Featured Post
Waste en P3 Essay Example | Topics and Well Written Essays - 250 words
Squander en P3 - Essay Example To get the rate measure of time used to deliver the waste, it is determined by isolating the measure of ti...
Friday, October 4, 2019
Workforce Effectiveness Essay Example | Topics and Well Written Essays - 1250 words
Workforce Effectiveness - Essay Example Thus in doing his job, the human resources manager is supposed to be aware of why and how he/she is supposed to carry out his duties. In order to be effective the manager needs to be highly motivated, realistic and visionary among many other characteristics. In developing a security policy organization wise the human resources manager will have to address the issue of constraints on the behavior of workers as well as the constraints imposed on the adversaries by mechanisms such as locks, walls, doors, keys etc. In terms of systems, the security policy is supposed to address constraints related to functions and flow among them. Thus, constraints on access by adversaries and external systems including access to data and programs by un-authorized persons will have to be addressed. The communication system should be highly advanced to prevent illegal tapings on the organizations employees. This would be to protect not only the organizations employees but also the organizations information. This is because this being a call-center business the level of external communication will definitely have to be higher as compared to normal businesses. To safeguard the premises as well as the employee's physical safety, the human resources manager will have to setup a scanning process for all person... In doing this there will be a need for all visitors to explicitly, identify themselves. In addition, the visitors will have to be given visitors passes that can only open doors in the specific floor they are going. In addition to this, employees will have to be issued with gate passes that clearly identify who went where and how. To prevent software, information, or data theft all computers would have to be fitted with biometric mousse. This will limit the number of people who can use certain workstations. To top this up all employees should be scanned for the luggage's they bring in and out to prevent theft of office and organizational tools and information. 3) Parking safety: The parking system should be such that it is clearly visible from the monitoring center. Additionally all vehicles entering the employees parking should be officially registered with the security team and in addition all vehicles parked either at the employees parking or the visitors parking should always be checked to make sure no unwanted materials are smuggled inside the premises. 4) The central locking system: The central locking system should be well programmed to make sure that it gives details of all persons still not logged out from their workstations and floors at their supposed time of business closure. This will go a long way in preventing the actions of certain employees or visitors remaining in the offices at times when they are not supposed to be there. 5) Localized digital monitoring: To ensure maximum internal and external surveillance of the work place, there is need to set up a digital system of video surveillance. This system will have to be operational on a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.