No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

How Secure is Your HR Data?

by Ron Arden
November 23, 2015
in Cybersecurity, HR Compliance
open padlock on red circuit board background

When you think about an HR Department, you think about potential applicants, the interview process, an information repository for all employees or your own engagement with the company. Of course during the first week of November you consider HR to be the keeper of all things benefits — open enrollment and all of the paperwork that entails. The HR Department must keep all of this information confidential while also handling the external client roster, circulation of company policies and a wide array of interoffice communications. This poses a unique security challenge for any organization, regardless of size, which needs to prevent unauthorized internal users from accessing employee information, including PII (personally identifiable information), but needs to share employee information with external benefits providers and accounting. The environment calls for a solution with the flexibility to protect against insider threats and destroy files automatically, while enabling secure sharing.

Where to start?

Most if not all of the information going in and out of the HR department needs some level of security, and so the first task is to inventory and classify the types of data the department handles. Two tiers work best, with tier 1 being the highest and warranting automatic security policy and encryption on creation. Tier 1 data includes intellectual property, executive compensation, Board of Director files, customer lists, financial data and employee personnel files. Tier 2 includes policy manuals, interoffice correspondence and pre-release public files.

HR Data Security – 5 Examples

We take a look at five distinct functions of an HR department to evaluate the types of policy controls a security solution needs to support the specific access and permission requirements for each type of information.

1. Encrypting received resumes

Resumes from qualified candidates are intellectual property and highly valuable to a company. Just think of the detriment of a leaked resume to a competitor. Once received, resumes require an automatic security policy and encryption upon saving the file to a server, HR information system or document repository. Because secure sharing may be required to evaluate these potential employees, the policy defines access controls for HR personnel and select executives and managers. Any document containing employee PII should be limited to HR access only to prevent unauthorized internal users from accessing sensitive employee information.

2. Locking down files when an employee gives notice

Once an employee gives notice, it is vital to immediately lock down access to any classified information the employee could use. An automatic destruction policy can be implemented for highly confidential information as well. When an employee gives notice, their files can be destroyed or disabled.

3. Maintaining Client Confidentiality

Outside of employee relations, HR handles client information and both external and internal financial information. Client contracts mandate confidentiality of the information shared with its contractors and third-party agencies. Policies must be implemented to allow access of specific files and information while maintaining the highest level of security.

4. Protecting Intellectual Property

A company’s business depends on the product or service it sells, which all traces back to the intelligence used to design the product or service. If this information is compromised, so is the business.  Employees need to collaborate on projects while in the office and travelling, so it is best to set a travelling or off-line policy that limits copy and paste depending on the viewer and watermarks pages when viewed.  This provides security and visibility for shared information.

5. Circulating Policy Manuals In-House Only

Everyone in the company needs to access employee rules and regulations so this is considered “tier 2” information, requiring less protection for more visibility.  Best practices for securing this type of data are an employee discretionary security policy and encryption.

Remember, your HR department is the front door to your organization. Implementing and enforcing security policies in this department will guard the most important information in your business.


Tags: Communications ManagementData Governance
Previous Post

How to Draft an FLSA-Compliant Settlement Agreement, Part 3

Next Post

Improving the I-9 Process, Wherever Your Employees May Be

Ron Arden

Ron Arden

Ron Arden is Vice President of Fasoo, Inc. and has over 30 years of strategic planning, marketing, sales, business development, consulting and technical experience in the information technology and security industries.  Prior to Fasoo, he was Vice President of Strategy and Marketing at eDocument Sciences, LLC, where he drove document security, cloud and collaboration strategies and solutions.  Ron has held executive, management and technical positions at numerous organizations, including IKON Office Solutions, Digital Equipment Corporation and Wang Laboratories. Throughout his career, Ron has participated in industry forums, speaking engagements and written articles for industry publications. He holds a B.S. in Electrical Engineering from the University of New Hampshire.

Related Posts

data governance sorting concept

What Compliance Leaders Need to Know Ahead of Crucial DOJ Data Security Program Deadline

by Townsend Bourne
September 8, 2025

Civil, criminal penalties await companies not ready to comply with new initiative

data privacy leader concept

Who’s Minding Your Data? The Case for Dedicated Privacy Leadership

by Daniel Barber
June 16, 2025

As state privacy laws multiply and AI introduces new vulnerabilities, the question isn't whether you need dedicated privacy expertise —...

abstract obscured data colorful

NIST’s Differential Privacy Guidelines: 6 Critical Areas for Secure Implementation

by Michelle Drolet
June 16, 2025

Standard de-identification methods remain vulnerable to sophisticated attacks, but differential privacy offers mathematical guarantees that scale with emerging threats

doj building sign with flags

‘Reasonable Steps’: What the DOJ Expects From Your Bulk Data Transfer Compliance Program

by Alexandra P. Moylan, Alisa L. Chestler and Michael J. Halaiko
May 5, 2025

Sample provisions offer blueprint for compliant data brokerage with foreign entities

Next Post
remote work

Improving the I-9 Process, Wherever Your Employees May Be

reminder to speak up
No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights