Sharing one of the HRIS lectures designed by our Unit Coordinator and Lecturer: Dr Shah Miah from what we have learned through our Master Program. Greatly appreciated of our teachers guidance and support.
"Hopefully, the readers can use this resource for educational purposes and in a good way"
10. Multinational employer
New idea – centralised database for HR related data
Business case template check-box:
“Meets HR Data Privacy Requirements”
Could not be marked because of lack of relevant
documentation
Project denied
Data transfer privacy requirements
Risk associated with non-compliance
(Gracen 2008, p.38)
HR Data Privacy and Project Metrics
20. Effectiveness and efficiency depends on integrity and
accuracy of data
DATA INTEGRITY
21. HR data management issues
Siloed systems
Inaccurate or outdated information
Inefficient means of data sharing and transmission
Resulting in
Delays in decision making
Missed opportunities
Preventing movement to strategic role
Costs millions of dollars each year
HR Data Availability, Quality and
Integrity (Sopoci & Keebler 2005)
22. Government reporting requirements
Basic organisational efficiency
Credibility of HR function
Costs
Business critical issues (Sopoci & Keebler 2005)
23. Automation
Fragmented systems
Mix of manual and automated systems and processes
Manual override
Bad data
Outdated data
Why data becomes bad (Sopoci & Keebler 2005)
24. Best opportunity to fix data
Identify information needed
Don’t assume paper based data is accurate – check
Data audits
Conversions (Sopoci & Keebler 2005)
25. Develop an overall HR technology strategy
Master system into which all HR data is entered and
resides (e.g. SAP HCM)
Keeping it clean (Sopoci & Keebler 2005)
26. Data integrity results in efficiency, effectiveness and
strategic opportunities.
Protecting the privacy concerns of individuals requires
a combination of law, processes, procedures and
technology.
Organisations must ensure:
Collection, maintenance, use and dissemination of personal
information is necessary, lawful, current, and accurate
Maintenance of high ethical standards
(Wong & Thite 2009, p.404)
Conclusion
27. Over the past 3 years, Monster.com has had breaches in
security.
In your discussion groups search for information about this
security breach
Prepare a short presentation on this and include some
analysis of the data integrity implications.
Web based exercise