Tags
Administration
Benefits
Communication
Communication Programs
Compensation
Conflict & Dispute Resolution
Developing & Coaching Others
Employee Satisfaction/Engagement
Executive Coaching
HR Metrics & Measurement
HR Outsourcing
HRIS/ERP
Human Resources Management
Internal Corporate Communications
Labor Relations
Labor Trends
Leadership
Leadership Training & Development
Leading Others
Legal
Management
Motivating
Motivation
Organizational Development
Pay Strategies
Performance Management
Present Trends
Recognition
Retention
Staffing
Staffing and Recruitment
Structure & Organization
Talent
The HR Practitioner
Training
Training and Development
Trends
U.S. Based Legal Issues
Vision, Values & Mission
Work-Life Programs & Employee Assistance Programs - EAP
Workforce Acquisition
Workforce Management
Workforce Planning
Workplace Regulations
corporate learning
employee engagement
interpersonal communications
leadership competencies
leadership development
legislation
News
Onboarding Best Practices
Good Guy = Bad Manager :: Bad Guy = Good Manager. Is it a Myth?
Five Interview Tips for Winning Your First $100K+ Job
Base Pay Increases Remain Steady in 2007, Mercer Survey Finds
Online Overload: The Perfect Candidates Are Out There - If You Can Find Them
Cartus Global Survey Shows Trend to Shorter-Term International Relocation Assignments
New Survey Indicates Majority Plan to Postpone Retirement
What do You Mean My Company’s A Stepping Stone?
Rewards, Vacation and Perks Are Passé; Canadians Care Most About Cash
Do’s and Don’ts of Offshoring
Error: No such template "/hrDesign/network_profileHeader"!
Blogs / Send feedback
Help us to understand what's happening?
Reason
It's a fake news story
It's misleading, offensive or inappropriate
It should not be published here
It is spam
Your comment
More information
Security Code
Employees Hold the Key to Data Security
Created by
- M. Lee Smith Publishers
Content
<font size="1">Excerpted from Colorado Employment Law Letter and written by an attorney at the law firm of Holland & Hart LLP <br /></font><br />It has become almost commonplace to hear that a government agency or private corporation has been the victim of a data security breach. As a result, hundreds of customers' or employees' personal data is at risk of being used for criminal purposes such as identity theft. Approximately 70 percent of those breaches are caused by an insider. In many cases, a laptop computer containing sensitive information is lost or stolen from a car or home. Other times, someone hacks into a system containing confidential information. <br /><br />In response to this steady drumbeat of breaches, a majority of states (39 and counting) have enacted "notification" laws. These laws are typically triggered when some combination of a person's unencrypted personal information (such as first and last name, address, social security number, and driver's license number) is compromised. The organization that suffered the breach must notify the individuals affected and, in some jurisdictions (e.g., New York), state agencies. A breach may trigger notification laws in the state where the company does business as well as the states in which residents have been or might be affected by the breach. <br /><br />In addition to state notification laws, there are industry-specific laws that regulate data privacy and security. For example, the Health Insurance Portability and Accountability Act requires covered entities to safeguard protected health information of patients, and the Gramm-Leach-Bliley Act requires financial institutions to protect consumers' financial information. Even those in unregulated industries often maintain sensitive personal information concerning their employees, including social security numbers and medical records (e.g., for workers' compensation claims), family and medical leave requests, and requests for accommodation. <br /><br />In light of this patchwork of laws and the ever-increasing threat of a data breach, there are some basic steps you can and should take to keep your data secure and prepare yourself for a breach. In developing safeguards for sensitive data, you should remember that employees are not only the most likely candidates for causing a security breach but also the best defense against incurring one in the first place. The following steps for safeguarding sensitive data are by no means exhaustive, but they're a good starting point in the process. <br /><u><br /><br />Step 1: Perform background checks</u><br />Thorough interviews and background checks are critical to minimize the likelihood of hiring someone who poses an undue security risk. Background checks may include, among other things, verifying employment history and checking references and criminal records. The failure to properly screen an applicant would almost certainly be used against a company if the person stole information and had a history of such misconduct that was easily discoverable. <br /><u><br /><br />Step 2: Develop appropriate policies</u><br />Most organizations have handbooks that are distributed to employees. Handbooks should be regularly reviewed and updated to ensure that appropriate data security policies exist and that they accurately reflect the current business model and technological advances. <br /><br />In developing or updating data security policies, it's important to involve the right players, which typically include a mix of people from management, HR, IT, and inside or outside counsel. Next, you should map out the key data in their possession so you can analyze the legal requirements for security, the chain of custody for information, who has access to it, who requires access to certain aspects of the data, and so on. Finally, the policy must be developed, tested, and implemented. <br /><br />Data security policies have many elements, and they will vary depending on the nature and size of your business. Still, there are some common themes. In addition to a critical incident response plan (discussed below), a data security policy might cover: <br />" use of laptops (at home or when traveling) and other portable devices; <br /><br />" password protection and encryption; <br /><br />" data backup and disposal procedures, including disposal rules promulgated by the Federal Trade Commission under the Fair and Accurate Credit Transactions Act; <br /><br />" data classification and access; <br /><br />" e-mail and blogging; and <br /><br />" limitations on downloading, printing, and transmitting information, especially to third parties, home computers, or other nonsecure recipients. <br /><br /><br /><u>Step 3: Create a critical-incident response plan</u><br />You should prepare a critical-incident response plan before an incident occurs. The plan should identify a person or position responsible for receiving and investigating reports concerning data breaches. In light of the potential legal liability associated with a breach ? which can involve criminal law enforcement, state or federal agencies, or an individual or group of potentially affected persons ? it's critical to involve inside or outside counsel as soon as possible to protect, to the extent allowed, communications related to the event under the attorney-client privilege. <br /><br /><br /><u>Step 4: Train and supervise employees</u><br />A data security policy that sits on a shelf gathering dust is not only unhelpful, but a person affected by a breach would surely argue that the company's failure to follow its own policy amounts to negligence. Therefore, it's critical to train and supervise employees so that they know and understand how to keep information secure and what to do if a breach occurs. Consider training employees on the policy during a routine orientation process and as part of an annual review or whenever the policies are revised or updated. <br /><br /><br /><u>Step 5: Review your contracts</u><br />If you contract with vendors or other third parties to handle or process transactions or other information, be sure to analyze what kind of safeguards they have in place to protect the confidential information to which they will have access. Employees should know what information they can and can't share with third parties. Another concern is what liability, if any, you or the vendors will have in the event of a breach. It's better to address those issues at the beginning of the relationship as opposed to after a breach has occurred. <br /><br /><br /><u>Bottom line</u><br />There's no way to completely protect against a data breach, but a few simple steps can go a long way in minimizing the risk and potentially avoiding a lawsuit if a breach does occur. <br /><br /><br /><br /><font size="1">For more information on data security, you can contact Mark Wiletsky at the firm of Holland & Hart LLP in Boulder. He can be reached at (303) 473-2864 or mbwiletsky@hollandhart.com. <br />Copyright 2008 M. Lee Smith Publishers LLC. This article is an excerpt from COLORADO EMPLOYMENT LAW LETTER. COLORADO EMPLOYMENT LAW LETTER is intended only to inform, but not to provide legal advice, and recipients should seek professional advice with regard to specific applications of the information.<br /><br /></font>
Copyright © 1999-2025 by
HR.com - Maximizing Human Potential
. All rights reserved.