Employment Security Breach

454 Words1 Page

Giving the fact, that more than 80 % of security breaches are provoked by current or former employees, every organization has to take appropriate measures to prevent, control, and counter such breaches. To prevent the employees of abusing the legitimate rights of accessing employer’s confidentiality and other sensitive information, relevant policies and procedures should be incorporated. There could be the three stage approach in reducing the personnel risks without infringing the rights:
Pre-employment screening- this is the first stage of employment security procedures, which should be implemented. At this stage, it is vital to check employee’s past, obtaining references and relevant documentation from previous employments. In many cases employers require enhanced vetting, so credit and/or DBS (formerly known as CRB) checks have to be obtained. Accordingly to official UK government website only the employers and relevant licensed bodies can request DBS checks. Normally the employer would request an application form and pass it to fill in to the …show more content…

At this stage there has to be an agreement between an employee and an employer at what level of confidentiality the employee would be operating, what level of information would be available for disposal and any physical restrictions (no go areas) applied. Such agreements and policies are usually based on “need to know, need to go bases” and often are supported by technical/electronic measures such as ID (RFID) cards, fingerprint scanners, passwords, encrypted communication devices and other. The good practice for the company is to gradually introduce a new employee to the sensitive information and to monitor its disposal. Once the new employee has gained company’s trust, he/she could be introduced to more sensitive

More about Employment Security Breach

Open Document