Difference between revisions of "ISO:HR Security"

From Hornbill
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 +
This document can now be found at its new location in the [https://docs.hornbill.com/hornbill-cloud/iso/hr-security/ Hornbill Document Library].
 +
 +
[[file:hornbill-document-library.png|Hornbill Cloud|link=https://docs.hornbill.com/hornbill-cloud/iso/hr-security/]]
 +
 +
<!--
 
Hornbill understands that our employees are not only our biggest assets but have the potential to be our biggest threats. It is well documented that the majority of data breaches occur from within a business either intentionally or by accident. We therefore take recruitment, vetting and should it be needed, disciplinary and leaving very seriously to reduce these risks.  Below are the key points from our HR polices that ensure employees are vetted, trained and nurtured in best practices to ensure data security.   
 
Hornbill understands that our employees are not only our biggest assets but have the potential to be our biggest threats. It is well documented that the majority of data breaches occur from within a business either intentionally or by accident. We therefore take recruitment, vetting and should it be needed, disciplinary and leaving very seriously to reduce these risks.  Below are the key points from our HR polices that ensure employees are vetted, trained and nurtured in best practices to ensure data security.   
  
Line 35: Line 40:
  
 
The Leavers checklist includes a list of items to be returned (such as keys, building fob, credit card etc).
 
The Leavers checklist includes a list of items to be returned (such as keys, building fob, credit card etc).
 +
-->
 +
[[Category:HDOC]]
 +
<!-- hornbill-cloud/iso/hr-security -->

Latest revision as of 17:16, 11 September 2023

This document can now be found at its new location in the Hornbill Document Library.

Hornbill Cloud