Reading:
Ensuring Human Resources Data Privacy and Compliance

Image

Ensuring Human Resources Data Privacy and Compliance

September 1, 2020

As a Human Resources (HR) professional you are involved in the most private aspects of your fellow employees’ work lives. You’re an expert in compensation and benefits, managing numerous uncomfortable topics, such as substance abuse, workplace hostility and unethical behaviour. 

You also know that employee data privacy is core to the employee experience and employee retention, but the digital transformation of human resources to electronic data storage has made protecting employee privacy a lot more complicated. Digital records make life much easier for HR professionals…but they also make sensitive data much easier to steal. 

Compliance is also an ongoing issue and HR leaders can no longer treat the security and privacy of employee data as the sole responsibility of IT. HR executives will play a key role in any company’s data breach response with new compliance mandates such as the European Union General Data Protection Regulation and the Australian Notifiable Data Breaches scheme apply to the protection of employee data.  

HR leaders can expect more, not fewer privacy laws in the future.

Business Man - Data Protection

Know Every Location Where Sensitive Data is Stored

The first step in protecting and securing sensitive employee data is to realise employee data resides in far more places than just the Human Resources Information System (HRIS) and payroll solution. 

Although HRIS environments are the main repository for payroll, benefits, and other administration, HR employees constantly export that data and store it in other places. 

Email and email attachments are commonly used to exchange sensitive data with employees, other departments, and third-party service providers.

Use Multi-Factor Authentication

Outside attackers understand that the best way to compromise data is to compromise the account of someone that can access it. 

MFA helps protect sensitive data by requiring that a user must successfully enter something they know (a password) and something they have (a numeric code texted to his or her mobile phone) in order to access this data. 

Reputable providers of cloud HRIS systems will offer MFA as a feature, however legacy systems like a departmental file share, may or may not support MFA. 

HR executives must demand that MFA is enabled, at least for remote and IT administrator access to systems that contain sensitive employee data.

Onboard and Offboard Employee Access to Sensitive Data

Part of onboarding and offboarding employees is ensuring they have access to the systems required to do their jobs when they join and then making sure that access is removed when they leave or are reassigned. The same must be true for access to sensitive employee data. 

HR departments need to take responsibility for making sure access to sensitive employee data is properly managed. This does not mean you need to do the job of IT, but you do need to verify that IT is configuring access to employee data according to business need to know and corporate role-based access policies.

Ensure IT Administrators Cannot Expose Sensitive Data

Because IT administrators have full access to all data HR professionals you need to ensure IT administrators cannot mistakenly or maliciously expose sensitive data. 

Most IT personnel are well-trained and trustworthy, but there are always those that cannot resist the temptation to know the salaries of other employees, who have a history of substance abuse, or access to the result of a privileged investigation. 

Further, outside attackers often, if not always, compromise IT administrator accounts because they know those accounts have full access to all data. 

Requiring MFA for IT administrator accounts will help but MFA does not change the fact that IT administrator accounts can be used by employees or attackers, mistakenly or with bad intent to access data they should not see.

The Cocoon Data Solution

Cocoon Data’s SafeShare provides solutions to help locate, secure, and control sensitive employee data no matter where it resides. SafeShare helps HR departments to not only decrease risk of an employee data breach and ensure privacy compliance…

…but also to achieve greater efficiency and quality of HR processes because of improved data management.

Prevent Unauthorised Data Breaches 

Data encryption is a basic risk management control that addresses some forms of unauthorised access and SafeShare provides transparent and persistent encryption for all sensitive employee data. 

The SafeShare technology is unique in that encrypted data cannot be decrypted by IT administrator accounts. This approach means that IT administrators can continue to support the HR systems but neither they nor the attackers that compromise their accounts will be exposed to sensitive data.

Manage and Monitor Data With Centralised Role and Label-based Access Controls  

SafeShare also include centralised role and label-based access controls to sensitive employee data, providing HR departments and IT an easier way to manage and monitor entitlements for data. 

Role-based access control is effective for managing access to containers of sensitive employee data while label-based access controls work best for managing access using data classification (e.g. when a file share, for example, contains both sensitive and public data). 

This ensures secure onboarding and offboarding employee access to sensitive data.

Protect Sensitive Data Distributed to External Users 

SafeShare provides a secure Enterprise File Sync and Share (EFSS) solution so HR departments can distribute sensitive data to external users without compromising security or the ability to maintain control over information once it’s left the organisation.

Files can be protected in a variety of ways including:  

And as more and more employees work remotely, SafeShare’s secure Enterprise File Sync and Share solution affords HR departments the protection of a VPN with the ease of use and accessibility of the Cloud.

Ensure Privacy Compliance and Monitor and Respond to Suspicious Behaviour

The SafeShare solution includes a reporting capability to provide a history of access to secured employee data. This history easily integrates with existing reporting and monitoring solutions and allows organisations to not only monitor for suspicious behaviour, but also prove they have taken appropriate steps to maintain privacy of sensitive employee data. Both capabilities are critical to privacy compliance. 

Maintaining a record of access to sensitive data also helps in less obvious ways. It is generally accepted that persistent (not necessarily sophisticated) attackers will eventually compromise an environment. However, with proper data security controls in place a security incident does not necessarily mean that there has been a breach of sensitive employee data. 

When a security incident occurs, it is critical to quickly confirm whether sensitive employee data was improperly accessed. Having a detailed record of access to data helps determine if an attacker successfully exposed sensitive data. With that said, properly securing employee data will dramatically reduce the probability that an attack on sensitive employee data is successful.

A Data-Centric Secure Solution to Human Resources Data Privacy and Compliance

Due to increased employee expectations of privacy, increasing privacy regulations and more employees working remotely, Human Resources departments play an increasing role in the security of sensitive employee data. 

But the good news is…with SafeShare you don’t have to become an IT expert yourself or rely on your IT department to protect your sensitive employee information and ensure privacy compliance.

Find out more.

Related Stories

April 30, 2020

Ensuring compliance and protecting your data sovereignty during COVID-19

The laws around social distancing during the COVID19 pandemic have dramatically changed the way we all live and work, relocating most employees from a traditional office environment to working from home.

Military Aircraft in desert
December 2, 2019

ITAR Cloud Compliance

Cloud solutions for compliance and regulated data take a monumental burden off of businesses. Compliance directives such as ITAR and EAR apply to your business regardless of your resources or ability to become compliant.

November 14, 2019

The Rogue Admin and Unfettered Data Access

Today the idea of access control is everywhere. Everyone who has sensitive information wants security controls to limit access to that data. This desire turns to need when the data is not only sensitive but regulated, and is a common sense measure that limits access to data on a need to have basis.

Arrow-up