Kavanagh3e LN16 Styled 15
Kavanagh3e LN16 Styled 15
Kavanagh3e LN16 Styled 15
16
CHAPTER OBJECTIVES
After completing this chapter, you should be able to describe the following:
INTRODUCTION
Information privacy and security are particularly important issues for HRIS because
confidential data about employees, such as Social Security numbers, medical data,
bank account data, salaries, domestic partner benefits, employment test scores, and
performance evaluations.
1
Organizations also need to carefully consider the internal and external threats to
this data and develop strong information security plans and procedures to protect this
Doing this is much more complex than it was 30 years ago. Consider that most
computers at that time were mainframes that were secured in a central physical
location, with very few HR staff having access to them. If an HR staff member had
access to the mainframe, it was through “dumb” terminals with limited functionalities,
and access was easily restricted through physical access and passwords. Due to this
being exploited.
During those days, information security was considered to be a process that was
Physical theft of equipment, espionage, and sabotage were considered the primary
threats.
wide systems.
There is a growing concern about the extent to which these systems permit users
(both inside and outside of the organization) to access a wide array of personal
information about employees. As a result, employees may perceive that if these data
are accessed by others, the information contained in their employment files may
2
Recent research suggests that this concern may be well founded. For example, one
report indicated that over 500 million organizational records have been breached since
2005, and there has been a rise in the theft of employment data (Privacy Rights
Clearinghouse, 2010).
In view of the growing concern about identity theft and the security of
employment information in HRIS, a number of states (e.g., AK, CA, FL, HI, IL, LA,
MO, NY, SC, and WA) passed privacy laws requiring organizations to adopt
Despite these new laws, results of surveys revealed that 43% of businesses stated
that they did not put any new security solutions in place to prevent the inadvertent
release or access to employee data, and almost half did not change any internal
The cost of these data breaches can be large. For example, the average cost of a
data breach has increased to almost $7 million per firm. In addition, a recent study by
McAfee estimated that global economic losses due to information security breaches
Software vendors such as Oracle, are aware of the potential for security breaches
and offer multiple security models (e.g., Standard HRIS Security and Security Groups
Enabled Security) that enable an administrator to set up HRIS security specifically for
an organization. This means that the software allows companies to determine the kind
EMPLOYEE PRIVACY
3
The U.S. Fair Labor Standards Act of 1938 requires employers to maintain basic
occupation, pay, and hours worked. However, the increased use of HRIS to store
these data has prompted concerns about the degree to which these systems have the
Information privacy has been defined as the “degree to which individuals have
control over the collection, storage, access, and release of personal data.”
they fear that these systems may allow unauthorized access to their private
information. For example, employees may perceive that if users have access to their
Social Security numbers or bank data, they will experience identity theft. In fact,
some reports indicate that identity theft is the primary consequence of the breach of
have access to medical data or domestic partner benefits, then employees feel that
they will experience embarrassment or loss of job opportunities (e.g., promotions, pay
Some research also indicated that employees were more likely to perceive an HRIS
as invasive of privacy when they were unable to control access to their personal data,
and information was accessed by users outside the organization than those inside the
organization.
Results of other research revealed that the use of an HRIS was perceived as
invasive of privacy when (a) supervisors were able to access information in employee
records, (b) the same data were used for employment rather than HR planning
4
decisions, and (c) the employees did not have the ability to check the accuracy of the
systems allow for the unauthorized disclosure of information about them to others.
For example, research revealed that 70% of employers regularly disclose employment
data to creditors, 47% give information to landlords, and 19% disclose employee data
to charitable organizations.
In addition, some reports indicated that organizations regularly sell data collected
employees when they disclose information within or outside the organization (Society
inaccurate or outdated information about them. Not surprisingly, individuals are often
unaware that data in these systems are inaccurate, and many organizations do not give
inaccurate data, and 24% do not give them the opportunity to correct their records. In
addition, research by Stone et al. (2001) found that individuals were more likely to
perceive that their privacy had been invaded when they were not able to check the
accuracy of data in an HRIS system than when they were allowed to check the
accuracy of data. Thus, employee concerns about the degree to which inaccurate data
5
may unfairly stigmatize them or affect their outcomes in organizations appear quite
justified.
Stigmatization Problems
Employee are often uneasy about the use of HRIS, especially when they feel that
employment.
Google+).
For instance, organizations now use SNWS to collect information about job
affiliation, and personal interests. Estimates indicate that between 20% and 40% of
employers now scan SNWS to gather data about job applicants, and 75% of recruiters
decisions.
access, (b) unauthorized release, (c) data accuracy, and (d) use of data to stigmatize
6
The complexity of the networked environment in which HR data is captured, stored,
and utilized means that personnel transactions and information processing are
increasingly more vulnerable to security threats and risks than ever before. Therefore,
the traditional CIA model of information security does not suffice. The National
(NSTISSC) security model, also known as the McCumber Cube, provides a more
approach widely used in information security. It examines not only the characteristics
of the information to be protected but also the context of the information state. The
Cube allows an analyst to identify the information flows within an HRIS, view it for
important security-relevant factors, and then map the findings to the cube. The cube
has three dimensions. If extrapolated, the three dimensions of each axis become a 3 ×
3 × 3 cube with 27 cells representing areas that must be addressed to secure a modern-
SECURITY THREATS
7
What kind of threats are our organizational security practices protecting us from? In
security, it is important to “know your enemy.” The following are common security
threats:
Threat Sources
8
o Natural disasters: Typical forms of natural disasters are floods,
earthquakes, fires, and lightning strikes, which destroy or disrupt
computing facilities and information flow.
Types of Threats.
o Theft: The value of information can be much higher than the price of
hardware and software. With contemporary advances in technological
developments, a relatively small computer chip (e.g., a USB device) can
easily store over 100 GB of data. For example, the State of Hawaii’s HR
department had medical records stolen when doctors’ offices of two
doctors servicing workers compensation claims were burglarized.
9
o Phishing: Victims usually receive e-mail messages that appear to come
from an authentic source with which the victim does business. The
official appearance of the message and the website often fool victims into
giving out confidential information. According to Gartner, the estimated
cost of phishing is around $2 billion.
Software Threats
o Worms are, in some ways, similar to viruses since they can replicate
themselves. However, unlike viruses that require the spreading of an
infected file, worms such as Code Red, Slammer, and MyDoom can
spread by themselves without attaching to files.
10
Blended threats: These threats propagate both as viruses and worms.
They can also post themselves on websites for people to download
unwittingly.
employee data. There are two mechanisms though which this can occur: fair
11
However, one state, California, has recently passed a law that protects the privacy
Constitutions, 2012).
in the countries in which they operate. The challenge for organizations is that every
your organization will need to be familiar with all the applicable laws in each country
Even though there are few laws governing the storage, use, and dissemination of
perceive that HRIS invades their privacy by establishing fair information management
information to data which are job related, control unauthorized access to information
in HRIS, adopt reasonable procedures for assuring that data are accurate and timely,
security practices.
12
“Security is a process, not a product” (Schneier, 2000). This statement alludes to
the nature of information security. That is, information security is not predominantly a
technical issue; it is more of a management issue. It is easy to see why, at times, there
is a major focus on technology. Technology is visible, and there are many things that
we can say about security technologies. Management can seem more abstract.
There are fewer general principles to discuss, and most of these cannot be put into
practice without well-defined and complex processes. But the management issues are
actually often complex and a focused both on behavioral information policies as well
13
Many breaches occur when users are not consciously aware of what they are doing.
Unconscious behavior can defeat the best efforts of security experts, meaning all of
the security protocols in the world are powerless in the face of a stressed-out worker.
from user action, such as clicking a link or being tricked into installing malware.
Several best practices have been proposed to ensure that employee data is secured
Although there is no question that all organizations need to be aware of HRIS security
organization may face specific laws regarding storage, transmission, and transfer of
data based on the areas in which it operates. This may limit the flow of employee data
across borders and may make the HRIS more complex or may require the
14
CHAPTER SUMMARY
Although it is clear that HRIS have numerous benefits in organizations, this chapter
considers some recent issues associated with their use, including employee privacy
and information security. In particular, the chapter considers (a) practices that may
information security, (c) the security threats faced by organizations, (d) the
practices, and (e) cloud computing. Throughout the chapter, we argued that
policies that can be used to protect individual privacy and implement information
15