Question 1.
Data security has raised concerns, and when the identity data is stolen and exposed to the public, a company may have a bad image. Therefore, companies must be in the frontline in protecting its computerized information to avoid leaking (Li, Lou & Ren 2010). It will be significant to notify all the employees that a software will be used in checking their emails for security purposes. Using the software to check emails will help in preventing the leakage of the information.
Question 2:
The essential elements of a data security policy for a bank should include security accountability, network service policy, and system policy, incident handling policy, event handling policy, behavior policy and security training (Sood, 2012).
Question 3:
When employing a new employee to the company, management must critically scrutinize to know why the new employee is aspiring to join the company (Sood, 2012). New employees may have an intention of getting access to the company’s data. Therefore, the company should monitor the activity of the new employee. On the other hand, when an employee is leaving the company, it is significant to change all passwords and the way the computerized information is performed to control leakage or stealing of the information.
Dealing with Workplace Bullying
Question 1
Bullying is a common phenomenon in the workplace (Einarsen et al., 2010). Based on my work experiences, I have experienced various forms of bullying. Firstly, when I was working in a factory as a clerk, my female boss was very strict on me, not because I was not performing but because I had smarter qualifications than her. She exerted pressure on me to finish more work than others who used to work at the same level. The other example of bullying included giggling by employees to the production supervisor. Most employees could critique the supervisor's mode of dressing, and they echoed her whenever she gave directions. However, the company later introduced the anti-bullying policies, and such behaviors came to an end.
Question
HR professionals are required to provide guidelines on bullying in the workplace can be combated (Glasø, Vie & Hoel, 2010). I would provide three specific policies to combat bullying if I were an HR professional. Firstly, I will propose that there be severe punishments for those who bully others. Severe punishments should be imposed to any suspect regardless of the position. The problem has always been that those who are in authority think that they cannot be punished.
References
Einarsen, S., N. Hoel, H., N., Zapf, D., & Cooper, C. (Eds.). (2010). Bullying and harassments in the workplaces: Development, in theory, research, and practice. CRC Press.
Glasø, L., Vie, L., & Hoel, H., K. (2010). Bullying in the workplaces. Risks in Businesses: Psychological, Physical and Financial Costs of High-Risk Behaviors in Organization, 351.
Li, M., Lou, W., & Ren, K. (2010). Data securities and privacies in the wireless body area network. Wireless Communication, IEEE, 17(1), 51-58.
Sood, S. K. (2012). The combined approaches to ensuring data security in cloud computing. Journal of Network and Computer Application, 35(6), 1831-1838.