It is critical to consider security and privacy as essential elements in the design, development, and management of an HRIS. This is due to the fact that an HRIS must safeguard employees' privacy while still guaranteeing that data is correct and information is available to authorized parties. When designing the system, be sure that it requires user names and passwords for access and that it retains logs of access requests to track who has viewed which files. Such systems often have an access level for viewing data, an access level for modifying data, and an access level for changing database structures. Change control procedures ensure that information is only updated when necessary, and change logs record the history of such activities.
Comments
Leave a comment