Why Collect HR Data

Great Essays
Register to read the introduction… Data Protection Act

This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are:

Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.

Personal data shall be obtained only for specific lawful purposes, these purposes can be explained to the employee, such as passing pay related information to the HMRC.

Personal data shall be adequate, relevant and not excessive, this can be achieved by weeding the files on a regular bases and deleting information no longer required.

Personal data shall be accurate and up to date, this can be achieved by asking staff members to review their file and confirm accuracy.

Personal data shall not be kept longer than is necessary, this could be relevant to disciplinary awards such as spent convictions or old written warning
…show more content…
Personal data should be protected, this can be achieved by adding locks to filing cabinets and password protecting electronic information.

Personal data should not be transferred to a country outside the EEA, exceptions may include legal requirements, or employee has given permission.

Freedom of Information Act. Is the UK government legislation that allows for the release to the public, information held by public authorities. One of the main reasons for this new legislation was to allow the public to ask how their tax payer’s money has been spent. Any request for information has to be submitted in written form and then answered within 20 working days, or an explanation as to why more time is required. Personal information will not be released, neither will certain sensitive data. The most famous request using this act was the release of MP’s expense scandal of 2009

Word Count 820

Activity 2

I have chosen to analyse absence data between 2 departments using the Bradford Factor scoring

Related Documents

  • Superior Essays

    All information written must be clear and relevant and should never be discussed outside of the work place. If an individual’s personal information is discussed outside of work to someone who is not their colleague, supervisor, or manager, then it is breaching the rules and conducts of this law and will be exploiting the service users confidentiality and…

    • 1741 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Unit 8 P1

    • 787 Words
    • 4 Pages

    Newsletter Legal Issues: Data Protection Act 1998 This law is designed so that your personal information is protected. It protects your data in which is stored on the pc and hard copies. This act gives the people the right to know what information about them is being stored. It protects information such as your name, address, employment history, credit records etc.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Sales of Good Acts (1979) Asda would meet the Sales of Good Act 1979, as they would provide products that are of good quality and ‘fit for purpose’ for customers to use; Asda wouldn’t be providing a product that isn’t in bad quality; an Asda product like an egg wouldn’t be broken or a carton of milk wouldn’t have holes; every product would be ‘fit for purpose’. Also, Asda states on what each product is described like if there was a coat that said “wool coat”, it would be made out of wool, however, the satisfactory quality of the product must be shown to the customers and inform the customers; like the price, description, and age of the product must be given to inform the customers. Supply of Goods and Services Act (1982) Asda would meet the…

    • 711 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Law 25.326

    • 84 Words
    • 1 Pages

    Law of Protection of Personal Data or known Law 25.326 was enacted in 2000. The purpose of this Act is the comprehensive protection of personal information recorded in files, records, databases, databanks or other technical means of data treatment, either public or private for purposes of providing reports, in order to guarantee the right of individuals to their honor and privacy, as well as the access to information recorded thereupon, in accordance with the provisions of Section 43, Third Paragraph of the National Constitution.…

    • 84 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Footlocker Code Of Ethics

    • 970 Words
    • 4 Pages

    The consequences of losing your job will cause near to all to comply with the business practices given. The organisation complies with the data protection act of 1998 as Footlocker is up to data and reliable. Also the information that the business holds is attained fairly and lawfully due to the size of the organisation. Footlocker website has information on their latest product line and information on their trainers.…

    • 970 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Hrm/300 Week 2

    • 1986 Words
    • 8 Pages

    An organization should only collect personal information and other information that is necessary, and should not divulge or release any of this information without permission from the employee. Lastly, this information should be used for the sole purpose for which it was collected and employees…

    • 1986 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    Record360, Inc. Notice of Privacy Policy At Record360, we value your privacy and we are committed to respecting your privacy rights. We pledge to handle your personal information fairly and legally at all times. Record360 is also dedicated to being transparent about what personal information we collect and how we use it. This policy describes how we handle and use personal information; what personal information we collect; how we collect personal information; how we ensure your privacy is maintained; and your legal rights relating to your personal information.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The 14th Amendment Essay

    • 932 Words
    • 4 Pages

    The fourteenth amendment of the American federal constitution grants the citizens right to privacy. The amendment protects the American citizen’s privacy from being violated or intruded by either federal, state government or other individuals except for some few exceptions. Public employees are protected against unreasonable search, and the protection applies only to situations where employees bear reasonable expectations of privacy (Hudson, 2010). Whether there is the reasonable justification for search and seizure is a matter that is determined on the case by case approach based on practices, policies, and nature of the work. Searches at the workplace are authorized based on the purpose and objective of the search.…

    • 932 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Any health care provider, health organizations, or government health plans that use, store, maintain, or transmit patient information must comply with the federal law. HIPAA also protects employees from having their information released by their employer. Along with protecting the privacy of participants the law was also established to cut down on fraudulent activity and improve data systems. Information obtained from your records can not be…

    • 1145 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Importance Of Duty Of Care

    • 4284 Words
    • 18 Pages

    Last accessed 8th April 2013 HRCR. (1981). Young, James & Webster v. United Kingdom, 44 Eur. Ct. H.R. (ser.…

    • 4284 Words
    • 18 Pages
    Great Essays
  • Great Essays

    PIPEDA

    • 1517 Words
    • 7 Pages

    4.5.2; the bank does not have a minimum or maximum retention period with respects to personal information. TD’s policy claims it can hold consumer data for as long as it wishes even after the original purpose has expired. However, PIPEDA also asks organizations to keep consumers data that has been used to make a decision about him ‘long enough’ for an individual to access in the future. This passage of PIPEDA is highly controversial because ‘long enough’ could mean from one day to five years. This vague language of PIPEDA thus allows banks to hold onto consumer data for as long as…

    • 1517 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays