Wednesday, May 6, 2020

Human Resource Assistant At Deloitte - 1096 Words

1. Job Title: Human Resource Assistant at Deloitte. The general role of the HR assistant is to complement the human resource officers within the organization. Some of the duties include answering queries of the employees in regards to HR, updating of employee records and assisting with the processing of new employees and employee terminations. Most importantly, the assistant facilitates the working of other HR professionals. Organization: Deloitte Web Address: http://jobs.deloitte.com/za/johannesburg/human-resources/jobid8356540-talent-and-transformation-consulting-human-resource-assistant-jobs 2. List of TDRs 1. Supportive role to the HR Manager and Consultant in delivery of various HR initiatives 2. Participates in project teams and assists HR team in delivery of projects 3. Skillful planning and prioritization 4. Provide administrative support on HR initiatives - e.g. progression presentations, round tables, 5. HR reporting and analysis of data - e.g. salary analysis, employment equity, talent management, data validation, leave, headcounts etc. 6. System data integrity contractor process clean-up, zero defect – maintenance 7. Assistance with the successful completion of enhancements to the performance management system, based on project requirement and guidance from champion 8. Supportive role in Formal and Informal performance management processes 9. Assistance with Training and development of staff 10. Assistance on IR processes, minute-taking etc. 11.Show MoreRelatedCompetitive Analysis Within the Human Resources Consulting Industry2696 Words   |  11 Pagestheir client’s needs and profession. Such consulting firms that have a global presence include the following: Deloitte, KPMG, Ernest Young, Price Waterhouse, Accenture, IBM. Due to constraints, this assignment will focus on Deloitte as the competition within the consulting industry. The company that I am President is HR One Consulting, Inc., (HR One) which provides human resources (hr) consulting services for the technology industries predominately located in Ontario. The company has providedRead MoreAn Overview of US Benefit Programs4118 Words   |  17 Pagesremoved. Now, in case a financial inducement provides motivation, its absence ought to lower end production levels. And thats precisely what transpired, in the beginning. However, Harold F. Rothe, former employees supervisor and company personnel assistant in the Beloit Corporation, monitored end pro duction during a period of several weeks, offering the kind of long-term statistics seldom gathered in this discipline. Following the preliminary downturn, Rothe (1970) discovered that in the dearth ofRead MorePersonal Experience in a Company: False Promises1612 Words   |  7 PagesInternet. My interviews were highly informative about the processes, procedures, and philosophies of the company. I could not wait to get started. It was on my second and third day of work that I attended a management seminar for every location and assistant manager in the Denver district. It was at this meeting that I heard spokes people from corporate say what had been done in the past was not working and new ideas were needed to revive the business. Those same individuals also sent clear messagesRead MoreInformation About The Private Sector And Public Sector1899 Words   |  8 Pagesremoving prohibited actions), content-based (scans network packets for unrecognized or unknown content) or rate- based (looks for activity that falls outside of normal network parameters) (Vacca, 2009, p. 47-48). 4.3 Human Factors Influence on Effectiveness of Policy Controls Human factors such as psychological motivations play a major role in the effectiveness of implementing policy controls. A key part in defending attacks against metadata is to understand what motivates those responsible forRead MoreRole Of Medical Devices For Health Care Professionals2871 Words   |  12 Pagesenhanced data security which protects patient privacy, informational resources from multiple sources. These apps and mobile devices have aided in performing their tasks beyond the traditional settings of hospitals and clinics. What are Mobile Devices/Apps? Mobile Devices Mobile devices are small hand held devices with wireless network connectivity, these include tablets, smart phones and hand held personal digital assistants commonly called as PDA’s these devices are light weight and portableRead MoreCrm in Supermarkets30832 Words   |  124 Pagesand conducting consumer focus groups. Special thanks also to my colleagues in the Food Industry Management Program and, especially, to Edward McLaughlin, The Robert G. Tobin Professor of Marketing; Sandra Cuellar, research assistant; and Dahlia Reinkopf, former student assistant, for their valuable input and suggestions. Another colleague, Bill Drake, contributed greatly to this project and has my sincere gratitude for his outstanding ideas and efforts. Very special thanks to Wendy Barrett for herRead MoreLevis Swot Analysis5121 Words   |  21 PagesENVIRONMENT ANALYSIS------------------------------------------ 4-1-Societal Environment 4-2-Task Environment 5. INTERNAL ENVIRONMENT ANALYSIS------------------------------------------ 5-1-Corporate Structure 5-2-Corporate Culture 5-3-Corporate Resources 6. ANALYSIS OF STRATEGIC FACTORS ------------------------------------------ 7. STRATEGIC ALTERNATIVES AND RECOMMENDED STRATEGY --- 7-1-Review of Mission and Objective 7-2-Strategic Alternatives and Recommended Strategy 8. CONCLUSION--------Read MoreDirect Marketing Servicing Proposal3625 Words   |  15 Pagesthe IT department is not in â€Å"what we make, but in what we make possible† (Cisco 2013). Rapid advancements in technology are â€Å"altering our economy and creating new market opportunities for the firms which can understand and anticipate their impact† (Deloitte 2013). The IT department is poised to continue uncovering new ideas and create the innovations that will serve the demands of this organization. To accomplish this we are leading the way in â€Å"architecting networks build on simplicity, security,Read MoreIntangible Asset Accounting and Accounting Policy Selection in the Football Industry85391 Words   |  342 Pagesrecognition of intangible assets. The measurement of intangible assets is problematic due to a lack of verification through reference to an active market. However, drawing on Human Resource Accounting, the thesis argues that identifying and measurin g human resource assets may be possible in the football industry. The human resource asset, the player registration, is subject to sufficient control through unique industry structures to justify recognition as an intangible asset. The existence of an activeRead MoreMcdonald Service Concept6517 Words   |  27 PagesHospitality Practice, Fox Rothschild LLP Steve Russell, Chief People Officer, Senior VP, Human Resources, McDonald’s USA Michele Sarkisian, Senior Vice President, Maritz Janice L. Schnabel, Managing Director and Gaming Practice Leader, Marsh’s Hospitality and Gaming Practice Trip Schneck, President and Co-Founder, TIG Global LLC Adam Weissenberg, Vice Chairman, and U.S. Tourism, Hospitality Leisure Leader, Deloitte Touche USA LLP The Robert A. and Jan M. Beck Center at Cornell University Back cover

Risky Situation free essay sample

ldentify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end. Situation 1 – Online Banking System Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Bank Account Numbers Can be used to steal the user’s funds. Low/medium risk, high probability Can be used by terrorist organizations for money laundering. Very high risk, medium possibility Loss of brand reputation to the bank as being less secure. medium risk, medium possibility Account Numbers of Bills stored in Bill Pay Used to access bill information and change information as personal attack on individual. Low/medium risk, medium probability Used to access additional information about user through user’s profile through that particular bill. We will write a custom essay sample on Risky Situation or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Medium risk, medium/high probability Close account without user’s approval or them being aware as a personal attack against them. Medium/high risk, high probability. Stock/investment information Investments can be transferred to someone else’s name without users knowing or approval. High risk/low probability Additional investments can be made in user’s name that are likely to fail, or to illegally support the investment company. High risk/low probability Investments can be donated to charity without user’s consent or knowledge, leaving user with $0 left. High risk/low probability Situation 2 – Facebook Page (organization or personal – specify which) Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Access to friends list. Can allow undesired persons to gain knowledge about someone that does not want their information seen by anyone but people they specify. Medium risk, low/medium probability List can be emptied, severely affecting marketing for the organization. Very high risk, medium/high probability Unapproved, negative, or undesired posts can be sent to large amounts of the target audience. False information being provided to organization’s target audience. High risk, medium high probability Loss of brand reputation to the organization. Medium risk, medium probability Inappropriate or unauthorized photographs being uploaded to organization’s profile, viewable to the public. Loss of trust with customer base, negatively affecting business for the organization. High risk, medium probability. Potential copyright infringement if images are legally protected. Very high risk, medium probability. Negative media coverage broadcasting the intrusion to larger audiences, negatively affecting business for the organization. Very high risk, high probability. Situation 3 – Picture Phones in the Workplace Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Pictures taken of proprietary designs being taken and leaked to the public. Loss of competitive advantage. Very high, low probability Loss of revenue due to competition having similar design. Very high, low probability Loss of trust of internal employees High, medium probability Pictures of customer information taken and stolen. Loss of customer trust and as a result, their business. Medium impact, medium probability Legal ramifications from victimized customers High impact, medium probability Loss of trust of internal employees High, medium probability Images of classified documents being taken and released to the public. Loss of customer support and business. Medium/high impact, medium probability Depending on what information was released, could lead to political controversy and legal ramifications. Very high risk, medium probability Loss of contracts, and thus revenue, from existing clients. Very high risk, medium probability Situation 4 – E-Commerce Shopping Site Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Credit card information Can be used to steal the customer’s funds. Low/medium risk, high probability Can be used to fund terrorist organizations. Very high risk, medium possibility Loss of reputation for business as being not secure. medium risk, medium possibility Product database Prices can be altered without authorization, causing loss of revenue and unhappy customers. High risk, low probability All product information can be deleted causing major problems for the company. Very high risk, medium probability Product details can be altered or deleted to misinform customers or discourage them from purchasing products Medium risk, medium probability Personal customer information (SSNs, addresses, email addresses, etc.). Customer’s identities can be stolen. High risk, high probability Can provide stalkers with additional information about their â€Å"prey†. High risk, medium probability Information can be deleted, severely impacting marketing of the organization. Medium/high risk, medium probability Situation 5 – Real-World Application (such as CRM, ERP, other internal or external organizational systems – pick one and specify) Internal Payroll System Information Affected Potential Harm (Risk) Likely Finding in Risk Analysis Report Employee Checking Account numbers Can be changed so employee paychecks are sent to wrong account where money can be stolen. High risk, medium probability Can be deleted so employees do not get paid. Medium risk, low probability Can be stolen, so money in employee’s checking account is stolen. High risk, medium probability Employee pay scales Can be changed so employee gets paid less than what they are supposed to. Low risk, low probability Can be changed so employee gets paid More than they are supposed to, costing the company more than budgeted. Low risk, low probability Can be accessed and information can be released to the rest of the employees of the company, causing internal turmoil. Medium risk, low probability Company payroll account information All funds in account can be stolen. Very high risk, low probability Account number can be deleted from system so all employees of the company do not get paid on time. High risk, low probability Account information can be given to terrorist organizations where they can use the account to launder money, or Very high risk, medium probability Questions 1. What is the most effective way to identify risks like those you noted in the tables? The most effective way to identify risks like those noted in the tables above is to perform a risk assessment on the system or website and to hire a top notch security manager and team of developers. 2. What are some important factors when weighing the depth of a formal risk analysis? How would you balance the interruption needed for depth and the need to continue ongoing organizational activity? While there are many factors that come into play when weighing the depth of a formal risk analysis, some of the most important of those factors are the impact to the business, the probability of attack, and the difficulty and cost of repair. To balance the interruption needed for depth and the need to continue ongoing organizational activity, I would weigh each of the factors independently, and then rank them by the level of risk they present. 3. What should an organization’s risk management specialist do with the information once a potential risk has been identified? What information would be needed for senior management to know the danger of each risk and the proper way to handle the risk? Once an organization’s risk management specialist identifies a potential risk, the next step would be to analyze the risk and evaluate the impact that risk would have on the company, the probability that the threat will occur (Dr. Wm. Arthur Conklin, Dr. Gregory White, Dwayne Williams, Roger L. Davis, and Chuck Cothren, 2012). Next, a plan must be put into place that specifies what actions are to occur to mitigate the identified risk. Going forward, systems need to be monitored closely to identify trends that lead to occurrences of the risk, and periodically measure the progress of this mitigation. When dealing with senior management, it is important to remember that is not likely that they are as technical as the risk management specialist. With this in mind, the information provided to senior level management should be an understandable, but thorough overview of the risk, and also a recommendation of how to â€Å"fix† the problem. 4. How would this specialist properly prioritize these risks to make sure the most important ones were mitigated first? There are two methods that this specialist could use to properly prioritize these risks to make sure the most important ones are mitigated first. These methods are qualitatively assessing risk, and quantitatively assessing risk, and both can (and should) be used in conjunction as much as possible. By using both of these methods, the severity of each risk can be objectively â€Å"ranked† so that the most important risks can be handled first. 5. Who is responsible for ensuring that an identified risk is addressed by the organization? What role does the analyst play? What role does senior management play? What roles do the analyst and senior management each play in addressing organizational risks? Responsibility falls to Senior IT management to make sure that identified risks are addressed by the organization. The analyst’s role is to assess the risk on the systems for the organization.