Difference between revisions of "ISO:HR Security"

From Hornbill
Jump to navigation Jump to search
(Created page with "== HR Security == Recruitment of new staff can only be undertaken with the approval of the Chief Technical Officer. This approval may be recorded in minutes or by e-mail. Ea...")
 
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
This document can now be found at its new location in the [https://docs.hornbill.com/hornbill-cloud/iso/hr-security/ Hornbill Document Library].
 +
 +
[[file:hornbill-document-library.png|Hornbill Cloud|link=https://docs.hornbill.com/hornbill-cloud/iso/hr-security/]]
 +
 +
<!--
 +
Hornbill understands that our employees are not only our biggest assets but have the potential to be our biggest threats. It is well documented that the majority of data breaches occur from within a business either intentionally or by accident. We therefore take recruitment, vetting and should it be needed, disciplinary and leaving very seriously to reduce these risks.  Below are the key points from our HR polices that ensure employees are vetted, trained and nurtured in best practices to ensure data security. 
 +
 
== HR Security ==  
 
== HR Security ==  
Recruitment of new staff can only be undertaken with the approval of the Chief Technical Officer. This approval may be recorded in minutes or by e-mail.
+
Recruitment of new staff can only be undertaken with the approval of the Chief Technical Officer.  
  
Each position has a Job Description which includes any relevant security requirements. Master copies of Job Descriptions are held by the HR Department.
+
This approval may be recorded in minutes or by e-mail.  Each position has a Job Description which includes any relevant security requirements. Master copies of Job Descriptions are held by the HR Department.  
  
 
New positions are advertised or a suitable agency appointed dependent upon the role being considered.
 
New positions are advertised or a suitable agency appointed dependent upon the role being considered.
Line 14: Line 21:
 
Should these checks indicate an issue then the HR Dept reviews the circumstances with the Chief Technical Officer and whoever else is relevant prior to determining a suitable course of action. Records of the vetting are retained by the HR Dept.
 
Should these checks indicate an issue then the HR Dept reviews the circumstances with the Chief Technical Officer and whoever else is relevant prior to determining a suitable course of action. Records of the vetting are retained by the HR Dept.
  
A New Starter Checklist is completed during the induction process and is retained by the HR Dept during the period of employment.
+
A New Starter Checklist is completed during the induction process and is retained by the HR Dept during the period of employment.  
 +
 
 +
All employees must undertake a security screening to BS7858:2012 standard. This includes, Proof of identity, Proof of residence, References,  A copy of their police record, A statement of financial status, A history of all employment (going back five years or to 12 years’ old, whichever occurs first)
  
 
Employees are provided with and sign a Contract of Employment which includes a confidentiality agreement covering the various responsibilities and actions required of signatories in order to avoid unauthorized information disclosure, the permitted use of the information, the signatories’ rights in respect of that information and the required actions on termination of the agreement. A copy of the signed contract is retained within the employee personnel file.
 
Employees are provided with and sign a Contract of Employment which includes a confidentiality agreement covering the various responsibilities and actions required of signatories in order to avoid unauthorized information disclosure, the permitted use of the information, the signatories’ rights in respect of that information and the required actions on termination of the agreement. A copy of the signed contract is retained within the employee personnel file.
Line 31: Line 40:
  
 
The Leavers checklist includes a list of items to be returned (such as keys, building fob, credit card etc).
 
The Leavers checklist includes a list of items to be returned (such as keys, building fob, credit card etc).
 +
-->
 +
[[Category:HDOC]]
 +
<!-- hornbill-cloud/iso/hr-security -->

Latest revision as of 17:16, 11 September 2023

This document can now be found at its new location in the Hornbill Document Library.

Hornbill Cloud