your systems to find their vulnerabilities
○ Have a plan to react when attacks and breaches occur
● Your company should have robust IT systems, well-crafted policies and procedures, and appropriate employee training.
Document management
● Documents that contain confidential information can include paper, electronic storage such as metadata,
system data, information held on computers, smartphones and other storage devices.
○ Emails records, texts, videos, and pictures are also considered documents.
● There are three aspects of document management including storage, retention limits and destruction.
○ There should be policies that define where to store confidential documents, who can have access to
them and what password protection is required.
● Make sure documents, even when they’re stored, can only be accessed on a need-to-know basis.
Human resources: protecting confidentiality

More Related Content

What's hot

Training on professionalism in the workplace
Training on professionalism in the workplaceTraining on professionalism in the workplace
Training on professionalism in the workplaceHijratullah Tahir
 
Employee termination-laws-in-malaysia
Employee termination-laws-in-malaysiaEmployee termination-laws-in-malaysia
Employee termination-laws-in-malaysiaWomenBizSENSE
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Procedural due process
Procedural due processProcedural due process
Procedural due processRoi Xcel
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityblutoothe
 
Art & Science Series - Misconduct 2017
Art & Science Series - Misconduct 2017Art & Science Series - Misconduct 2017
Art & Science Series - Misconduct 2017Azamri Dollah
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conductMoatasem Mabrouk
 
MBA760 Chapter 10
MBA760 Chapter 10MBA760 Chapter 10
MBA760 Chapter 10iDocs
 
Workplace Monitoring
Workplace MonitoringWorkplace Monitoring
Workplace MonitoringNikhil Jain
 
Employment Law Challenges of a Remote Workplace
Employment Law Challenges of a Remote WorkplaceEmployment Law Challenges of a Remote Workplace
Employment Law Challenges of a Remote WorkplaceParsons Behle & Latimer
 
The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...
The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...
The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...PoL Sangalang
 
Employment law in the workplace
Employment law in the workplaceEmployment law in the workplace
Employment law in the workplaceKaty Morgan Smith
 
Professionalism presentation
Professionalism presentationProfessionalism presentation
Professionalism presentationl_polloc
 
Onboarding! Powerpoint Presentation
Onboarding! Powerpoint PresentationOnboarding! Powerpoint Presentation
Onboarding! Powerpoint PresentationDonna Morrison
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjohnzinn
 
Hr Policy / Employee Catalogue - A template for your company
Hr Policy / Employee Catalogue - A template for your companyHr Policy / Employee Catalogue - A template for your company
Hr Policy / Employee Catalogue - A template for your companyManeesh Garg
 

What's hot (20)

Training on professionalism in the workplace
Training on professionalism in the workplaceTraining on professionalism in the workplace
Training on professionalism in the workplace
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Employee termination-laws-in-malaysia
Employee termination-laws-in-malaysiaEmployee termination-laws-in-malaysia
Employee termination-laws-in-malaysia
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Procedural due process
Procedural due processProcedural due process
Procedural due process
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Art & Science Series - Misconduct 2017
Art & Science Series - Misconduct 2017Art & Science Series - Misconduct 2017
Art & Science Series - Misconduct 2017
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conduct
 
MBA760 Chapter 10
MBA760 Chapter 10MBA760 Chapter 10
MBA760 Chapter 10
 
Workplace Monitoring
Workplace MonitoringWorkplace Monitoring
Workplace Monitoring
 
Employment Law Challenges of a Remote Workplace
Employment Law Challenges of a Remote WorkplaceEmployment Law Challenges of a Remote Workplace
Employment Law Challenges of a Remote Workplace
 
Employee Handbook
Employee HandbookEmployee Handbook
Employee Handbook
 
Employee Induction[1]
Employee Induction[1]Employee Induction[1]
Employee Induction[1]
 
The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...
The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...
The Essentials of HR and Labor Law. October 15, 2014. Asian Institute of Mana...
 
Employment law in the workplace
Employment law in the workplaceEmployment law in the workplace
Employment law in the workplace
 
Professionalism presentation
Professionalism presentationProfessionalism presentation
Professionalism presentation
 
Onboarding! Powerpoint Presentation
Onboarding! Powerpoint PresentationOnboarding! Powerpoint Presentation
Onboarding! Powerpoint Presentation
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Hr Policy / Employee Catalogue - A template for your company
Hr Policy / Employee Catalogue - A template for your companyHr Policy / Employee Catalogue - A template for your company
Hr Policy / Employee Catalogue - A template for your company
 

Similar to Human resources: protecting confidentiality

Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
 
Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordellcoreycordell2
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowTrustArc
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
Why Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartTrustArc
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUser Vision
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesStephen Denning
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Software Integrity Group
 
Protecting your most valuable business asset
Protecting your most valuable business assetProtecting your most valuable business asset
Protecting your most valuable business assetMurray Procter
 
Human resources protecting confidentiality
Human resources protecting confidentialityHuman resources protecting confidentiality
Human resources protecting confidentialityTaylorCannon8
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
Chap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxChap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxDEVKOTA Devi Bhakta
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersSpain-Holiday.com
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining TrustTrustArc
 

Similar to Human resources: protecting confidentiality (20)

Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordell
 
CCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to KnowCCPA for CISOs: What You Need to Know
CCPA for CISOs: What You Need to Know
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Why Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital Experiences
 
UX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital ExperiencesUX & GDPR - Building Customer Trust with your Digital Experiences
UX & GDPR - Building Customer Trust with your Digital Experiences
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
Protecting your most valuable business asset
Protecting your most valuable business assetProtecting your most valuable business asset
Protecting your most valuable business asset
 
Human resources protecting confidentiality
Human resources protecting confidentialityHuman resources protecting confidentiality
Human resources protecting confidentiality
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Chap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptxChap1_remaining ethics for managementremaining.pptx
Chap1_remaining ethics for managementremaining.pptx
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 
2018 Client Briefing GDPR
2018 Client Briefing GDPR2018 Client Briefing GDPR
2018 Client Briefing GDPR
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 

More from KelbySchwender

Product Management: Building A Product Strategy
Product Management: Building A Product StrategyProduct Management: Building A Product Strategy
Product Management: Building A Product StrategyKelbySchwender
 
Strategic Planning Foundations
Strategic Planning FoundationsStrategic Planning Foundations
Strategic Planning FoundationsKelbySchwender
 
Developing A Competitive Strategy- BA 422W
Developing A Competitive Strategy- BA 422WDeveloping A Competitive Strategy- BA 422W
Developing A Competitive Strategy- BA 422WKelbySchwender
 
Designing Growth Strategies
Designing Growth StrategiesDesigning Growth Strategies
Designing Growth StrategiesKelbySchwender
 
The new rules of work power point
The new rules of work power pointThe new rules of work power point
The new rules of work power pointKelbySchwender
 
Purchasing foundations
Purchasing foundations Purchasing foundations
Purchasing foundations KelbySchwender
 
Implementing supply chain management
Implementing supply chain management Implementing supply chain management
Implementing supply chain management KelbySchwender
 
Business laws for managers
Business laws for managersBusiness laws for managers
Business laws for managersKelbySchwender
 
Lean six sigma foundations
Lean six sigma foundationsLean six sigma foundations
Lean six sigma foundationsKelbySchwender
 
Supply chain foundations
Supply chain foundationsSupply chain foundations
Supply chain foundationsKelbySchwender
 
Belittling Your Alternatives
Belittling Your AlternativesBelittling Your Alternatives
Belittling Your AlternativesKelbySchwender
 
Practicing Fairness As A Manager
Practicing Fairness As A ManagerPracticing Fairness As A Manager
Practicing Fairness As A ManagerKelbySchwender
 
Strategic Negotiation
Strategic Negotiation  Strategic Negotiation
Strategic Negotiation KelbySchwender
 
Negotiation foundations (x2)
Negotiation foundations (x2)  Negotiation foundations (x2)
Negotiation foundations (x2) KelbySchwender
 
Negotiation foundation
Negotiation foundation Negotiation foundation
Negotiation foundation KelbySchwender
 

More from KelbySchwender (16)

Product Management: Building A Product Strategy
Product Management: Building A Product StrategyProduct Management: Building A Product Strategy
Product Management: Building A Product Strategy
 
Strategic Planning Foundations
Strategic Planning FoundationsStrategic Planning Foundations
Strategic Planning Foundations
 
Developing A Competitive Strategy- BA 422W
Developing A Competitive Strategy- BA 422WDeveloping A Competitive Strategy- BA 422W
Developing A Competitive Strategy- BA 422W
 
Designing Growth Strategies
Designing Growth StrategiesDesigning Growth Strategies
Designing Growth Strategies
 
The new rules of work power point
The new rules of work power pointThe new rules of work power point
The new rules of work power point
 
Purchasing foundations
Purchasing foundations Purchasing foundations
Purchasing foundations
 
Implementing supply chain management
Implementing supply chain management Implementing supply chain management
Implementing supply chain management
 
Lean foundations
Lean foundations Lean foundations
Lean foundations
 
Business laws for managers
Business laws for managersBusiness laws for managers
Business laws for managers
 
Lean six sigma foundations
Lean six sigma foundationsLean six sigma foundations
Lean six sigma foundations
 
Supply chain foundations
Supply chain foundationsSupply chain foundations
Supply chain foundations
 
Belittling Your Alternatives
Belittling Your AlternativesBelittling Your Alternatives
Belittling Your Alternatives
 
Practicing Fairness As A Manager
Practicing Fairness As A ManagerPracticing Fairness As A Manager
Practicing Fairness As A Manager
 
Strategic Negotiation
Strategic Negotiation  Strategic Negotiation
Strategic Negotiation
 
Negotiation foundations (x2)
Negotiation foundations (x2)  Negotiation foundations (x2)
Negotiation foundations (x2)
 
Negotiation foundation
Negotiation foundation Negotiation foundation
Negotiation foundation
 

Recently uploaded

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 

Recently uploaded (20)

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 

Human resources: protecting confidentiality

  • 1. Human Resources: Protecting Confidentiality Created By: Kelby L. Schwender Business student, Penn State
  • 3. “When we talk about confidential information, it’s information that’s been provided to somebody in confidence, trusting that it will not be used or shared for reasons outside of the need to support a particular transaction unless it has permission to do so.”
  • 5. What is confidentiality? ● Confidentiality originates from the word confident, which implies trust. ● Types of information that must be protected: health care information, social security numbers, financial information, trade secrets, business strategies and more. ● Maintaining the broad range of confidential information at your company will be a never-ending challenge for leadership, management, employees and customers alike.
  • 6. Protect customers and clients ● Types of information YOU give out: financial information, credit information, health information, location information, websites visited, items purchased, sports teams, dating preferences and more. ● Your consent and the company’s ability to use your confidential information is outlined in some privacy or user agreement that you sign on a contract on their website or otherwise. ● It’s the responsibility of you and your company to do everything possible to protect the confidential information of your customers and clients.
  • 7. Protect employees ● Employees are required to provide their employers with a wide range of information. ○ Hiring process: employment history, criminal background, credit scores, the ability to be fit for duty, immigration status, prior salary information and even more. ● Companies should make sure employee information is distributed on a need-to-know basis only. ● As for protecting confidential customer information, you and your company must do a good job of protecting confidential employee information.
  • 8. Workplace Privacy ● The workplace has become a privacy battleground. ● Three places where privacy rights show up: ○ Workplace ○ Employee monitoring ○ Drug and Alcohol testing ● The idea of what remains private is constantly shifting and challenged with new technologies, a general transparency and archaic laws.
  • 9. Protect management information ● Failing to protect confidential management information can result in broken delas, unwanted press, judgement of criticism, failed investigations and outright sabotage. ● The biggest challenge is identifying and stopping those willing to share or leak confidential information for their personal gain. ● While confidential information may be leaked to boost share prices and make its participants rich in the process, it also gets the securities and exchange commission and other regulatory agencies excited as it violates insider trading laws. ● As with the other types of confidential protection, information should be limited on a need to know basis, rules must be established to control dissemination of information, the people must be trained on those rules and the leaks need to be plugged.
  • 10. Legal confidentiality ● There are three types of confidentiality rules the relate to attorney-client - (1) Attorney-client communication privilege (2) General ethical duty of confidentiality (3) Work-product doctrine. ● Both the conversation and the report remain confidential unless the lawyer decides to introduce some or all of it into evidence to show they (attorney and client) have a good faith defense to any claims that have been brought.
  • 11. Best Practices for Protecting Confidentiality
  • 12. Nondisclosure agreements ● A nondisclosure agreement (NDA) is an agreement between two parties that wish to share confidential information and make sure it’s not disclosed to third parties. ● NDAs are often used by deal makers, taking a, hey, you show me yours and I’ll show you mine approach to sharing information. ● An NDA can be a bilateral agreement or a one-way disclosure. ● Nondisclosure agreements and other confidentiality provisions may define obligations and legal remedies, but that is no guarantee somebody is gonna abide by them.
  • 13. Noncompetition agreements ● Some employee noncompete agreements include specifically identified competitors, agreed-upon damages the employee will pay if they breach the agreement, and the ability of the company to obtain injunctive relief. ● The courts will consider these six factors in determining whether to enforce a noncompete agreement: ○ Does the employer have a legitimate interest in restricting this employee’s competitive activity? What exactly is a competitive activity or information being protected? ○ Is the restriction reasonable given the circumstances? ○ Is the restriction reasonably limited in time and geography? ○ Will enforcing restriction harm the public interest? Will any aspect of public policy be affected if the agreement is enforced? ○ Was there reasonable consideration given in return for the agreement being signed? ○ When will the noncompetition restriction be triggered? ● Before using an employee noncompete agreement, consult with an attorney to understand the laws in your state.
  • 14. Trade secret protections ● To determine whether a piece of information is a trade secret, the Restatement of Torts, will generally examine these fix factors: ○ The extent to which the information is known outside the business ○ The extent to which its known by employees and others involved in the business ○ The extent of measures taken by the business to guard the secrecy of the information ○ The value of the information to the business and its competitors ○ The effort or money expended by the business in developing the information ○ The ease or difficulty with which the information could be properly acquired or duplicated by others ● Every company should make efforts to define and protect confidential trade secrets through written agreements and legal action when needed.
  • 15. Social media policies ● Numerous states have passed a law that restricts employers from requiring employees to disclose social media passwords; thus keeping employers our of employee personal business. ● Employers do have the right to limit what employees can say about confidential company information on social media. ● A typical social media policy will say that employees are required to maintain the confidentiality of company trade secrets and private or confidential information ○ Trade secrets may include: information regarding development of systems, processes, products, know-how, and technology. ● Do not post internal reports, policies, procedures, or other internal business-related confidential communications.
  • 16. Cybersecurity ● Cybersecurity is designed to protect confidential information from cyberattacks like malware, denial-of-service attacks, viruses, and hacks on a company’s website and computer networks. ● To prevent cybersecurity attacks, employers should consider taking these eight steps: ○ Adopt a cybersecurity culture ○ Restrict access to sensitive data, devices, or software where possible and create a password policy for all employees to follow ○ Stay on top of emerging cybersecurity threats with both technology solutions, and ongoing training ○ Automatically update all applications, programs, and networks with the latest security upgrades ○ Inform your employees about spear phishing attempts sent through social media and email ○ Backup data to a secure location ○ Have independent experts assess and test your systems to find their vulnerabilities ○ Have a plan to react when attacks and breaches occur ● Your company should have robust IT systems, well-crafted policies and procedures, and appropriate employee training.
  • 17. Document management ● Documents that contain confidential information can include paper, electronic storage such as metadata, system data, information held on computers, smartphones and other storage devices. ○ Emails records, texts, videos, and pictures are also considered documents. ● There are three aspects of document management including storage, retention limits and destruction. ○ There should be policies that define where to store confidential documents, who can have access to them and what password protection is required. ● Make sure documents, even when they’re stored, can only be accessed on a need-to-know basis.