SlideShare a Scribd company logo
Human Resources:
Protecting Confidentiality
BUSINESS STUDENT AT PENN STATE MONT ALTO
TAYLOR CANNON
Protect your company’s confidential information
 On the minds of business professionals:
Confidentiality
Privacy
Security
What is confidentiality?
 Involves numerous concepts/ different circumstances
 Different types of information must be protected
 Most is stolen because of poorly trained employees
 Insiders caused 60% of data breaches
 75% done with malicious intent
 25% were accidental
Protect Customers and Clients
 Obtaining consent to collect personal informational must be
reinforced
 Confidential information must be presented with confidence
 Create policies
Protect Employees
 Employees are required to give their employers with
information
 Employment history
 Criminal background
 Credit scores
 Immigration status
 Etc.
Workplace Privacy
 Privacy battleground
 State laws tend to govern privacy rules in the
workplace
 Constitutional right to privacy
 Employers tend to monitor employees
Protect Management Information
 Company executives are often
involved with:
 Strategic objectives
 Business deals
 Mergers and acquisitions
 Sales and financial reports
Failing to protect
confidential management
information can result in:
Broken deals
Unwanted press
Judgement of criticism
Failed investigations
Outright sabotage
Legal Confidentiality
 Three types of confidentiality rules
Attorney-client communication privilege
General ethical duty of confidentiality
Work-product doctrine
Nondisclosure Agreements
An agreement between two parties that
wish to share confidential information and
make sure it's not disclosed to third
parties.
Noncompetition Agreements
 Companies like to protect their confidential
information and strategic advantages using these
agreements.
 Governed by state regulations and court rulings
Trade Secret Protections
The law protects information such as a formula, a
pattern, compilation, program, device, method,
technique, process, drawing, data, or customer list that
derives independent economic value because it's not
generally known or readily available, and reasonable
efforts are made by the company to maintain secrecy
Social Media Policies
 Companies are concerned with employees leaking
confidential company information
 Restrict employees from using social media on employer
equipment
 Employers have the right to limit what they post on social
media
Cybersecurity
 Companies use applications to make sure they are
secure
 Designed to protect confidential information
 Security of a company’s entire computer network
and information system
 Maintain a virus free system
Document Management
 Can be either electronic stored or paper
 Three aspects of document management are:
Storage
Retention limits
Destruction
Bottomline
Important information of
companies and individuals must
be secured and protected.

More Related Content

What's hot

Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
EAI Information Systems
 
Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordell
coreycordell2
 
Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
Ideba
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
SameerShaik43
 
Nicholson's Presentation
Nicholson's PresentationNicholson's Presentation
Nicholson's Presentation
guest1e9cf4145
 
Nicholson Power Point Presentation
Nicholson Power Point PresentationNicholson Power Point Presentation
Nicholson Power Point Presentation
ruthykeefe
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability Flyer
CBIZ, Inc.
 
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
Paradigm Management Group
 
Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
Paige Rasid
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
Alistair Pugin
 
Fictional Law Firm
Fictional Law FirmFictional Law Firm
Fictional Law Firm
thaliapa
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
EAI Information Systems
 
PIPL - Data Protection & Security
PIPL - Data Protection & SecurityPIPL - Data Protection & Security
PIPL - Data Protection & Security
Dr. Sanjeev B Ahuja
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
Charles McNeil
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
Unified11
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
Sharing Slides Training
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
DATUM LLC
 
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceWEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
KSM Consulting
 
BV Company Overview Web
BV Company Overview WebBV Company Overview Web
BV Company Overview Web
jlbrewer
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
Corporater
 

What's hot (20)

Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Human resources protecting confidentiality cordell
Human resources protecting confidentiality cordellHuman resources protecting confidentiality cordell
Human resources protecting confidentiality cordell
 
Avoid the Audit Trap
Avoid the Audit TrapAvoid the Audit Trap
Avoid the Audit Trap
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
 
Nicholson's Presentation
Nicholson's PresentationNicholson's Presentation
Nicholson's Presentation
 
Nicholson Power Point Presentation
Nicholson Power Point PresentationNicholson Power Point Presentation
Nicholson Power Point Presentation
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability Flyer
 
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
 
Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
Fictional Law Firm
Fictional Law FirmFictional Law Firm
Fictional Law Firm
 
DOL Fiduciary Rule Infographic
DOL Fiduciary Rule InfographicDOL Fiduciary Rule Infographic
DOL Fiduciary Rule Infographic
 
PIPL - Data Protection & Security
PIPL - Data Protection & SecurityPIPL - Data Protection & Security
PIPL - Data Protection & Security
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceWEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
 
BV Company Overview Web
BV Company Overview WebBV Company Overview Web
BV Company Overview Web
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 

Similar to Human resources protecting confidentiality

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
KelbySchwender
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
privacytalks
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
Dunton Environmental
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Qualsys Ltd
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
devbhargav1
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
sharing notes123
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
comstarndt
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 
Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018
Jonathan Chilton
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
JagdeepSingh394
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
Spain-Holiday.com
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
FNian
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
guestfd062
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist Whitepaper
Serversys
 

Similar to Human resources protecting confidentiality (20)

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersGDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
 
Are you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist WhitepaperAre you GDPR Ready? Checklist Whitepaper
Are you GDPR Ready? Checklist Whitepaper
 

More from TaylorCannon8

Business Ethics for Sales Professionals
Business Ethics for Sales ProfessionalsBusiness Ethics for Sales Professionals
Business Ethics for Sales Professionals
TaylorCannon8
 
Implementing Supply Chain Management
Implementing Supply Chain ManagementImplementing Supply Chain Management
Implementing Supply Chain Management
TaylorCannon8
 
SAP ERP Essential Traning
SAP ERP Essential TraningSAP ERP Essential Traning
SAP ERP Essential Traning
TaylorCannon8
 
Purchasing Foundations
Purchasing FoundationsPurchasing Foundations
Purchasing Foundations
TaylorCannon8
 
Business law for managers
Business law for managersBusiness law for managers
Business law for managers
TaylorCannon8
 
Lean six sigma foundations
Lean six sigma foundationsLean six sigma foundations
Lean six sigma foundations
TaylorCannon8
 
Decision making strategies
Decision making strategiesDecision making strategies
Decision making strategies
TaylorCannon8
 
Linkedin learning highlights
Linkedin learning highlightsLinkedin learning highlights
Linkedin learning highlights
TaylorCannon8
 
Lynda negotiating your job offer
Lynda  negotiating your job offerLynda  negotiating your job offer
Lynda negotiating your job offer
TaylorCannon8
 
Lynda strategic negotiation
Lynda  strategic negotiationLynda  strategic negotiation
Lynda strategic negotiation
TaylorCannon8
 
Lynda practicing fairness as a manager
Lynda  practicing fairness as a managerLynda  practicing fairness as a manager
Lynda practicing fairness as a manager
TaylorCannon8
 
Lynda creating your personal brand
Lynda  creating your personal brandLynda  creating your personal brand
Lynda creating your personal brand
TaylorCannon8
 
Negotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad CopNegotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad Cop
TaylorCannon8
 
Lynda -Negotiation Foundations
Lynda -Negotiation FoundationsLynda -Negotiation Foundations
Lynda -Negotiation Foundations
TaylorCannon8
 

More from TaylorCannon8 (14)

Business Ethics for Sales Professionals
Business Ethics for Sales ProfessionalsBusiness Ethics for Sales Professionals
Business Ethics for Sales Professionals
 
Implementing Supply Chain Management
Implementing Supply Chain ManagementImplementing Supply Chain Management
Implementing Supply Chain Management
 
SAP ERP Essential Traning
SAP ERP Essential TraningSAP ERP Essential Traning
SAP ERP Essential Traning
 
Purchasing Foundations
Purchasing FoundationsPurchasing Foundations
Purchasing Foundations
 
Business law for managers
Business law for managersBusiness law for managers
Business law for managers
 
Lean six sigma foundations
Lean six sigma foundationsLean six sigma foundations
Lean six sigma foundations
 
Decision making strategies
Decision making strategiesDecision making strategies
Decision making strategies
 
Linkedin learning highlights
Linkedin learning highlightsLinkedin learning highlights
Linkedin learning highlights
 
Lynda negotiating your job offer
Lynda  negotiating your job offerLynda  negotiating your job offer
Lynda negotiating your job offer
 
Lynda strategic negotiation
Lynda  strategic negotiationLynda  strategic negotiation
Lynda strategic negotiation
 
Lynda practicing fairness as a manager
Lynda  practicing fairness as a managerLynda  practicing fairness as a manager
Lynda practicing fairness as a manager
 
Lynda creating your personal brand
Lynda  creating your personal brandLynda  creating your personal brand
Lynda creating your personal brand
 
Negotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad CopNegotiation Tactic- Good Cop/ Bad Cop
Negotiation Tactic- Good Cop/ Bad Cop
 
Lynda -Negotiation Foundations
Lynda -Negotiation FoundationsLynda -Negotiation Foundations
Lynda -Negotiation Foundations
 

Recently uploaded

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 

Recently uploaded (20)

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 

Human resources protecting confidentiality

  • 1. Human Resources: Protecting Confidentiality BUSINESS STUDENT AT PENN STATE MONT ALTO TAYLOR CANNON
  • 2. Protect your company’s confidential information  On the minds of business professionals: Confidentiality Privacy Security
  • 3. What is confidentiality?  Involves numerous concepts/ different circumstances  Different types of information must be protected  Most is stolen because of poorly trained employees  Insiders caused 60% of data breaches  75% done with malicious intent  25% were accidental
  • 4. Protect Customers and Clients  Obtaining consent to collect personal informational must be reinforced  Confidential information must be presented with confidence  Create policies
  • 5. Protect Employees  Employees are required to give their employers with information  Employment history  Criminal background  Credit scores  Immigration status  Etc.
  • 6. Workplace Privacy  Privacy battleground  State laws tend to govern privacy rules in the workplace  Constitutional right to privacy  Employers tend to monitor employees
  • 7. Protect Management Information  Company executives are often involved with:  Strategic objectives  Business deals  Mergers and acquisitions  Sales and financial reports Failing to protect confidential management information can result in: Broken deals Unwanted press Judgement of criticism Failed investigations Outright sabotage
  • 8. Legal Confidentiality  Three types of confidentiality rules Attorney-client communication privilege General ethical duty of confidentiality Work-product doctrine
  • 9. Nondisclosure Agreements An agreement between two parties that wish to share confidential information and make sure it's not disclosed to third parties.
  • 10. Noncompetition Agreements  Companies like to protect their confidential information and strategic advantages using these agreements.  Governed by state regulations and court rulings
  • 11. Trade Secret Protections The law protects information such as a formula, a pattern, compilation, program, device, method, technique, process, drawing, data, or customer list that derives independent economic value because it's not generally known or readily available, and reasonable efforts are made by the company to maintain secrecy
  • 12. Social Media Policies  Companies are concerned with employees leaking confidential company information  Restrict employees from using social media on employer equipment  Employers have the right to limit what they post on social media
  • 13. Cybersecurity  Companies use applications to make sure they are secure  Designed to protect confidential information  Security of a company’s entire computer network and information system  Maintain a virus free system
  • 14. Document Management  Can be either electronic stored or paper  Three aspects of document management are: Storage Retention limits Destruction
  • 15. Bottomline Important information of companies and individuals must be secured and protected.