How secure and confidential is your 360 service?

 

Security and confidentiality in 360 Feedback systems are often either overlooked or considered in insufficient detail. This is completely understandable since most HR managers have a lot more pressing issues to consider than the relative merits of https over http protocols! However the implications of inadequately specifying the management of your company's data can range from the merely irritating to loss of confidence by staff and even litigation if data is lost or maltreated.  The main areas that most companies need to consider include;

Staff personal privacy and consent

Protection of feedback confidentiality

System security versus accessibility

Data Protection Agency registration

Hardware back up, redundancy and resilience

as with most things in life not all 360 Feedback suppliers are born equal, and it may be to your benefit to consider which of these issues are important to your company before rather than after choosing the best route for you.

 

Privacy and Consent
  • Is there a data management statement clearly available?
  • Do you need to seek consent from each member of staff to participate?
  • Is there an opportunity required for staff to decline to take part?
  • Do you or your supplier hold any personal data about your staff (names and e-mail addresses included)?
  • Is your supplier registered with the Data Protection Agency?
  • Where is the supplier's statement as to their Data Protection commitment?
Confidentiality
  • Who decides who has access to feedback data?
  • What purpose is the data used for
  • Is personal data encrypted?
  • Is the data available to anyone other than the provider and recipient of the feedback?
  • What mechanisms do you have in place to ensure that feedback is treated with respect and confidentiality?
  • How do you communicate these processes to your staff?
Access and Security
  • What security features are in place to protect the confidentiality of individual feedback?
  • How powerful do passwords/access protocols need to be and why?
  • Can users change passwords?
  • Is the feedback data kept on company computers, and who has access to them?
  • What security protocols are used to collect data?
IP Systems and Hardware
  • What back up procedures does the supplier have in place?
  • Is data back up in real time or in batch?
  • Where is the back up data physically located?
  • What happens when internet connection  is lost?
  • How quickly can the system be available when there is loss of service?
  • What is the worst case data loss scenario?
  • Which elements of the internet connection use https protocols?
Join us at one of our free webinars

The topics for the next three months include;
March Integrating 360 Feedback into the company culture
April Some do's and don'ts of 360 Feedback
May Making 360 Feedback work for you

  • Topics of real interest to 360 Feedback users.
  • Hear how 360 is being used in other companies
  • Learn the benefits and pitfalls from others' experiences
  • Interact and gain experience from other 360 users.
  • Effective and enjoyable learning
  • Bite size chunks of time
  • No travel cost or time lost

We look forward to seeing you sometime soon.  

It won't be the same without you!!

©2006 CR360.com