Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Human resources security

Process Security policy, organization of security, asset management, human resource security, ph ical and environmoiral security, access control, communication/operation/business management, incident managem t, system acquisition, and maintenance management. [Pg.860]

The safety professional must research and develop an understanding of how an organization operates, its motivations, and reason for being. They must have an appreciation of what must be done to reach the organizational goals and objectives. While what a safety professional does is crucial (at least to the safety professional), other professional disciplines (human resources, security, quality control, sales, operations, etc.) feel the same about their... [Pg.17]

The uniqueness of user IDs (requirement 2) can be secured by using unique personal IDs, which is a common practice in many firms. The administration is normally done by the responsible human resources organization. To maintain system integrity, the IDs are not reused once a person leaves the company this would eventually contradict the requirement of uniqueness. [Pg.10]

Database Security. At the level of the EDMS application, access is governed by unique user ID and password combinations. Here, database security serves as the guard at the door who requests to see your badge before allowing entry. The system administrator maintains an updated register of valid IDs and passwords for gaining access to the system linked, typically, to the current list of employees maintained by human resources. ... [Pg.2557]

File Security. While it may be that a specific class of user has access to the entire contents of a folder, it may just as well occur that members of that class have access to all documents in the folder with some exception. For example. Human Resources employees may have access to documents containing the terms of employment for all employees except those in Human Resources itself. Security must be applied to these particular documents in the EDMS such that they cannot be viewed by Human Resources personnel. [Pg.2557]

Human resources, safety, and security are a continuous process—no beginning, no end, just progress as the process moves forward ... [Pg.239]

Security of data has become an important consideration. With the expanded use of the Internet, unauthorized individuals may gain access to private and confidential information found in safety software and applications. It is illegal to make some personal information available. Examples are human resource information, medical information, and other data that may link to accident and injury or illness cases. One kind of security involves keeping secure data and information on computers that do not link to other applications. Another kind of security involves encryption techniques for secure data and information. When data and applications reside in other locations, the communicafion interfaces must be secure along with the remote computer systems themselves. [Pg.551]

In addition to the product quality accreditation, certification programs such as worldwide responsible accredited production (WRAP) can be used to implement international workplace standards by taking into consideration local laws and workplace regulations human resource management health and safety and environmental practices legal compliance including import and export and custom compliance and security standards (WRAP, 2014). [Pg.115]

When victims were questioned as to why they did not report attacks, 40 percent stated they believed the event was minor or a private matter. An additional 27 percent did not report the incident to the police because they reported it internally to company representatives. These representatives included security officers, human resource department personnel, or their manager (Bachman, 1994). [Pg.289]

Monitor visitors—Do not let visitors inside the secure perimeter without an escort. Vet contractors and support personnel. Restrict access to sensitive areas, such as server rooms or human resources records. Staff should be encouraged to query unescorted strangers in secure areas Get Safe Online, 2011). [Pg.99]

Personnel cost - Human resources cost including any training that is required to operate the security equipment... [Pg.414]

For both security and domestic political reasons, neither the United States nor the Soviet Union can unilaterally entirely divest itself of chemical weapons. Both have an interest in arriving at a negotiated ban on chemical weapons, because of their perceptions of the other s capabilities, and because a chemical arms race can only prove expensive in financial, technical and human resources. Both also have a real interest in preventing the spread of chemical weapons. The tendency for superpower tensions to materialise in the form of proxy conflicts, and the frequency with which Soviet and US forces become involved in conflicts with other countries out of area increase the risk that they will find themselves on the receiving end of a chemical attack. [Pg.220]


See other pages where Human resources security is mentioned: [Pg.1877]    [Pg.8]    [Pg.54]    [Pg.54]    [Pg.1877]    [Pg.8]    [Pg.54]    [Pg.54]    [Pg.143]    [Pg.434]    [Pg.174]    [Pg.58]    [Pg.58]    [Pg.288]    [Pg.88]    [Pg.335]    [Pg.862]    [Pg.99]    [Pg.279]    [Pg.241]    [Pg.224]    [Pg.1097]    [Pg.1099]    [Pg.272]    [Pg.277]    [Pg.440]    [Pg.169]    [Pg.136]    [Pg.1]    [Pg.199]    [Pg.48]    [Pg.175]    [Pg.51]    [Pg.56]    [Pg.53]    [Pg.412]    [Pg.10]    [Pg.308]    [Pg.689]    [Pg.12]    [Pg.294]    [Pg.314]   
See also in sourсe #XX -- [ Pg.52 ]




SEARCH



Human resources

Security resources

© 2024 chempedia.info