This seminar is designed for human resource and payroll professionals, benefits managers, business owners and managers, finance managers, accountants, controllers and attorneys.
Participants in this one-day seminar will gain an in-depth understanding of the issues and responsibilities of HR, finance, and IT to protect sensitive, personal employee and applicant data. In layman’s terms, our experienced faculty will identify common methods for breaching security – both physical and electronic – and provide practical, specific recommendations to assess an organization’s current security program, identify potential risk areas, and take appropriate actions.
8:30 a.m. - 8:45 a.m.
I. Overview And Introductions
8:45 a.m. - 9:15 a.m.
II. Defining Data Privacy And
A. Broad Concepts And Terms
B. HR’s Role As ‘Owner’
C. Partnering With Finance And Information Technology
9:15 a.m. - 10:30 a.m.
III. Reasons To Protect Employee/
A. Employer Liability And Responsibility For Collecting, Managing, And Protecting Personally Identifiable Data
B. Regulatory Requirements And Pending Legislation
C. Risk Analysis And Executive Personal Liability
D. Identity Theft
10:30 a.m. - 10:40 a.m.
10:40 a.m. - 11:40 a.m.
IV. Identity Fraud – This Crime Is
Changing Your Job
A. How It Happens
B. Historical Perspective
C. National Response
D. Privacy Crisis
E. Protecting Yourself
F. Impact On Employers
G. Taking Action
11:40 a.m. - 12:25 p.m.
V. Exposing Hidden Security Threats
In Common Workplace Practices
A. Issues, Challenges And Risks Associated With Today’s Internet Environment
B. Employee Self Service/Manager Self Service
C. Moving And Sharing Data Through E-Mail Or In Spreadsheets
D. Providing Data To Third Party Providers
E. Utilizing Application Service Providers Or Other Outsourcing Vendors, Including Payroll Providers
F. Physical Security
12:25 p.m. - 1:25 p.m.
Lunch (On Your Own)
1:25 p.m. - 2:25 p.m.
VI. Network/System Security Traps
(“Ripped From The Headlines”)
A. Statistics On Security-Related Events
B. “Ripped From The Headlines” – Real Security Problems Companies Have Faced
C. Homeland Security Advisories
E. Attacks From Hackers And Other Malicious Activity
F. FBI Top 20 List
G. Impact On Business Continuity Planning And Disaster Recovery
2:25 p.m. - 3:10 p.m.
VII. Management’s Role In Creating An
Effective Security Program
A. Contents Of An Effective Security Policy Statement
B. Preparing Your Organization For Success
C. Monitoring Effectiveness
D. What Constitutes Due Diligence?
3:10 p.m. - 3:20 p.m.
3:20 p.m. - 4:20 p.m.
VIII. Implementing Effective
A. Risk Analysis Revisited
B. Vulnerability Analysis/Assessment Questionnaire
C. Layered Defense
D. Employee Training
E. Step-By-Step Program To Analyze The Current State Of Employee/Applicant Data Protection
F. Integrating Executive Management Policy With Operational Practices/Procedures
4:20 p.m. - 4:30 p.m.
IX. Q&A: Panel Discussion